SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 308
CROSS CLOUD SINGLE SIGN ON (SSO) USING TOKENS
Priyanka Patil1
, Snehal S. Talokar2
, Vishakha Gonnade3
, Vaishali Bhagat4
1, 2, 3
Student, Computer Science and Engineering, SRMCEW, Maharashtra, India
4
Lecturer, Information Technology, SRMCEW, Maharashtra, India
Abstract
The cloud computing service provider ensures the security of their services by username/password schemes. Such type of scheme may
be suitable for small personalized services but not for the large scale organizations where employees may require to login for more
than one application related to various clouds. This paper identifies the issues of multiple logins and presents how multiple
applications of various clouds are accessed by single login process securely. Single Sign-On is the mechanism where a user only need
to authenticate him/her self once, then has the ability to access other protected resources without having to re-authenticate. Our
objective is to design the single sign on architecture for more than one cloud’s applications. Due to that client log in only one time at
time and automatically user login in remaining cloud applications and assess successful same process is for log out only user logout
once then user logout properly from the all of the cloud applications. The login audits are done for the security purpose and its
controlling by admin panel. Cloud service providers also neither need to support redundant registration process for new accounts of
applications nor dealing with enormous databases for same user of multiple applications and managing multiple authentication
credentials is annoying for users and as well as for authentication system. In other words, Single sign-on (SSO) is the mechanism
whereby a single action of user authentication and authorization can permit a user to access all computers and systems where that
user has access permission, without the need to enter multiple passwords.
Keywords: Cloud Computing, Password Synchronization, Refreshing Mechanism, Session ID, Tokens.
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
Cloud computing is known as On-Demand computing and one
of the latest emerging topics in IT industry. The cloud
computing provide the services over the internet. The services
include applications, system hardware, collection of resources
on request etc.
Cloud classification is done on their usage mode, if cloud is
available for the general users on pay basis according to their
usage basis then it is called public cloud. If the customer
develops their own applications and run on their own
infrastructure then it is called private cloud. Integration of
these two clouds is called hybrid cloud.
Community cloud shares infrastructure between several
organizations from a specific community with common
concerns whether managed internally or by a third-party and
hosted internally or externally. The costs are spread over
fewer users than a public cloud but more than a private cloud.
The current scenario of web applications forces user to
remember the user credentials which make trouble to
remembering large number of identities and associated
password for the applications. In cloud computing the similar
problem faced by the user. This document gives the
information about the implementation of Single Sign On
(SSO) in cross cloud arrangement.
The following section contains the survey related to the
growth of cloud, security aspect, cloud is the first priority to
the vendors, revenue report, future and current usage, state of
cloud to the IT users and popularity survey of cloud
computing.
1.1 Cloud Growth
The survey conducted by International Data Corporation
(IDC) shows the strength of cloud computing to be
implemented in IT industry and gives the potential inspiration
to CSP. The Table 1 shows the cloud growth from year 2008
to 2012[1].
Table -1: Cloud Growth
Year 2008 2012 Growth
Cloud IT spending $ 16 B $42 B 27%
Total IT spending $383 B $ 494 B 7%
Total-cloud spend $367 B $ 452 B 4%
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 309
1.2 Cloud Security Survey
The following figure indicates that security as first rank
according to IT executives. This information is also collected
from two hundred six three IT professional by asking different
question related to the cloud, and many of the executives are
worried about security perspective of cloud. The Fig. 2.1
shows the survey on security [2].
Fig -1: Cloud security survey
1.3 Objective
The aim of our research is to suggest a design of the single
sign on web application in cross cloud manner. Due to that
client log in only once, at the time of opening first application
and automatically user get login in remaining applications and
access successful without re-authentication process which
makes user free from remembering user credentials.
2. EXISTING SYSTEM
Currently most common authentication approached used by
the cloud service provider is user credentials (i.e. username
and password) which requires each cloud service provider host
its own and separate user management system. The main
problem with this system is that for accessing services of
various cloud service providers user have to register first and
secondly user have to authenticate for each services. Another
problem with the existing system is those users have to
manage individual username/password pair for each cloud
service provider which becomes impractical to expect from
user to remember different user credentials for each
applications.
3. PASSWORD SYNCRONIZATION
The password synchronization is the process of changing each
password for different applications to the same value, so that
the user always enters the same password. Once you
implement password synchronization technique, users will
enter the same password when they login to any of the
synchronized systems, such as to their network, finance
system, e-mail, calendar or the mainframe.
In other words the password synchronisation is the
implementation of same password for each and every
applications or system. But using the same password is the
weakest policy for the security of system [4] where in SSO
only one password is used as similar to password
synchronisation but we can ensure the security by using the
strong policy.
Another important point is that in password synchronisation
[5] user still have to login in each application or system. In
single sign on user needs to login once for the primary
authentication only then user become authorised to access the
all available applications.
Following is the comparative table of password
synchronization and single sign on.
Table -2: Comparison of Password Synchronisation and
Single Sign On
Parameters Password
Synchronization
Single Sign-on
Process It is very simple
process user change
