SlideShare une entreprise Scribd logo
1  sur  37
A Combination of Multi Factor Authentication and Single Sign-on Event to Improve Security for Ubiquitous Desktops in Virtual and Cloud Computing Environment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4/14/2010
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],4/14/2010
Existing System And Objective ,[object Object],[object Object],[object Object],[object Object],[object Object],4/14/2010
Proposed System ,[object Object],[object Object],[object Object],[object Object],[object Object],4/14/2010
Design and Relationship Figure 3 Relationships between Ubiquitous Desktop and Thin Clients Figure 2 Access of Multiple Services 4/14/2010
Proposed System Architecture 4/14/2010
Sequence of Modules and Implementation ,[object Object],[object Object],[object Object],[object Object],4/14/2010
System Design UML Diagrams ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4/14/2010
Activity Diagram 4/14/2010
Use Case Diagram 4/14/2010
Sequence Diagram 1 4/14/2010
Sequence Diagram 2 4/14/2010
Collaboration Diagram 1 4/14/2010
Collaboration Diagram 2 4/14/2010
Class Diagram 4/14/2010
System Specification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4/14/2010
Module 1 - Virtual Systems and Virtual Networking Environment Setup for Cloud Computing using VMWare Workstation ,[object Object],[object Object],[object Object],[object Object],[object Object],4/14/2010
Implementation – Module 1 4/14/2010
Module 2  - Enabling Access and profile creation for the users using LDAP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4/14/2010
Implementation – Module 2 4/14/2010
Module 3   - Enabling Permissions and Accesses for LDAP Users with SUDO  ,[object Object],[object Object],[object Object],4/14/2010
Implementation – Module 3 4/14/2010
Module 4  - Setting up Kerberos Server and Clients for Multifactor authentication and Single Sign on Event ,[object Object],[object Object],[object Object],[object Object],[object Object],4/14/2010
Module 4 - Continued....... ,[object Object],[object Object],[object Object],[object Object],[object Object],4/14/2010
Implementation – Module 4 4/14/2010
Working of the project 4/14/2010
Testing Conditions ,[object Object],[object Object],[object Object],[object Object],[object Object],4/14/2010
Testing – Case 1 – Network Connectivity and DNS Testing 4/14/2010
Testing – Case 2 – Wrong Username or Password Testing 4/14/2010
Testing – Case 3 – Sudo Permissions Testing 4/14/2010
Testing – Case 4 – Ticket Expiry and Time Skew Testing 4/14/2010
Testing – Case 4 – Ticket Expiry and Time Skew Testing 4/14/2010
Conclusion ,[object Object],[object Object],4/14/2010
Future Enhancements and Possibilities ,[object Object],[object Object],[object Object],4/14/2010
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4/14/2010
Thank You 4/14/2010

Contenu connexe

Tendances

Middleware Basics
Middleware BasicsMiddleware Basics
Middleware Basics
Varun Arora
 
An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution
Conference Papers
 
Distributed Systems Architecture in Software Engineering SE11
Distributed Systems Architecture in Software Engineering SE11Distributed Systems Architecture in Software Engineering SE11
Distributed Systems Architecture in Software Engineering SE11
koolkampus
 

Tendances (19)

Middleware Basics
Middleware BasicsMiddleware Basics
Middleware Basics
 
An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution
 
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
 
Middleware Technologies ppt
Middleware Technologies pptMiddleware Technologies ppt
Middleware Technologies ppt
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
middleware
middlewaremiddleware
middleware
 
Debakshi_Chakraborty _CV
Debakshi_Chakraborty _CVDebakshi_Chakraborty _CV
Debakshi_Chakraborty _CV
 
MOM - Message Oriented Middleware
MOM - Message Oriented MiddlewareMOM - Message Oriented Middleware
MOM - Message Oriented Middleware
 
Live migration using checkpoint and restore in userspace (CRIU): Usage analys...
Live migration using checkpoint and restore in userspace (CRIU): Usage analys...Live migration using checkpoint and restore in userspace (CRIU): Usage analys...
Live migration using checkpoint and restore in userspace (CRIU): Usage analys...
 
