Downloads: 111 | Views: 268
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014 | Popularity: 6.3 / 10
Enhancing Security and Authentication of Single Sign on Mechanism of Distributed Computer Networks
Bommasani Nagasai, P. Srilatha
Abstract: With wide spreading of distributed computer networks, it has become trendy to allow users accessing various network services offered by distributed service providers. It is usually not recommended by asking one user to maintain different pairs of identity and passwords for different service providers, since this imposes a burden on both users and service providers as well as the communication overhead of computer networks. So, a single sign-on mechanism has been introduced so that after obtaining a credential from a trusted authority each legal user can use this single credential to authenticate itself and then access multiple service providers. There are various attacks and parameters that need to be considered while providing security to authentication system. In this paper, we endow with a comprehensive review of existing work done on Single sign-on. However, most existing Single sign-on schemes have not been proved to satisfy credential privacy and soundness of credential based authentication we formalize the security model of Single sign-on scheme with authenticated key exchange what parameters and attacks should be covered. Next, Implementation of Single Sign-on for distributed computing using user-id and password along with biometric verification and security analysis is done finally, we conclude, specifying the future work.
Keywords: Authentication, Soundness, Anonymity, Single Sign-On, Biometrics, security
Edition: Volume 3 Issue 9, September 2014
Pages: 1281 - 1284
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022
Pages: 455 - 459Real World IoT Applications in Daily Domain
Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad
Downloads: 0
Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022
Pages: 1023 - 1029A Survey and High-Level Design on Human Activity Recognition
Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad