A Secure Single Sign ? On Scheme for Distributed Systems and Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

A Secure Single Sign ? On Scheme for Distributed Systems and Network

Smitaprava Gachhayat, K. Ramana Reddy

Single Sign On (S SO) has been around for many years to provide a single authentication for rendering multiple services. For instance Google has been using its S SO approach to render various services in a distributed computing environment. This will enable legal users to have a single credential for accessing all services provided by an enterprise through its web application on line. This will help end users to have advantages such as remembering only one login credentials for all activities. Chang and Lees S SO scheme was improved recently by Wang et AL. to overcome the drawbacks of the work of Chang and Lee. The credential hacking by malicious service provider and outsider hacking credentials are the two problems overcome in their research. Inspired by this, in this paper we attempted to build a prototype application that demonstrates the concept of S SO. The application has many services and multiple users with effective session management. The empirical results reveal that the prototype is able to provide secure S SO.

Keywords: Information Security, authentication, distributed computing, SSO

Edition: Volume 3 Issue 12, December 2014

Pages: 1087 - 1090

Share this Article

How to Cite this Article?

Smitaprava Gachhayat, K. Ramana Reddy, "A Secure Single Sign ? On Scheme for Distributed Systems and Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=5121405, Volume 3 Issue 12, December 2014, 1087 - 1090

99 PDF Views | 87 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Information Security'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2619 - 2622

Information Security in Multi-Cloud Environment

Digambar D. Patil, Megha Singh

Share this Article

Research Paper, Computer Science & Engineering, China, Volume 4 Issue 11, November 2015

Pages: 1446 - 1450

Mutual Authentication Cloud Computing Platform based on TPM

Lei Peng, Yanli Xiao

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1092 - 1095

A Survey on Public Auditing for Integrity Checking and Regenerating Faulty Data Block in Cloud Data Storage

Shamala M G, Rekha K B

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Similar Articles with Keyword 'authentication'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2234 - 2237

Analysis of Protective Mechanism in Roaming Network for Secure Communication

Ashwini A. Lokhande, Sonali U. Nimbhorkar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 842 - 845

Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks

Srihari Babu Kolla, B. B. K. Prasad

Share this Article

Similar Articles with Keyword 'distributed computing'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and Its Types in Mobile Network

Palak Jain

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2528 - 2530

To Improve Fault Tolerance in Mobile Distributed System

Anupama Padha, Meenakshi Sharma

Share this Article

Research Paper, Computer Science & Engineering, Sudan, Volume 6 Issue 5, May 2017

Pages: 2276 - 2277

Cloud Computing Challenges

Dr. Alshafie Gafaar Mhmoud Mohmmed, Saife Eldin Fatoh Osman

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2219 - 2223

Performance Analysis for Optimizing Hadoop MapReduce Execution

Samiksha Misal, P. S Desai

Share this Article

Similar Articles with Keyword 'SSO'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Research Paper, Computer Science & Engineering, Sweden, Volume 9 Issue 12, December 2020

Pages: 1137 - 1139

Predicting Diabetes using Gradient Boosting is a Machine Learning Technique

Ali Adam Mohammad

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2067 - 2070

A Survey on QOS Guaranteed Bandwidth Shifting and Redistribution in Mobile Cloud Environment

Swati Nagpure

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2377 - 2379

Survey of Fast Nearest Neighbor Search

Rutuja Panjabrao Desai, S. R. Patil

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2297 - 2299

Measuring and Comparing Semantic Structure of Ontology

Nirmitee N. Kurhekar, Prof. L. J. Sankpal

Share this Article
Top