Project report on mesh hybrid topology network vision
Project report on mesh hybrid topology network visionProject report on mesh hybrid topology network vision
Project report on mesh hybrid topology network vision
 
Cc unit 3 updated version
Cc unit 3 updated versionCc unit 3 updated version
Cc unit 3 updated version
 
network administration directory access and remote access
network administration directory access and remote accessnetwork administration directory access and remote access
network administration directory access and remote access
 
Live multimedia streaming and video on demand issues and challenges
Live multimedia streaming and video on demand issues and challengesLive multimedia streaming and video on demand issues and challenges
Live multimedia streaming and video on demand issues and challenges
 
Cc unit 1 updated
Cc unit 1 updatedCc unit 1 updated
Cc unit 1 updated
 
Cc unit 2 updated
Cc unit 2 updatedCc unit 2 updated
Cc unit 2 updated
 
Distributed computing environment
Distributed computing environmentDistributed computing environment
Distributed computing environment
 
Module 3-cloud computing
Module 3-cloud computingModule 3-cloud computing
Module 3-cloud computing
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
 
Distributed Systems Architecture in Software Engineering SE11
Distributed Systems Architecture in Software Engineering SE11Distributed Systems Architecture in Software Engineering SE11
Distributed Systems Architecture in Software Engineering SE11
 

En vedette

Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized Deduplication
Prem Rao
 
Alice & bob public key cryptography 101
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101
Joshua Thijssen
 
Alice & bob public key cryptography 101
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101
Joshua Thijssen
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
koolkampus
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
Adz91 Digital Ads Pvt Ltd
 
Kerberos Authentication Process In Windows
Kerberos Authentication Process In WindowsKerberos Authentication Process In Windows
Kerberos Authentication Process In Windows
niteshitimpulse
 
E authentication template 050212
E authentication template 050212E authentication template 050212
E authentication template 050212
GovCloud Network
 

En vedette (20)

Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized Deduplication
 
Alice & bob public key cryptography 101
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101
 
Hybrid encryption
Hybrid encryption Hybrid encryption
Hybrid encryption
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Alice & bob public key cryptography 101
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Kerberos Authentication Process In Windows
Kerberos Authentication Process In WindowsKerberos Authentication Process In Windows
Kerberos Authentication Process In Windows
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
SCWCD : Secure web
SCWCD : Secure webSCWCD : Secure web
SCWCD : Secure web
 
Hybrid Cryptography with examples in Ruby and Go
Hybrid Cryptography with examples in Ruby and GoHybrid Cryptography with examples in Ruby and Go
Hybrid Cryptography with examples in Ruby and Go
 
E authentication template 050212
E authentication template 050212E authentication template 050212
E authentication template 050212
 
Rails as iOS Application Backend
Rails as iOS Application BackendRails as iOS Application Backend
Rails as iOS Application Backend
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...
 

Similaire à Project

A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
 

Similaire à Project (20)

Extending WebDriver: A cloud approach
Extending WebDriver: A cloud approachExtending WebDriver: A cloud approach
Extending WebDriver: A cloud approach
 
Ijetcas14 424
Ijetcas14 424Ijetcas14 424
Ijetcas14 424
 
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud Environment
 
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGEPRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocol
 
Session 4: Fortgeschrittene Themen
Session 4: Fortgeschrittene ThemenSession 4: Fortgeschrittene Themen
Session 4: Fortgeschrittene Themen
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
Isolation of vm
Isolation of vmIsolation of vm
Isolation of vm
 
A Multi-tenant Architecture for Business Process Executions
A Multi-tenant Architecture for Business Process ExecutionsA Multi-tenant Architecture for Business Process Executions
A Multi-tenant Architecture for Business Process Executions
 
A Multi-tenant Architecture for Business Process Execution
A Multi-tenant Architecture for Business Process ExecutionA Multi-tenant Architecture for Business Process Execution
A Multi-tenant Architecture for Business Process Execution
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 

Project