Forthcoming

Analysis of Trust Models in Public Key Infrastructure: A Systematic Literature Review of Interoperability Challenges

Authors

  • Rozlinda Radzali New Era University College, Blok B&C, Lot 5, Seksyen 10, Jalan Bukit, 43000 Kajang, Selangor, Malaysia.
  • A.H. Azni CyberSecurity and System Research Unit, Faculty of Science and Technology, Universiti Sains Islam Malaysia, Nilai 71800, Negeri Sembilan, Malaysia.
  • Farida Ridzuan CyberSecurity and System Research Unit, Faculty of Science and Technology, Universiti Sains Islam Malaysia, Nilai 71800, Negeri Sembilan, Malaysia.
  • Nur Hafiza Zakaria Faculty of Science and Technology, Universiti Sains Islam Malaysia, 71800, Nilai, Negeri Sembilan, Malaysia.
  • Tasnuva Ali Department of Electronics and Telecommunication Engineering, Daffodil International University Dhaka, Bangladesh.

DOI:

https://doi.org/10.33102/mjosht.v11i1.465

Keywords:

Key management System (KMS), Interoperability, Public Key Infrastructure (PKI), Comparative analysis

Abstract

Public Key Infrastructure (PKI) guarantees secure communication and authentication in digital contexts. With the expansion of digital ecosystems, the ability of PKI systems to work together smoothly becomes increasingly important, allowing multiple trust models to be compatible. Nevertheless, several significant challenges must be overcome when merging different trust models. The current body of research does not thoroughly examine these difficulties in various PKI trust models. This study aims to conduct a comprehensive assessment and analysis of the difficulties related to PKI interoperability. The focus will be on trust models such as Cross Certification, Bridge CA, Hierarchical, Hybrid, Cross Recognition, and Certificate Trust Lists. This systematic literature review (SLR) uses the PRISMA technique to analyse trust models in PKI interoperability. The review focuses on peer-reviewed studies published between 2000 and 2024, ensuring transparency and rigor. Eligibility criteria included studies using quantitative methodologies and sourced from major academic databases. This systematic review identified critical challenges in the interoperability of PKI trust models, particularly in operational complexity, security, liability, and scalability. Trust models like Cross Certification, Bridge CA, and Hierarchical systems each present unique challenges when integrated into diverse digital ecosystems. Moreover, gaps in the current research suggest the need for more standardised, scalable solutions that can accommodate the growing complexity of digital infrastructures. Future research should focus on developing a universal model for PKI interoperability, with a particular emphasis on large-scale environments such as E-commerce and E-government systems.

Downloads

Download data is not yet available.

References

Zhang, Chengyuan, Changqing An, Tao Yu, Zhiyan Zheng, and Jilong Wang. "Investigate and Improve the Certificate Revocation in Web PKI." In NOMS 2024-2024 IEEE Network Operations and Management Symposium, pp. 1-5. IEEE, 2024. doi: 10.1109/NOMS59830.2024.10575605.

Xiong, Qin, Yujian Zhang, Junhao Li, and Fei Tong. "Enhancing Security of Certificate Authorities by Blockchain-based Domain Transparency." In 2022 IEEE 28th International Conference on Parallel and Distributed Systems (ICPADS), pp. 304-311. IEEE, 2023. doi: 10.1109/ICPADS56603.2022.00047.

Margariti, Vicky, Dimosthenis Anagnostopoulos, Anastasia Papastilianou, Teta Stamati, and Sofia Angeli. "Assessment of organizational interoperability in e-Government: A new model and tool for assessing organizational interoperability maturity of a public service in practice." In Proceedings of the 13th international conference on theory and practice of electronic governance, pp. 298-308. 2020. doi: 10.1145/3428502.3428544.

Jain, Alok, Sarthak Gupta, Mangalesh Vyas, Diptikant Pathy, Gitika Khare, Alpana Rajan, and Anil Rawat. "Open source EJBCA public key infrastructure for e-governance enabled software systems in RRCAT." In ICT Based Innovations: Proceedings of CSI 2015, pp. 127-139. Springer Singapore, 2018. doi: 10.1007/978-981-10-6602-3.

Ma, Yong Li. "Study on the Solution of PKI Interoperation." Advanced Materials Research 271 (2011): 1136-1141. doi: 10.4028/www.scientific.net/AMR.271-273.1136.

