Analysis of Suitable Security Protocols for Apply a Model of Identity in the Civil Registry of Ecuador

Moises Toapanta, Enrique Mafla, Jose Orizaga
2016 Review of Computer Engineering Research  
Different security protocols were analyzed are used for a centralized database with distributed architecture. The goal is identify adequate security protocols to mitigate the security of information through identity of a model without relying on technological infrastructures. In this phase the suitable security protocols for a model of identity authentication, authorization and auditing (AAA) was analyzed. Deductive method is used in exploratory research to analyze security protocols more used
more » ... rotocols more used among the main mentioned: Feret, Kerberos, Radius, Dnssec, Ipsec, Pgp, Secure Rpc, Set, Ssl, Tls, Maille, Eap, Pap, Map, Diameter, Peap, among others. It turned out that security protocols should be adopted on a model of identity for a centralized data base. It was concluded that protocols and security algorithms must have a direct relation to the identity model; allowing mitigate the vulnerabilities and risks considering To mitigate the threats and risks of information with confidentiality, integrity and availability. The technological infrastructure should not influence the implementation of different security protocols. Contribution/ Originality This paper provides the first analysis to adopt appropriate security protocols for an identity model with authentication, authorization and auditing without relying on specific technological infrastructure for Ecuador's civil registry; in a distributed architecture database. Different civil registries of the world with similar characteristics can refer this research project.
doi:10.18488/journal.76/2016.3.4/76.4.65.68 fatcat:znbpr644hjcpjifeehi6q552ly