all passwords of
application to the
same password.
User needs to sign in
only one application
using single username
and passwords. Specific
server does the process
of authentication for
remaining applications.
Login
Times
User needs to login
each and every
time, to get access
to applications.
User needs to login only
once.
Manage
Credential
Data
Only management
of password
required.
Specific mechanism is
required for the client
such as refreshing and
validation of tokens.
Password
Policy
For all applications
same password is
the weakest policy.
One strong password is
better than password
synchronization.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 310
4. PROPOSED SYSTEM
In our proposed work the architecture of Single Sign On is
suggested in cross cloud manner. An admin cloud is used to
maintain the login sessions and generating the identifiers for
the each application’s accessing process. The user credentials
are used to form the tokens. The tokens are the encrypted form
of the user credentials and the physical address (machine key)
of the user machine.
The tokens are used under the supervision of admin who
checks the validation of the request send by the user. The
admin works as an access manager. Initially users have to send
the user credentials for the first time login process. Admin
gives token as authorization to get access for the remaining
applications.
The tokens generated by the admin clouds contain session
information about the authorised user. Session is a data
structure in the access manager memory that contains
information about an authorised user. The admin cloud is
responsible for the generation of session identifiers which are
responsible for time dependent behaviours of users.
Fig -2: Scenario of cross cloud single sign on
A security problem occurs in the above scenario is that if user
is not active at the application, another user tries to get access
for another application then admin generate a request to user
asking for the user credentials. The request generation is
refreshing mechanism.
To sign out user just only need to click on sign out logo which
make user to free from the sign out process of individual
applications and destroys all the tokens. The destruction of
tokens stops the use of history recalling from the user side and
inhibit the intruder to use the tokens [3].
5. WORKING
The working of single sign on is performed in the following
manner and illustrated in the figure 3.
1. The user first authenticate for the first application accessing
procedure
2. The authenticated user request another protected application
from another cloud.
3. As the request does not include an app-token, the
application server constructs a request-token which is
encrypted by a session key shared between the applications
cloud and the admin cloud. The user is redirected to the admin
cloud along with the request-token.
Fig -3: Working of single sign on
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 311
4. The admin cloud decrypt the request-token using the
session key and detects the user has a valid token. It constructs
an id-token and then returns URL, which will contain the
response-token, as well as the requested-token.
5. The user is redirected to the original resource, along with
the id-token.
6. The application cloud checks the id-token, rewrites the id-
token into an app-token, and creates an app-token to be placed
into a cookie for future requests.
7. User’s browser saves the app-token cookie; the application
serves the original request to the user.
8. Logging out of an application involves deleting all the
session cookies associated with this application on the server.
6. BENEFITS
The implementation of cross cloud single sign on system
improves the productivity of employee with less time users
spend logging into so many applications and it also reduces
the workload of the helpdesks for recovering the forgotten
passwords. Employee productivity is dramatically improved,
with less time users spend logging into multiple applications
and recovering the forgotten passwords.
Another benefit of this system is that it increases the system
security potentially by the user to choose a single complex and
more secure password instead of using multiple simple and
insecure passwords. SSO effectively reduces the password-
related workload to the helpdesk and lowers the costs
associated with managing passwords across multiple
distributed applications.
7. CONCLUSIONS
In cloud computing, Software as a Service application uses the
username/password scheme for the authentication purpose.
The implementation of private admin cloud with common
database for multiple applications of various clouds can
improve the security and remove the password problem.
The proposed system can also be helpful for all cloud service
provider to get the benefits of secure cross cloud single sign
on and the e-government sector where data sensitivity is very
high, cross cloud SSO helps government employee and users
to handle data of various departments like health, finance,
payment etc.
It is possible to implement the SSO concept which increase
the security level of users who manages passwords manually.
It also enables the user to use more secure passwords
REFERENCES
[1]. Shuai Z; Shufen Z; Xuebin C; Xiuzhen H; “Cloud
Computing Research and Development Trend”, 2nd
International conference on Future Networks, 2010. ICFN '
10.pp 23, 22-24 Jan 2010.
[2]. Chang, L, Ti ; Chin L; Chang, A.Y.; Chun J, C;(2010), “
Information security issue of enterprises adopting the
application of cloud computing”, IEEE 2010 Sixth
International Conference on Networked Computing and
Advanced Information Management (NCM),pp 645, 16-18
Aug. 2010.
[3]. ”Kerberos: The Definitive Guide”, Jason Garman
[4]. Kessler "Passwords - Strengths and Weaknesses", Internet
and Networking Security, Auerbach, 1997.
[5]. M-tech Information Company, “Definition of Password
Synchronization”, 2005
http://mtechit.com/concepts/password_synchronization.html
BIOGRAPHIES
Priyanka Patil has received the Diploma in
the Computer Science And Engineering from
R.G.T.U., Bhopal [M.P.] in 2011 and is
pursuing B.E Degree in C.S.E. from
S.R.M.C.E.W,Nagpur, Maharashtra INDIA.
Her field of interest is Computer Networking & Security.
Snehal S. Talokar, is pursuing B.E Degree in
C.S.E. from S.R.M.C.E.W, Nagpur,
Maharashtra India. Her field of interest is
VB.Net.
Vishakha Gonnade, is pursuing B.E Degree
in C.S.E. from S.R.M.C.E.W, Nagpur,
Maharashtra India. Her field of interest is
Cloud Computing.
Vaishali Bhagat has received the BE Degree
in Information Technology from RTMNU,
Maharashtra, India in 2008 & pursuing M.
Tech in CSE from RTMNU. Since 2010, she
is working in the department of IT as a
lecturer in SRMCEW, Nagpur, and Maharashtra, India.

