Research Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014
A Secure Single Sign ? On Scheme for Distributed Systems and Network
Smitaprava Gachhayat, K. Ramana Reddy
Single Sign On (S SO) has been around for many years to provide a single authentication for rendering multiple services. For instance Google has been using its S SO approach to render various services in a distributed computing environment. This will enable legal users to have a single credential for accessing all services provided by an enterprise through its web application on line. This will help end users to have advantages such as remembering only one login credentials for all activities. Chang and Lees S SO scheme was improved recently by Wang et AL. to overcome the drawbacks of the work of Chang and Lee. The credential hacking by malicious service provider and outsider hacking credentials are the two problems overcome in their research. Inspired by this, in this paper we attempted to build a prototype application that demonstrates the concept of S SO. The application has many services and multiple users with effective session management. The empirical results reveal that the prototype is able to provide secure S SO.
Keywords: Information Security, authentication, distributed computing, SSO
Edition: Volume 3 Issue 12, December 2014
Pages: 1087 - 1090
How to Cite this Article?
Smitaprava Gachhayat, K. Ramana Reddy, "A Secure Single Sign ? On Scheme for Distributed Systems and Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=5121405, Volume 3 Issue 12, December 2014, 1087 - 1090
99 PDF Views | 87 PDF Downloads
Similar Articles with Keyword 'Information Security'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2619 - 2622Information Security in Multi-Cloud Environment
Digambar D. Patil, Megha Singh
Research Paper, Computer Science & Engineering, China, Volume 4 Issue 11, November 2015
Pages: 1446 - 1450Mutual Authentication Cloud Computing Platform based on TPM
Lei Peng, Yanli Xiao
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 1092 - 1095A Survey on Public Auditing for Integrity Checking and Regenerating Faulty Data Block in Cloud Data Storage
Shamala M G, Rekha K B
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Similar Articles with Keyword 'authentication'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2234 - 2237Analysis of Protective Mechanism in Roaming Network for Secure Communication
Ashwini A. Lokhande, Sonali U. Nimbhorkar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1565 - 1567A Region Boundaries Algorithm for Ear Authentication Based on Plots
G. Harsha Vardhan, K. Jeeva
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1724 - 1727Privacy Preserving Authenticity Framework for Shared Data Cloud Network
P. Vanitha Sree, K. Narayana Rao
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 842 - 845Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
Similar Articles with Keyword 'distributed computing'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1884 - 1886Performance Analysis of Clustal W Algorithm on Linux Cluster
Swati Jasrotia, Salam Din
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013
Pages: 71 - 73Cloud Computing and Its Types in Mobile Network
Palak Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2528 - 2530To Improve Fault Tolerance in Mobile Distributed System
Anupama Padha, Meenakshi Sharma
Research Paper, Computer Science & Engineering, Sudan, Volume 6 Issue 5, May 2017
Pages: 2276 - 2277Cloud Computing Challenges
Dr. Alshafie Gafaar Mhmoud Mohmmed, Saife Eldin Fatoh Osman
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 2219 - 2223Performance Analysis for Optimizing Hadoop MapReduce Execution
Samiksha Misal, P. S Desai
Similar Articles with Keyword 'SSO'
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 338 - 384Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm
Dr. Niju P. Joseph, Dr. Priyanka Surendran
Research Paper, Computer Science & Engineering, Sweden, Volume 9 Issue 12, December 2020
Pages: 1137 - 1139Predicting Diabetes using Gradient Boosting is a Machine Learning Technique
Ali Adam Mohammad
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2067 - 2070A Survey on QOS Guaranteed Bandwidth Shifting and Redistribution in Mobile Cloud Environment
Swati Nagpure
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2377 - 2379Survey of Fast Nearest Neighbor Search
Rutuja Panjabrao Desai, S. R. Patil
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2297 - 2299Measuring and Comparing Semantic Structure of Ontology
Nirmitee N. Kurhekar, Prof. L. J. Sankpal