SlideShare a Scribd company logo
1 of 4
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 308
CROSS CLOUD SINGLE SIGN ON (SSO) USING TOKENS
Priyanka Patil1
, Snehal S. Talokar2
, Vishakha Gonnade3
, Vaishali Bhagat4
1, 2, 3
Student, Computer Science and Engineering, SRMCEW, Maharashtra, India
4
Lecturer, Information Technology, SRMCEW, Maharashtra, India
Abstract
The cloud computing service provider ensures the security of their services by username/password schemes. Such type of scheme may
be suitable for small personalized services but not for the large scale organizations where employees may require to login for more
than one application related to various clouds. This paper identifies the issues of multiple logins and presents how multiple
applications of various clouds are accessed by single login process securely. Single Sign-On is the mechanism where a user only need
to authenticate him/her self once, then has the ability to access other protected resources without having to re-authenticate. Our
objective is to design the single sign on architecture for more than one cloud’s applications. Due to that client log in only one time at
time and automatically user login in remaining cloud applications and assess successful same process is for log out only user logout
once then user logout properly from the all of the cloud applications. The login audits are done for the security purpose and its
controlling by admin panel. Cloud service providers also neither need to support redundant registration process for new accounts of
applications nor dealing with enormous databases for same user of multiple applications and managing multiple authentication
credentials is annoying for users and as well as for authentication system. In other words, Single sign-on (SSO) is the mechanism
whereby a single action of user authentication and authorization can permit a user to access all computers and systems where that
user has access permission, without the need to enter multiple passwords.
Keywords: Cloud Computing, Password Synchronization, Refreshing Mechanism, Session ID, Tokens.
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
Cloud computing is known as On-Demand computing and one
of the latest emerging topics in IT industry. The cloud
computing provide the services over the internet. The services
include applications, system hardware, collection of resources
on request etc.
Cloud classification is done on their usage mode, if cloud is
available for the general users on pay basis according to their
usage basis then it is called public cloud. If the customer
develops their own applications and run on their own
infrastructure then it is called private cloud. Integration of
these two clouds is called hybrid cloud.
Community cloud shares infrastructure between several
organizations from a specific community with common
concerns whether managed internally or by a third-party and
hosted internally or externally. The costs are spread over
fewer users than a public cloud but more than a private cloud.
The current scenario of web applications forces user to
remember the user credentials which make trouble to
remembering large number of identities and associated
password for the applications. In cloud computing the similar
problem faced by the user. This document gives the
information about the implementation of Single Sign On
(SSO) in cross cloud arrangement.
The following section contains the survey related to the
growth of cloud, security aspect, cloud is the first priority to
the vendors, revenue report, future and current usage, state of
cloud to the IT users and popularity survey of cloud
computing.
1.1 Cloud Growth
The survey conducted by International Data Corporation
(IDC) shows the strength of cloud computing to be
implemented in IT industry and gives the potential inspiration
to CSP. The Table 1 shows the cloud growth from year 2008
to 2012[1].
Table -1: Cloud Growth
Year 2008 2012 Growth
Cloud IT spending $ 16 B $42 B 27%
Total IT spending $383 B $ 494 B 7%
Total-cloud spend $367 B $ 452 B 4%
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 309
1.2 Cloud Security Survey
The following figure indicates that security as first rank
according to IT executives. This information is also collected
from two hundred six three IT professional by asking different
question related to the cloud, and many of the executives are
worried about security perspective of cloud. The Fig. 2.1
shows the survey on security [2].
Fig -1: Cloud security survey
1.3 Objective
The aim of our research is to suggest a design of the single
sign on web application in cross cloud manner. Due to that
client log in only once, at the time of opening first application
and automatically user get login in remaining applications and
access successful without re-authentication process which
makes user free from remembering user credentials.
2. EXISTING SYSTEM
Currently most common authentication approached used by
the cloud service provider is user credentials (i.e. username
and password) which requires each cloud service provider host
its own and separate user management system. The main
problem with this system is that for accessing services of
various cloud service providers user have to register first and
secondly user have to authenticate for each services. Another
problem with the existing system is those users have to
manage individual username/password pair for each cloud
service provider which becomes impractical to expect from
user to remember different user credentials for each
applications.
3. PASSWORD SYNCRONIZATION
The password synchronization is the process of changing each
password for different applications to the same value, so that
the user always enters the same password. Once you
implement password synchronization technique, users will
enter the same password when they login to any of the
synchronized systems, such as to their network, finance
system, e-mail, calendar or the mainframe.
In other words the password synchronisation is the
implementation of same password for each and every
applications or system. But using the same password is the
weakest policy for the security of system [4] where in SSO
only one password is used as similar to password
synchronisation but we can ensure the security by using the
strong policy.
Another important point is that in password synchronisation
[5] user still have to login in each application or system. In
single sign on user needs to login once for the primary
authentication only then user become authorised to access the
all available applications.
Following is the comparative table of password
synchronization and single sign on.
Table -2: Comparison of Password Synchronisation and
Single Sign On
Parameters Password
Synchronization
Single Sign-on
Process It is very simple