Mais conteúdo relacionado

Mais procurados

User Identity Verification Using Mouse Signature
User Identity Verification Using Mouse SignatureUser Identity Verification Using Mouse Signature
User Identity Verification Using Mouse SignatureIOSR Journals
 
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARDINTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARDIJCI JOURNAL
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Editor IJCATR
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...IJERA Editor
 
Secure Internet Voting System
Secure Internet Voting SystemSecure Internet Voting System
Secure Internet Voting Systemtheijes
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication ModelsRaj Chanchal
 
Security for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIsSecurity for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIsidescitation
 
IRJET - Scrutinize the Utility of Preserved Data with Privacy
IRJET -  	  Scrutinize the Utility of Preserved Data with PrivacyIRJET -  	  Scrutinize the Utility of Preserved Data with Privacy
IRJET - Scrutinize the Utility of Preserved Data with PrivacyIRJET Journal
 
Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...1crore projects
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET Journal
 
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conferenceSIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conferenceRichard Tong
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET Journal
 
Prevention of SQL injection in E- Commerce
Prevention of SQL injection in E- CommercePrevention of SQL injection in E- Commerce
Prevention of SQL injection in E- Commerceijceronline
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Remote Exploitation of the Dropbox SDK for Android
Remote Exploitation of the Dropbox SDK for AndroidRemote Exploitation of the Dropbox SDK for Android
Remote Exploitation of the Dropbox SDK for AndroidIBM Security
 
