There Are Systems ‘Guarding’ Your Data in Cyberspace – but Who Is Guarding the Guards

The current best practice in secure technology architecture used by major businesses and organisations is a “zero trust” approach.

Advertisement
By The Conversation | Updated: 30 May 2022 13:21 IST
Highlights
  • Every user and action is verified before implementation
  • No single person or system is trusted
  • The interactions are verified through a central entity
There Are Systems ‘Guarding’ Your Data in Cyberspace – but Who Is Guarding the Guards

Potential for vulnerabilities increases as IT systems become more complex

We use internet-connected devices to access our bank accounts, keep our transport systems moving, communicate with our colleagues, listen to music, undertake commercially sensitive tasks – and order pizza.

Digital security is integral to our lives, every day. And as our IT systems become more complex, the potential for vulnerabilities increases. More and more organisations are being breached, leading to financial loss, interrupted supply chains and identity fraud.

The current best practice in secure technology architecture used by major businesses and organisations is a “zero trust” approach.

In other words, no person or system is trusted and every interaction is verified through a central entity.

Advertisement

Unfortunately, absolute trust is then placed in the verification system being used. So breaching this system gives an attacker the keys to the kingdom. To address this issue, “decentralisation” is a new paradigm that removes any single point of vulnerability.

Our work investigates and develops the algorithms required to set up an effective decentralised verification system.

Advertisement

We hope our efforts will help safeguard digital identities, and bolster the security of the verification processes so many of us rely on.

Never trust, always verify A zero trust system implements verification at every possible step.

Advertisement

Every user is verified, and every action they take is verified, too, before implementation.

Moving towards this approach is considered so important that US President Joe Biden made an executive order last year requiring all US federal government organisations to adopt a zero trust architecture.

Many commercial organisations are following suit.

However, in a zero trust environment absolute faith is (counter intuitively) placed in the validation and verification system, which in most cases is an Identity and Access Management (IAM) system.

This creates a single trusted entity which, if breached, gives unencumbered access to the entire organisations systems.

An attacker can use one user's stolen credentials (such as a username and password) to impersonate that user and do anything they're authorised to do – whether it's opening doors, authorising certain payments, or copying sensitive data.

However, if an attacker gains access to the entire IAM system, they can do anything the system is capable of. For instance, they may grant themselves authority over the entire payroll.

In January, identity management company Okta was hacked. Okta is a single-sign-on service that allows a company's employees to have one password for all the company's systems (as large companies often use multiple systems, with each requiring different login credentials).

Following Okta's hack, the large companies using its services had their accounts compromised – giving hackers control over their systems. So long as IAM systems are a central point of authority over organisations, they will continue to be an attractive target for attackers.

Decentralising trust In our latest work, we refined and validated algorithms that can be used to create a decentralised verification system, which would make hacking a lot more difficult.

Our industry collaborator, TIDE, has developed a prototype system using the validated algorithms.

Currently, when a user sets up an account on an IAM system, they choose a password which the system should encrypt and store for later use. But even in an encrypted form, stored passwords are attractive targets.

And although multi-factor authentication is useful for confirming a user's identity, it can be circumvented.

If passwords could be verified without having to be stored like this, attackers would no longer have a clear target. This is where decentralisation comes in. Instead of placing trust in a single central entity, decentralisation places trust in the network as a whole, and this network can exist outside of the IAM system using it.

The mathematical structure of the algorithms underpinning the decentralised authority ensure that no single node that can act alone.

Moreover, each node on the network can be operated by an independently operating organisation, such as a bank, telecommunication company or government departments.

So stealing a single secret would require hacking several independent nodes. Even in the event of an IAM system breach, the attacker would only gain access to some user data – not the entire system.

And to award themselves authority over the entire organisation, they would need to breach a combination of 14 independently operating nodes. This isn't impossible, but it's a lot harder.

But beautiful mathematics and verified algorithms still aren't enough to make a usable system.

There's more work to be done before we can take decentralised authority from a concept, to a functioning network that will keep our accounts safe.


Should you pick Vivo over Galaxy S22 and OnePlus 10 Pro? We discuss this on Orbital, the Gadgets 360 podcast. Orbital is available on Spotify, Gaana, JioSaavn, Google Podcasts, Apple Podcasts, Amazon Music and wherever you get your podcasts.
Affiliate links may be automatically generated - see our ethics statement for details.

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Further reading: Okta, Hacking, Digital Security
Advertisement

Related Stories

Popular Mobile Brands
  1. iPhone 17 Air Battery Specifications, Weight and Other Details Leaked
  2. CMF Phone 2 Pro Review: A Perfect Blend of Style and Speed
  3. Motorola Edge 2025 Goes Official With New AI Key: See Price, Features
  4. Realme Neo 7 Turbo Display, Battery Details Revealed Ahead of Launch
  5. Airtel's 10-Day Postpaid International Roaming Pack Now Offers More Data
  1. iOS 19 to Reportedly Enable Easy eSIM Transfers from iPhone to Android
  2. Airtel Adds Extra Data to its 10-Day Postpaid International Roaming Pack in India
  3. Anthropic’s Claude AI Chatbot Gets Voice Mode Feature, Offers Real-Time Two-Way Conversations
  4. Infinix Hot 60 Pro+ Renders Surface Online, Corroborate Recent Design Leaks
  5. iPhone 17 Air to Launch With Silicon-Carbon Battery and Aluminium Frame, Tipster Claims
  6. Samsung Rolls Out First One UI 8 Beta Update for Galaxy S25 Series in Select Countries: Eligibility, Features
  7. Apple Testing a 200-Megapixel Rear Camera Sensor for Future iPhone Models: Report
  8. OpenAI Is Exploring Ways to Let Users Sign Into Third-Party Apps Using ChatGPT
  9. Samsung Galaxy Z Flip 7 Chipset Tipped; Could Be First Samsung Foldable to Adopt Dual-Chip Strategy
  10. Qualcomm Releases Study Showing That Its Modems Beat Apple’s C1
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.