process user change
all passwords of
application to the
same password.
User needs to sign in
only one application
using single username
and passwords. Specific
server does the process
of authentication for
remaining applications.
Login
Times
User needs to login
each and every
time, to get access
to applications.
User needs to login only
once.
Manage
Credential
Data
Only management
of password
required.
Specific mechanism is
required for the client
such as refreshing and
validation of tokens.
Password
Policy
For all applications
same password is
the weakest policy.
One strong password is
better than password
synchronization.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 310
4. PROPOSED SYSTEM
In our proposed work the architecture of Single Sign On is
suggested in cross cloud manner. An admin cloud is used to
maintain the login sessions and generating the identifiers for
the each application’s accessing process. The user credentials
are used to form the tokens. The tokens are the encrypted form
of the user credentials and the physical address (machine key)
of the user machine.
The tokens are used under the supervision of admin who
checks the validation of the request send by the user. The
admin works as an access manager. Initially users have to send
the user credentials for the first time login process. Admin
gives token as authorization to get access for the remaining
applications.
The tokens generated by the admin clouds contain session
information about the authorised user. Session is a data
structure in the access manager memory that contains
information about an authorised user. The admin cloud is
responsible for the generation of session identifiers which are
responsible for time dependent behaviours of users.
Fig -2: Scenario of cross cloud single sign on
A security problem occurs in the above scenario is that if user
is not active at the application, another user tries to get access
for another application then admin generate a request to user
asking for the user credentials. The request generation is
refreshing mechanism.
To sign out user just only need to click on sign out logo which
make user to free from the sign out process of individual
applications and destroys all the tokens. The destruction of
tokens stops the use of history recalling from the user side and
inhibit the intruder to use the tokens [3].
5. WORKING
The working of single sign on is performed in the following
manner and illustrated in the figure 3.
1. The user first authenticate for the first application accessing
procedure
2. The authenticated user request another protected application
from another cloud.
3. As the request does not include an app-token, the
application server constructs a request-token which is
encrypted by a session key shared between the applications
cloud and the admin cloud. The user is redirected to the admin
cloud along with the request-token.
Fig -3: Working of single sign on
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 311
4. The admin cloud decrypt the request-token using the
session key and detects the user has a valid token. It constructs
an id-token and then returns URL, which will contain the
response-token, as well as the requested-token.
5. The user is redirected to the original resource, along with
the id-token.
6. The application cloud checks the id-token, rewrites the id-
token into an app-token, and creates an app-token to be placed
into a cookie for future requests.
7. User’s browser saves the app-token cookie; the application
serves the original request to the user.
8. Logging out of an application involves deleting all the
session cookies associated with this application on the server.
6. BENEFITS
The implementation of cross cloud single sign on system
improves the productivity of employee with less time users
spend logging into so many applications and it also reduces
the workload of the helpdesks for recovering the forgotten
passwords. Employee productivity is dramatically improved,
with less time users spend logging into multiple applications
and recovering the forgotten passwords.
Another benefit of this system is that it increases the system
security potentially by the user to choose a single complex and
more secure password instead of using multiple simple and
insecure passwords. SSO effectively reduces the password-
related workload to the helpdesk and lowers the costs
associated with managing passwords across multiple
distributed applications.
7. CONCLUSIONS
In cloud computing, Software as a Service application uses the
username/password scheme for the authentication purpose.
The implementation of private admin cloud with common
database for multiple applications of various clouds can
improve the security and remove the password problem.
The proposed system can also be helpful for all cloud service
provider to get the benefits of secure cross cloud single sign
on and the e-government sector where data sensitivity is very
high, cross cloud SSO helps government employee and users
to handle data of various departments like health, finance,
payment etc.
It is possible to implement the SSO concept which increase
the security level of users who manages passwords manually.
It also enables the user to use more secure passwords
REFERENCES
[1]. Shuai Z; Shufen Z; Xuebin C; Xiuzhen H; “Cloud
Computing Research and Development Trend”, 2nd
International conference on Future Networks, 2010. ICFN '
10.pp 23, 22-24 Jan 2010.
[2]. Chang, L, Ti ; Chin L; Chang, A.Y.; Chun J, C;(2010), “
Information security issue of enterprises adopting the
application of cloud computing”, IEEE 2010 Sixth
International Conference on Networked Computing and
Advanced Information Management (NCM),pp 645, 16-18
Aug. 2010.
[3]. ”Kerberos: The Definitive Guide”, Jason Garman
[4]. Kessler "Passwords - Strengths and Weaknesses", Internet
and Networking Security, Auerbach, 1997.
[5]. M-tech Information Company, “Definition of Password
Synchronization”, 2005
http://mtechit.com/concepts/password_synchronization.html
BIOGRAPHIES
Priyanka Patil has received the Diploma in
the Computer Science And Engineering from
R.G.T.U., Bhopal [M.P.] in 2011 and is
pursuing B.E Degree in C.S.E. from
S.R.M.C.E.W,Nagpur, Maharashtra INDIA.
Her field of interest is Computer Networking & Security.
Snehal S. Talokar, is pursuing B.E Degree in
C.S.E. from S.R.M.C.E.W, Nagpur,
Maharashtra India. Her field of interest is
VB.Net.
Vishakha Gonnade, is pursuing B.E Degree
in C.S.E. from S.R.M.C.E.W, Nagpur,
Maharashtra India. Her field of interest is
Cloud Computing.
Vaishali Bhagat has received the BE Degree
in Information Technology from RTMNU,
Maharashtra, India in 2008 & pursuing M.
Tech in CSE from RTMNU. Since 2010, she
is working in the department of IT as a
lecturer in SRMCEW, Nagpur, and Maharashtra, India.