SpoofedMe - Intruding Accounts using Social Login Providers
SpoofedMe - Intruding Accounts using Social Login Providers SpoofedMe - Intruding Accounts using Social Login Providers
SpoofedMe - Intruding Accounts using Social Login Providers IBM Security
 

Mais procurados (19)

User Identity Verification Using Mouse Signature
User Identity Verification Using Mouse SignatureUser Identity Verification Using Mouse Signature
User Identity Verification Using Mouse Signature
 
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARDINTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
 
Secure Internet Voting System
Secure Internet Voting SystemSecure Internet Voting System
Secure Internet Voting System
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication Models
 
Security for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIsSecurity for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIs
 
IRJET - Scrutinize the Utility of Preserved Data with Privacy
IRJET -  	  Scrutinize the Utility of Preserved Data with PrivacyIRJET -  	  Scrutinize the Utility of Preserved Data with Privacy
IRJET - Scrutinize the Utility of Preserved Data with Privacy
 
Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conferenceSIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
 
Prevention of SQL injection in E- Commerce
Prevention of SQL injection in E- CommercePrevention of SQL injection in E- Commerce
Prevention of SQL injection in E- Commerce
 
SQL injection
SQL injectionSQL injection
SQL injection
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Remote Exploitation of the Dropbox SDK for Android
Remote Exploitation of the Dropbox SDK for AndroidRemote Exploitation of the Dropbox SDK for Android
Remote Exploitation of the Dropbox SDK for Android
 
SpoofedMe - Intruding Accounts using Social Login Providers
SpoofedMe - Intruding Accounts using Social Login Providers SpoofedMe - Intruding Accounts using Social Login Providers
SpoofedMe - Intruding Accounts using Social Login Providers
 

Destaque

Experimental study on corrosion prevention with rebars along with fibre in r ...
Experimental study on corrosion prevention with rebars along with fibre in r ...Experimental study on corrosion prevention with rebars along with fibre in r ...
Experimental study on corrosion prevention with rebars along with fibre in r ...eSAT Journals
 
Comparative studies on heat transfer and fluid flow in cored brick and pebble...
Comparative studies on heat transfer and fluid flow in cored brick and pebble...Comparative studies on heat transfer and fluid flow in cored brick and pebble...
Comparative studies on heat transfer and fluid flow in cored brick and pebble...eSAT Journals
 
Zigbee based differential pilot protection of transmission line
Zigbee based differential pilot protection of transmission lineZigbee based differential pilot protection of transmission line
Zigbee based differential pilot protection of transmission lineeSAT Journals
 
Distributed dynamic frequency allocation in wireless cellular networks using ...
Distributed dynamic frequency allocation in wireless cellular networks using ...Distributed dynamic frequency allocation in wireless cellular networks using ...
Distributed dynamic frequency allocation in wireless cellular networks using ...eSAT Journals
 
Wi play audio streaming over wi-fi
Wi play  audio streaming over wi-fiWi play  audio streaming over wi-fi
Wi play audio streaming over wi-fieSAT Journals
 
Counter based design of dpll for wireless communication
Counter based design of dpll for wireless communicationCounter based design of dpll for wireless communication
Counter based design of dpll for wireless communicationeSAT Journals
 
Virtual’s culture based information technology
Virtual’s culture based information technologyVirtual’s culture based information technology
Virtual’s culture based information technologyeSAT Journals
 
Performance analysis of voip over wired and wireless networks network impleme...
Performance analysis of voip over wired and wireless networks network impleme...Performance analysis of voip over wired and wireless networks network impleme...
Performance analysis of voip over wired and wireless networks network impleme...eSAT Journals
 
Live multimedia streaming and video on demand issues and challenges
Live multimedia streaming and video on demand issues and challengesLive multimedia streaming and video on demand issues and challenges
Live multimedia streaming and video on demand issues and challengeseSAT Journals
 
Real time implemantion of stc and ftc radar system based on fpga
Real time implemantion of stc and ftc radar system based on fpgaReal time implemantion of stc and ftc radar system based on fpga
Real time implemantion of stc and ftc radar system based on fpgaeSAT Journals
 
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...Behaviour of bituminous concrete modified with polyethylene glycol for blade ...
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...eSAT Journals
 
Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...
Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...
Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...eSAT Journals
 
An intrusion detection model based on fuzzy membership function using gnp
An intrusion detection model based on fuzzy membership function using gnpAn intrusion detection model based on fuzzy membership function using gnp
An intrusion detection model based on fuzzy membership function using gnpeSAT Journals
 
Corrosion characteristics of al 0.91 mg-0.55si-1.12fe-0.39ca al-alloy aged at...
Corrosion characteristics of al 0.91 mg-0.55si-1.12fe-0.39ca al-alloy aged at...Corrosion characteristics of al 0.91 mg-0.55si-1.12fe-0.39ca al-alloy aged at...
Corrosion characteristics of al 0.91 mg-0.55si-1.12fe-0.39ca al-alloy aged at...eSAT Journals
 
Measurement systems analysis and a study of anova method
Measurement systems analysis and a study of anova methodMeasurement systems analysis and a study of anova method
Measurement systems analysis and a study of anova methodeSAT Journals
 
Automatic vision based inspection of railway track
Automatic vision based inspection of railway trackAutomatic vision based inspection of railway track
Automatic vision based inspection of railway trackeSAT Journals
 
Occupational health and safety (ohs) management vis à-vis different phases of...
Occupational health and safety (ohs) management vis à-vis different phases of...Occupational health and safety (ohs) management vis à-vis different phases of...
Occupational health and safety (ohs) management vis à-vis different phases of...eSAT Journals
 
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...eSAT Journals
 

Destaque (18)

Experimental study on corrosion prevention with rebars along with fibre in r ...
Experimental study on corrosion prevention with rebars along with fibre in r ...Experimental study on corrosion prevention with rebars along with fibre in r ...
Experimental study on corrosion prevention with rebars along with fibre in r ...
 
Comparative studies on heat transfer and fluid flow in cored brick and pebble...
Comparative studies on heat transfer and fluid flow in cored brick and pebble...Comparative studies on heat transfer and fluid flow in cored brick and pebble...
Comparative studies on heat transfer and fluid flow in cored brick and pebble...
 
Zigbee based differential pilot protection of transmission line
Zigbee based differential pilot protection of transmission lineZigbee based differential pilot protection of transmission line
Zigbee based differential pilot protection of transmission line
 
Distributed dynamic frequency allocation in wireless cellular networks using ...
Distributed dynamic frequency allocation in wireless cellular networks using ...Distributed dynamic frequency allocation in wireless cellular networks using ...
Distributed dynamic frequency allocation in wireless cellular networks using ...
 
Wi play audio streaming over wi-fi
Wi play  audio streaming over wi-fiWi play  audio streaming over wi-fi
Wi play audio streaming over wi-fi
 
Counter based design of dpll for wireless communication
Counter based design of dpll for wireless communicationCounter based design of dpll for wireless communication
Counter based design of dpll for wireless communication
 
Virtual’s culture based information technology
Virtual’s culture based information technologyVirtual’s culture based information technology
Virtual’s culture based information technology
 
Performance analysis of voip over wired and wireless networks network impleme...
Performance analysis of voip over wired and wireless networks network impleme...Performance analysis of voip over wired and wireless networks network impleme...
Performance analysis of voip over wired and wireless networks network impleme...
 
Live multimedia streaming and video on demand issues and challenges
Live multimedia streaming and video on demand issues and challengesLive multimedia streaming and video on demand issues and challenges
Live multimedia streaming and video on demand issues and challenges
 
Real time implemantion of stc and ftc radar system based on fpga
Real time implemantion of stc and ftc radar system based on fpgaReal time implemantion of stc and ftc radar system based on fpga
Real time implemantion of stc and ftc radar system based on fpga
 
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...Behaviour of bituminous concrete modified with polyethylene glycol for blade ...
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...
 
Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...
Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...
Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...
 
