CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Efficient and Secure Single Sign on Mechanism for Distributed Network

by Madhavi A. Indalkar, Ram Joshi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 99 - Number 8
Year of Publication: 2014
Authors: Madhavi A. Indalkar, Ram Joshi
10.5120/17397-7953

Madhavi A. Indalkar, Ram Joshi . Efficient and Secure Single Sign on Mechanism for Distributed Network. International Journal of Computer Applications. 99, 8 ( August 2014), 42-46. DOI=10.5120/17397-7953

@article{ 10.5120/17397-7953,
author = { Madhavi A. Indalkar, Ram Joshi },
title = { Efficient and Secure Single Sign on Mechanism for Distributed Network },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 99 },
number = { 8 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 42-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume99/number8/17397-7953/ },
doi = { 10.5120/17397-7953 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:27:42.774929+05:30
%A Madhavi A. Indalkar
%A Ram Joshi
%T Efficient and Secure Single Sign on Mechanism for Distributed Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 99
%N 8
%P 42-46
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Distributed network is act as core part to access the various services which are available in the network. But the security related to distributed network is main concern. In this paper single sign-on SSO mechanism is introduced which gives access to all services by allowing to sign on only once by users. In this mechanism once user logs in to the Trusted Authority Center TAC then application or services which are register to trusted center will automatically verifies the user's credentials details and these credentials like password or digital signature will be only one for all applications or services. Unlike all other previous mechanisms where in, if user wants to have access multiple services then for every service distinct user credentials (username, password) must be required. SSO act as single authentication window to user for admittance multiple service providers in networks. Previously introduced technique based SSO technology proved to be secure over well-designed SSO system, but fails to provide security during communication. So here emphasis is given on authentication as open problem and on to refining the already proposed SSO process. And to do this along with RSA algorithm which was used in previous SSO process, we will be using MAC algorithm, which is intended to provide secured pathway for communication over distributed network. TAC i. e. Trusted Authority Center is used for sending token integrated with private and shared public key to user.

References
  1. Guilin Wang, Jiangshan Yu, and Qi Xie "Security Analysis of a Single Sign On Mechanism for Distributed Computer Networks", IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL 9 NO 1 FEBRUARY 2013
  2. A. C. Weaver and M. W. Condtry, "Distributing internet services to the network edge" IEEE Transaction Ind. Electron, volume 50 no. 3pp. 402 to 413, June 2003.
  3. L. Barolli and F. Xhafa, "JXTA-OVERLAY A P2P platform for distributed, collaborative and ubiquitous computing system" IEEE Transaction Ind. Electron. Volume 58 no. 6 pp. 2160 to 2174 October 2010.
  4. L. Lamport, "Password authentication with insecure communication" Communication. ACM volume 24 no 11 pp 770 to 774, November 1981.
  5. W. B. Lee and C. C. Chang, "User identification and key distribution maintaining anonymity for distributed computer networks" Computation System Science Engineering volume 15 no. 4, pp. 113 to 116, February 2000.
  6. W. Juang, S. Chen, and H. Liaw, "Robust and efficient password authenticated key agreement using smart cards," IEEE Transaction Ind. Electron. Volume 15 no. 6 pp. 2553 to 2558, June 2008.
  7. X. Li,W. Qiu, D. Zheng, K. Chen, and J. Li, "Anonymity enhancement on robust and efficient password authenticated key agreement using smart cards," IEEE Transaction Ind. Electron. Volume 57 no. 2, pp. 793 to 800, February 2010.
  8. M. Cheminod, A. Pironti, and R. Sisto, "Formal vulnerability analysis of a security system for remote field bus access" IEEE Transaction Ind. Inf. volume 7 no. 1 pp. 30 40, February 2011.
  9. C. L. Hsu and Y. H. Chuang, "A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks," Inf. Science volume 179 no. 4 pp. 422 to 429, February 2009.
  10. L. Harn and J. Ren, "Generalized digital certificate for user authentication and key establishment for secure communications" IEEE Transaction for Wireless Communication, volume 10, no. 7, pp. 2372 to 2379, July 2011.
  11. U. Feige, A. Fiat, and A. Shamir, "Zero-knowledge proofs of identity" J. Cryptography, volume 1, no. 2, pp. 77 to 94, 1988.
  12. J. Han, Y. Mu, W. Susilo, and J. Yan, "A generic construction of dynamic single sign on with strong security," in Proc. Secure Communication pp. 181 to198, Springer, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Attacks Distributed network services Single Sign on mechanism SSO