Kong, Ini, Marijn Janssen, and Nitesh Bharosa. "Challenges in the Transition towards a Quantum-safe Government." In DG. O 2022: The 23rd Annual International Conference on Digital Government Research, pp. 282-292. 2022. doi: 10.1145/3543434.3543644.

Panigrahi, Amrutanshu, Ajit Kumar Nayak, and Rourab Paul. "Smart contract assisted blockchain based public key infrastructure system." Transactions on Emerging Telecommunications Technologies 34, no. 1 (2023): e4655. doi: 10.1002/ett.4655.

Obiri, Isaac Amankona, Jingcong Yang, Qi Xia, and Jianbin Gao. "A sovereign PKI for IoT devices based on the blockchain technology." In 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), pp. 110-115. IEEE, 2021. doi: 10.1109/ICCWAMTIP53232.2021.9674095.

Dulia, Oleksandr, and Dmytro Minochkin. "An exploration of public key infrastructure applications across diverse domains: a comparative analysis." (2023). doi: 10.20535/2411-1031.2023.11.2.293496.

El Uahhabi, Zakia, and Hanan El Bakkali. "A comparative study of PKI trust models." In 2014 International Conference on Next Generation Networks and Services (NGNS), pp. 255-261. IEEE, 2014. doi: 10.1109/NGNS.2014.6990261.

Linn, J. "Trust Models and Management in PKI." RSA Security Laboratories (2000). Available: http://storage.jak-stik.ac.id/rsasecurity/PKIPaper.pdf

Moher, David, Alessandro Liberati, Jennifer Tetzlaff, Douglas G. Altman, and Prisma Group. "Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement." International journal of surgery 8, no. 5 (2010): 336-341. doi: 10.1016/j.ijsu.2010.02.007.

Zakaria, Abdul Alif, A. H. Azni, Farida Ridzuan, Nur Hafiza Zakaria, and Maslina Daud. "Systematic literature review: trend analysis on the design of lightweight block cipher." Journal of King Saud University-Computer and Information Sciences 35, no. 5 (2023): 101550. doi: 10.1016/j.jksuci.2023.04.003.

Ellaky, Zineb, Faouzia Benabbou, and Sara Ouahabi. "Systematic literature review of social media bots detection systems." Journal of King Saud University-Computer and Information Sciences 35, no. 5 (2023): 101551. doi: 10.1016/j.jksuci.2023.04.004.

Oudah, Mohammed AM, and Mohd Fadzli Marhusin. "SQL Injection Detection using Machine Learning: A Review." Malaysian Journal of Science Health & Technology 10, no. 1 (2024): 39-49. doi: 10.33102/mjosht.v10i1.368.

Havinga, Marieke, Martijn Hoving, and Virgil Swagemakers. "Alibaba: a case study on building an international imperium on information and E-Commerce." Multinational Management: A Casebook on Asia’s Global Market Leaders (2016): 13-32.

Liu, Changping, Yong Feng, Mingyu Fan, and Guangwei Wang. "PKI mesh trust model based on trusted computing." In 2008 The 9th International Conference for Young Computer Scientists, pp. 1401-1405. IEEE, 2008. doi: 10.1109/ICYCS.2008.384.

Chung, Yu Fang, and Hui Fang Chen. "Cross platform layer for public key infrastructure interoperability." International Journal of Innovative Computing, Information and Control 5, no. 6 (2009): 1699-1710.

Hiller, Jens, Johanna Amann, and Oliver Hohlfeld. "The boon and bane of cross-signing: Shedding light on a common practice in public key infrastructures." In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 1289-1306. 2020. doi: 10.1145/3372297.3423345.

Kakei, Shohei, Yoshiaki Shiraishi, Masami Mohri, Toru Nakamura, Masayuki Hashimoto, and Shoichi Saito. "Cross-certification towards distributed authentication infrastructure: A case of hyperledger fabric." IEEE Access 8 (2020): 135742-135757. doi: 10.1109/ACCESS.2020.3011137.