An intrusion detection model based on fuzzy membership function using gnp
An intrusion detection model based on fuzzy membership function using gnpAn intrusion detection model based on fuzzy membership function using gnp
An intrusion detection model based on fuzzy membership function using gnp
 
Corrosion characteristics of al 0.91 mg-0.55si-1.12fe-0.39ca al-alloy aged at...
Corrosion characteristics of al 0.91 mg-0.55si-1.12fe-0.39ca al-alloy aged at...Corrosion characteristics of al 0.91 mg-0.55si-1.12fe-0.39ca al-alloy aged at...
Corrosion characteristics of al 0.91 mg-0.55si-1.12fe-0.39ca al-alloy aged at...
 
Measurement systems analysis and a study of anova method
Measurement systems analysis and a study of anova methodMeasurement systems analysis and a study of anova method
Measurement systems analysis and a study of anova method
 
Automatic vision based inspection of railway track
Automatic vision based inspection of railway trackAutomatic vision based inspection of railway track
Automatic vision based inspection of railway track
 
Occupational health and safety (ohs) management vis à-vis different phases of...
Occupational health and safety (ohs) management vis à-vis different phases of...Occupational health and safety (ohs) management vis à-vis different phases of...
Occupational health and safety (ohs) management vis à-vis different phases of...
 
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
 

Semelhante a Cross cloud single sign on (sso) using tokens

Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkIJERA Editor
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONSANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONSijistjournal
 
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Conference Papers
 
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Conference Papers
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesHitachi ID Systems, Inc.
 
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET Journal
 
Secure multiple bank transaction log a case study
Secure multiple bank transaction log a case studySecure multiple bank transaction log a case study
Secure multiple bank transaction log a case studyeSAT Publishing House
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET Journal
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM csandit
 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMIJNSA Journal
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationeSAT Journals
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationseSAT Publishing House
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computingeSAT Publishing House
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth TechnologyIRJET Journal
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET Journal
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
 

Semelhante a Cross cloud single sign on (sso) using tokens (20)

International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed Network
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONSANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
 
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...
 
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
 
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
 
Secure multiple bank transaction log a case study
Secure multiple bank transaction log a case studySecure multiple bank transaction log a case study
Secure multiple bank transaction log a case study
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth Technology
 
publishable paper
publishable paperpublishable paper
publishable paper
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate System
 
J017325660
J017325660J017325660
J017325660
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 

Mais de eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

Mais de eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Último

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Último (20)

