Open Access Open Access  Restricted Access Subscription or Fee Access

Security Framework for Single Sign-on in Cloud

Punit J. Teraiya

Abstract


Cloud is a leading technology used in current IT environment. Single sign-on allows users to enter their credentials one time to access multiple services. So authentication is main aspect for single sign-on and it must be more secured. Normally authentication is provided by only entering username and password but it is not sufficient because it is not secured to avoid brute-force attack, reply attack, etc. So we have designed a model for authentication which supports multi-level authentication process. In first step it is as normal authentication and then in next multi-level for authentication like pattern-matching and OTP on registered mobile.

Keywords


Cloud, Single Sign-on, Authentication

Full Text:

PDF

References


Introduction to SingleSign on, available at http://www.techopedia.com/definition/4106/single-sign-on-sso

HA Dinesha and VK Agrawal. Multi-level authentication technique for accessing cloud services. In Computing, Communication and Applications (ICCCA), 2012 International Conference on, pages 1{4. IEEE, 2012.

http://www.authenticationworld.com/Single-Sign-On-Authentication/

Ms. Shilpi Harnal Deepak Bagga. Single sign-on authentication model for cloud computing using kerberos. 2013.

Maninder Singh and Sarbjeet Singh. Design and implementation of multi-tier authentication scheme in cloud. International Journal of Computer Science Issues (IJCSI), 9(5), 2012.

Sanjeet Kumar Nayak, Subasish Mohapatra, and Banshidhar Majhi. An improved mutual authentication framework for cloud computing. International Journal of Computer Applications, 52, 2012.

Ashish G Revar and Madhuri D Bhavsar. Securing user authentication using single sign-on in cloud computing. In Engineering (NUiCONE), 2011 Nirma University International Conference on, pages 1{4. IEEE, 2011.

Prashant Srivastava, Satyam Singh, Ashwin Alfred Pinto, Shvetank Verma, Vijay K Chaurasiya, and Rahul Gupta. An architecture based on proactive model for security in cloud computing. In Recent Trends in Information Technology (ICRTIT), 2011 International Conference on, pages 661{666. IEEE, 2011.

Wenjun Zhang. 2-tier cloud architecture with maximized ria and simpledb via minimized rest. In Computer Engineering and Technology (ICCET), 2010 2nd International Conference on, volume 6, pages V6{52. IEEE, 2010.

Ali A Yassin, Hai Jin, Ayad Ibrahim, and Deqing Zou. Anonymous password authentication scheme by using digital signature and ngerprint in cloud computing. In Cloud and Green Computing (CGC), 2012 Second International Conference on, pages 282{289. IEEE, 2012.

Sanjeet Kumar Nayak, SubasishMohapatra, and BanshidharMajhi. An improved mutual authentication framework for cloud computing.International Journal of Computer Applications, 52, 2012.

Charles Miller. Password recovery. http://fishbowl.pastiche.org/ archives/docs/PasswordRecovery.pdf.

Google account recovery. https://accounts.google.com/RecoverAccount.

Peter Mell and Timothy Grance. The nist de nition of cloud computing (draft). NIST special publication, 800(145):7, 2011.

http://searchcloudcomputing.techtarget.com/definition/cloud-computing


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.