SSO-Key Distribution Center Based Implementation Using Symmetric Encryption Technique for Distributed Network (Securing SSO in Distributed Network)
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 112 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015

SSO-Key Distribution Center Based Implementation Using Symmetric Encryption Technique for Distributed Network (Securing SSO in Distributed Network)

M Durga Prasanna, Roopa S R

Single sign-on (SSO) is a session/user authentication process that permits a user to enter one name and password in order to access multiple applications. The process authenticates the user for all the applications they have been given rights to and eliminates further prompts when they switch applications during a particular session. Unforgeability, credential privacy, and soundness are the basic requirements of any SSO scheme. Chang and Lee proposed new SSO scheme and claimed its security by providing well organized security arguments. But their scheme is actually insecure as it fails to meet credential privacy and soundness of authentication. Specifically, their scheme suffers from two severe attacks. The first attack allows a malicious service provider, who has successfully communicated with a legal user twice, to recover the users credential and then to impersonate the user to access resources and services offered by other service providers. In another attack, i.e. an outsider attack, by an unauthorized or illegitimate user of the system may be able to enjoy network services freely by impersonating any legal user or a nonexistent user. So to overcome these drawbacks, we propose an improvement to Chang and Lee SSO scheme by making use of efficient symmetric key encryption technique of SERPENT key signatures.

Keywords: Authentication, authorization, distributed computer networks, information security, single sign-on SSO

Edition: Volume 4 Issue 3, March 2015

Pages: 1602 - 1607

Share this Article

How to Cite this Article?

M Durga Prasanna, Roopa S R, "SSO-Key Distribution Center Based Implementation Using Symmetric Encryption Technique for Distributed Network (Securing SSO in Distributed Network)", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152356, Volume 4 Issue 3, March 2015, 1602 - 1607

Enter Your Registered Email Address





Similar Articles with Keyword 'Authentication'

Downloads: 46 | Weekly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 99

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 1760 - 1762

A Survey on Existing Password Storage Methods and their Security

Samruddhi Patil, Kumud Wasnik

Share this Article

Downloads: 100 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Downloads: 100 | Weekly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this Article

Downloads: 100 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Similar Articles with Keyword 'authorization'

Downloads: 100 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Downloads: 102 | Weekly Hits: ⮙3 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2338 - 2340

Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device

Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar

Share this Article

Downloads: 106 | Monthly Hits: ⮙9

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2369 - 2372

Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms

Jaskarandeep Punia, Rajesh Kumar Bawa

Share this Article

Downloads: 107 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 803 - 804

Assessment of Security Vulnerabilities in MANET

Muskan Sharma, Chander Prabha

Share this Article

Downloads: 108 | Weekly Hits: ⮙1 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this Article

Similar Articles with Keyword 'distributed computer networks'

Downloads: 107 | Weekly Hits: ⮙4 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1235 - 1237

Single Sign-on Secure Password Mechanism for Distributed Computer Networks

Deepali M. Devkate, N. D. Kale

Share this Article

Downloads: 110 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1281 - 1284

Enhancing Security and Authentication of Single Sign on Mechanism of Distributed Computer Networks

Bommasani Nagasai, P. Srilatha

Share this Article

Downloads: 112 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1602 - 1607

SSO-Key Distribution Center Based Implementation Using Symmetric Encryption Technique for Distributed Network (Securing SSO in Distributed Network)

M Durga Prasanna, Roopa S R

Share this Article

Downloads: 114 | Weekly Hits: ⮙2 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1235 - 1238

Security Enhancement of Single Sign-On Mechanism for Multiple Service Authentications

Anil. P. Jawalkar, R. Radha

Share this Article

Similar Articles with Keyword 'information security'

Downloads: 99 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Downloads: 101 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 2039 - 2042

Design and Analysis of Information Security for SIS in Prospective of Application Software

Sharanappa Patil, Ramesh.K

Share this Article

Downloads: 105 | Weekly Hits: ⮙2 | Monthly Hits: ⮙7

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 781 - 785

Implementation of Fast Transmission to Remote Cooperative Groups: A New Key Management Scenario in Wireless Sensor Networks

P. Harikrishna, K. V. Srinivasa Rao

Share this Article

Downloads: 105 | Weekly Hits: ⮙5 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1053 - 1061

An Efficient Approach in Protection of Information Security via Collaborative Inference Detection

Abilesh. P

Share this Article



Top