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 

Cross cloud single sign on (sso) using tokens

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 308 CROSS CLOUD SINGLE SIGN ON (SSO) USING TOKENS Priyanka Patil1 , Snehal S. Talokar2 , Vishakha Gonnade3 , Vaishali Bhagat4 1, 2, 3 Student, Computer Science and Engineering, SRMCEW, Maharashtra, India 4 Lecturer, Information Technology, SRMCEW, Maharashtra, India Abstract The cloud computing service provider ensures the security of their services by username/password schemes. Such type of scheme may be suitable for small personalized services but not for the large scale organizations where employees may require to login for more than one application related to various clouds. This paper identifies the issues of multiple logins and presents how multiple applications of various clouds are accessed by single login process securely. Single Sign-On is the mechanism where a user only need to authenticate him/her self once, then has the ability to access other protected resources without having to re-authenticate. Our objective is to design the single sign on architecture for more than one cloud’s applications. Due to that client log in only one time at time and automatically user login in remaining cloud applications and assess successful same process is for log out only user logout once then user logout properly from the all of the cloud applications. The login audits are done for the security purpose and its controlling by admin panel. Cloud service providers also neither need to support redundant registration process for new accounts of applications nor dealing with enormous databases for same user of multiple applications and managing multiple authentication credentials is annoying for users and as well as for authentication system. In other words, Single sign-on (SSO) is the mechanism whereby a single action of user authentication and authorization can permit a user to access all computers and systems where that user has access permission, without the need to enter multiple passwords. Keywords: Cloud Computing, Password Synchronization, Refreshing Mechanism, Session ID, Tokens. ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION Cloud computing is known as On-Demand computing and one of the latest emerging topics in IT industry. The cloud computing provide the services over the internet. The services include applications, system hardware, collection of resources on request etc. Cloud classification is done on their usage mode, if cloud is available for the general users on pay basis according to their usage basis then it is called public cloud. If the customer develops their own applications and run on their own infrastructure then it is called private cloud. Integration of these two clouds is called hybrid cloud. Community cloud shares infrastructure between several organizations from a specific community with common concerns whether managed internally or by a third-party and hosted internally or externally. The costs are spread over fewer users than a public cloud but more than a private cloud. The current scenario of web applications forces user to remember the user credentials which make trouble to remembering large number of identities and associated password for the applications. In cloud computing the similar problem faced by the user. This document gives the information about the implementation of Single Sign On (SSO) in cross cloud arrangement. The following section contains the survey related to the growth of cloud, security aspect, cloud is the first priority to the vendors, revenue report, future and current usage, state of cloud to the IT users and popularity survey of cloud computing. 1.1 Cloud Growth The survey conducted by International Data Corporation (IDC) shows the strength of cloud computing to be implemented in IT industry and gives the potential inspiration to CSP. The Table 1 shows the cloud growth from year 2008 to 2012[1]. Table -1: Cloud Growth Year 2008 2012 Growth Cloud IT spending $ 16 B $42 B 27% Total IT spending $383 B $ 494 B 7% Total-cloud spend $367 B $ 452 B 4%
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 309 1.2 Cloud Security Survey The following figure indicates that security as first rank according to IT executives. This information is also collected from two hundred six three IT professional by asking different question related to the cloud, and many of the executives are worried about security perspective of cloud. The Fig. 2.1 shows the survey on security [2]. Fig -1: Cloud security survey 1.3 Objective The aim of our research is to suggest a design of the single sign on web application in cross cloud manner. Due to that client log in only once, at the time of opening first application and automatically user get login in remaining applications and access successful without re-authentication process which makes user free from remembering user credentials. 2. EXISTING SYSTEM Currently most common authentication approached used by the cloud service provider is user credentials (i.e. username and password) which requires each cloud service provider host its own and separate user management system. The main problem with this system is that for accessing services of various cloud service providers user have to register first and secondly user have to authenticate for each services. Another problem with the existing system is those users have to manage individual username/password pair for each cloud service provider which becomes impractical to expect from user to remember different user credentials for each applications. 3. PASSWORD SYNCRONIZATION The password synchronization is the process of changing each password for different applications to the same value, so that the user always enters the same password. Once you implement password synchronization technique, users will enter the same password when they login to any of the synchronized systems, such as to their network, finance system, e-mail, calendar or the mainframe. In other words the password synchronisation is the implementation of same password for each and every applications or system. But using the same password is the weakest policy for the security of system [4] where in SSO only one password is used as similar to password synchronisation but we can ensure the security by using the strong policy. Another important point is that in password synchronisation [5] user still have to login in each application or system. In single sign on user needs to login once for the primary authentication only then user become authorised to access the all available applications. Following is the comparative table of password synchronization and single sign on. Table -2: Comparison of Password Synchronisation and Single Sign On Parameters Password Synchronization Single Sign-on Process It is very simple process user change all passwords of application to the same password. User needs to sign in only one application using single username and passwords. Specific server does the process of authentication for remaining applications. Login Times User needs to login each and every time, to get access to applications. User needs to login only once. Manage Credential Data Only management of password required. Specific mechanism is required for the client such as refreshing and validation of tokens. Password Policy For all applications same password is the weakest policy. One strong password is better than password synchronization.