Ma, Yongli. "Research on the solution of PKI interoperability based on validation authority." In 2011 International Conference on Computer Science and Service System (CSSS), pp. 697-700. IEEE, 2011. doi: 10.1109/CSSS.2011.5974568

Paulus, Sachar, Norbert Pohlmann, Helmut Reimer, InKyung Jeun, Jaeil Lee, and SangHwan Park. "Asia PKI Interoperability Guideline." In ISSE 2004—Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2004 Conference, pp. 309-320. Vieweg+ Teubner Verlag, 2004. doi: 10.1007/978-3-322-84984-7_31.

Chia, Jason, Swee-Huay Heng, Ji-Jian Chin, Syh-Yuan Tan, and Wei-Chuen Yau. "An Implementation Suite for a Hybrid Public Key Infrastructure." Symmetry 13, no. 8 (2021): 1535. doi: 10.3390/sym13081535.

Satizábal, Cristina, Rafael Páez, and Jordi Forné. "Building a Virtual Hierarchy for Managing Trust Relationships in a Hybrid Architecture." J. Comput. 1, no. 7 (2006): 60-68. doi: 10.4304/jcp.1.7.60-68.

Msahli, Mounira, Houda Labiod, and Gilles Ampt. "Security interoperability for cooperative its: Architecture and validation." In 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1-6. IEEE, 2019. doi: 10.1109/NTMS.2019.8763819.

Polk, William T., and Nelson E. Hastings. "Bridge certification authorities: Connecting b2b public key infrastructures." In PKI Forum Meeting Proceedings, pp. 27-79. 2000.

Li, Mingchu, Yizhi Ren, Zhihui Wang, Jun Xie, and Hongyan Yao. "A new modified bridge certification authority PKI trust model." In 2006 First International Symposium on Pervasive Computing and Applications, pp. 23-26. IEEE, 2006. doi: 10.1109/SPCA.2006.297465.

Slagell, Adam, Rafael Bonilla, and William Yurcik. "A survey of PKI components and scalability issues." In 2006 IEEE International Performance Computing and Communications Conference, pp. 10-pp. IEEE, 2006. doi: 10.1109/.2006.1629442.

Tanwar, Sarvesh, and Anil Kumar. "Extended Design and Implementation of Certificate Authorities." International Journal of Security and its Applications 11, no. 8 (2017): 13-26. doi: 10.14257/ijsia.2017.11.8.02.

Satizabal, Cristina, Rafael Paez, and Jordi Forne. "PKI trust relationships: from a hybrid architecture to a hierarchical model." In First International Conference on Availability, Reliability and Security (ARES'06), pp. 8-pp. IEEE, 2006. doi: 10.1109/ARES.2006.93.

Nawari, Mustafa, and Asma Abdalrahman. "Crossover under the root of a certification authority." In 2013 International Conference On Computing, Electrical And Electronic Engineering (ICCEEE), pp. 182-185. IEEE, 2013. doi: 10.1109/ICCEEE.2013.6633929.

Singh, Priyadarshi, Abdul Basit, N. Chaitanya Kumar, and V. Ch Venkaiah. "Towards a hybrid Public Key Infrastructure (PKI): a review." Cryptology ePrint Archive (2019).

Al-Janabi, Sufyan Faraj, and Amer Kais Obaid. "Development of certificate authority services for web applications." In 2012 International Conference on Future Communication Networks, pp. 135-140. IEEE, 2012. doi: 10.1109/ICFCN.2012.6206857.

Steve, L., D. Fillingham, R. Lampard, and S. Orlowski. "CA-CA Interoperability." In PKI Forum, March. 2001.

Cuijpers, Colette, and Jessica Schroers. "eIDAS as guideline for the development of a pan European eID framework in FutureID." (2014).

D. W. Wood and D. W. Wood, “United States Department Of The Treasury,” 2021.

Downloads

Published

2025-02-24

How to Cite

Rozlinda Radzali, A.H. Azni, Farida Ridzuan, Nur Hafiza Zakaria, & Tasnuva Ali. (2025). Analysis of Trust Models in Public Key Infrastructure: A Systematic Literature Review of Interoperability Challenges. Malaysian Journal of Science Health & Technology, 11(1), 95–102. https://doi.org/10.33102/mjosht.v11i1.465

Issue

Section

Integration of Science & Technology

Similar Articles

<< < 2 3 4 5 6 7 8 9 > >> 

You may also start an advanced similarity search for this article.