Downloading: Security Enhancement of Single Sign-On Mechanism for Multiple Service Authentications
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



To prevent Server Overload, Your Article PDF will be Downloaded in Next Seconds

Security Enhancement of Single Sign-On Mechanism for Multiple Service Authentications

Anil. P. Jawalkar, R. Radha

Abstract: In this paper, permit users to sign on only once and have their identities automatically verified by each application or service they desire to access afterwards. There are lots of practical and secure single sign-on mechanisms even though it is of remarkable significance to current distributed application environments. The majorities of application architectures involve the user to memorized and utilize a different set of credentials (eg, username/password or tokens) for each application he/she wants to open. In this method is uneconomical and insecure with the exponential growth in the number of applications and services a user has to retrieve both inside corporative environments and at the internet. The Single sign-on is a novel authentication method that allows a authorized user with a single credential to be authenticated by multiple service providers in distributed computer networks. In this paper we projected a new single sign-on scheme and state its security by supplying well-organized security arguments. In this paper shows the Chang & Lee scheme and it intend to improve security using RSA encryption and decryption. Recognition of user is an important access control method for clientserver networking architectures. The goal of a single sign on policy is to eradicate individual sign on procedures by centralizing user authentication and identity management at a central identity provider. In this paper a SSO the user should flawlessly authenticated to his multiple user accounts once he verify his identity to the identity provider.

Keywords: Security



Top