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 310 4. PROPOSED SYSTEM In our proposed work the architecture of Single Sign On is suggested in cross cloud manner. An admin cloud is used to maintain the login sessions and generating the identifiers for the each application’s accessing process. The user credentials are used to form the tokens. The tokens are the encrypted form of the user credentials and the physical address (machine key) of the user machine. The tokens are used under the supervision of admin who checks the validation of the request send by the user. The admin works as an access manager. Initially users have to send the user credentials for the first time login process. Admin gives token as authorization to get access for the remaining applications. The tokens generated by the admin clouds contain session information about the authorised user. Session is a data structure in the access manager memory that contains information about an authorised user. The admin cloud is responsible for the generation of session identifiers which are responsible for time dependent behaviours of users. Fig -2: Scenario of cross cloud single sign on A security problem occurs in the above scenario is that if user is not active at the application, another user tries to get access for another application then admin generate a request to user asking for the user credentials. The request generation is refreshing mechanism. To sign out user just only need to click on sign out logo which make user to free from the sign out process of individual applications and destroys all the tokens. The destruction of tokens stops the use of history recalling from the user side and inhibit the intruder to use the tokens [3]. 5. WORKING The working of single sign on is performed in the following manner and illustrated in the figure 3. 1. The user first authenticate for the first application accessing procedure 2. The authenticated user request another protected application from another cloud. 3. As the request does not include an app-token, the application server constructs a request-token which is encrypted by a session key shared between the applications cloud and the admin cloud. The user is redirected to the admin cloud along with the request-token. Fig -3: Working of single sign on
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 311 4. The admin cloud decrypt the request-token using the session key and detects the user has a valid token. It constructs an id-token and then returns URL, which will contain the response-token, as well as the requested-token. 5. The user is redirected to the original resource, along with the id-token. 6. The application cloud checks the id-token, rewrites the id- token into an app-token, and creates an app-token to be placed into a cookie for future requests. 7. User’s browser saves the app-token cookie; the application serves the original request to the user. 8. Logging out of an application involves deleting all the session cookies associated with this application on the server. 6. BENEFITS The implementation of cross cloud single sign on system improves the productivity of employee with less time users spend logging into so many applications and it also reduces the workload of the helpdesks for recovering the forgotten passwords. Employee productivity is dramatically improved, with less time users spend logging into multiple applications and recovering the forgotten passwords. Another benefit of this system is that it increases the system security potentially by the user to choose a single complex and more secure password instead of using multiple simple and insecure passwords. SSO effectively reduces the password- related workload to the helpdesk and lowers the costs associated with managing passwords across multiple distributed applications. 7. CONCLUSIONS In cloud computing, Software as a Service application uses the username/password scheme for the authentication purpose. The implementation of private admin cloud with common database for multiple applications of various clouds can improve the security and remove the password problem. The proposed system can also be helpful for all cloud service provider to get the benefits of secure cross cloud single sign on and the e-government sector where data sensitivity is very high, cross cloud SSO helps government employee and users to handle data of various departments like health, finance, payment etc. It is possible to implement the SSO concept which increase the security level of users who manages passwords manually. It also enables the user to use more secure passwords REFERENCES [1]. Shuai Z; Shufen Z; Xuebin C; Xiuzhen H; “Cloud Computing Research and Development Trend”, 2nd International conference on Future Networks, 2010. ICFN ' 10.pp 23, 22-24 Jan 2010. [2]. Chang, L, Ti ; Chin L; Chang, A.Y.; Chun J, C;(2010), “ Information security issue of enterprises adopting the application of cloud computing”, IEEE 2010 Sixth International Conference on Networked Computing and Advanced Information Management (NCM),pp 645, 16-18 Aug. 2010. [3]. ”Kerberos: The Definitive Guide”, Jason Garman [4]. Kessler "Passwords - Strengths and Weaknesses", Internet and Networking Security, Auerbach, 1997. [5]. M-tech Information Company, “Definition of Password Synchronization”, 2005 http://mtechit.com/concepts/password_synchronization.html BIOGRAPHIES Priyanka Patil has received the Diploma in the Computer Science And Engineering from R.G.T.U., Bhopal [M.P.] in 2011 and is pursuing B.E Degree in C.S.E. from S.R.M.C.E.W,Nagpur, Maharashtra INDIA. Her field of interest is Computer Networking & Security. Snehal S. Talokar, is pursuing B.E Degree in C.S.E. from S.R.M.C.E.W, Nagpur, Maharashtra India. Her field of interest is VB.Net. Vishakha Gonnade, is pursuing B.E Degree in C.S.E. from S.R.M.C.E.W, Nagpur, Maharashtra India. Her field of interest is Cloud Computing. Vaishali Bhagat has received the BE Degree in Information Technology from RTMNU, Maharashtra, India in 2008 & pursuing M. Tech in CSE from RTMNU. Since 2010, she is working in the department of IT as a lecturer in SRMCEW, Nagpur, and Maharashtra, India.