More Related Content

What's hot

User Identity Verification Using Mouse Signature
User Identity Verification Using Mouse SignatureUser Identity Verification Using Mouse Signature
User Identity Verification Using Mouse SignatureIOSR Journals
 
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARDINTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARDIJCI JOURNAL
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Editor IJCATR
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...IJERA Editor
 
Secure Internet Voting System
Secure Internet Voting SystemSecure Internet Voting System
Secure Internet Voting Systemtheijes
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication ModelsRaj Chanchal
 
Security for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIsSecurity for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIsidescitation
 
IRJET - Scrutinize the Utility of Preserved Data with Privacy
IRJET -  	  Scrutinize the Utility of Preserved Data with PrivacyIRJET -  	  Scrutinize the Utility of Preserved Data with Privacy
IRJET - Scrutinize the Utility of Preserved Data with PrivacyIRJET Journal
 
Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...1crore projects
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET Journal
 
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conferenceSIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conferenceRichard Tong
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET Journal
 
Prevention of SQL injection in E- Commerce
Prevention of SQL injection in E- CommercePrevention of SQL injection in E- Commerce
Prevention of SQL injection in E- Commerceijceronline
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Remote Exploitation of the Dropbox SDK for Android
Remote Exploitation of the Dropbox SDK for AndroidRemote Exploitation of the Dropbox SDK for Android
Remote Exploitation of the Dropbox SDK for AndroidIBM Security
 
SpoofedMe - Intruding Accounts using Social Login Providers
SpoofedMe - Intruding Accounts using Social Login Providers SpoofedMe - Intruding Accounts using Social Login Providers
SpoofedMe - Intruding Accounts using Social Login Providers IBM Security
 

What's hot (19)

User Identity Verification Using Mouse Signature
User Identity Verification Using Mouse SignatureUser Identity Verification Using Mouse Signature
User Identity Verification Using Mouse Signature
 
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARDINTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
 
Secure Internet Voting System
Secure Internet Voting SystemSecure Internet Voting System
Secure Internet Voting System
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication Models
 
Security for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIsSecurity for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIs
 
IRJET - Scrutinize the Utility of Preserved Data with Privacy
IRJET -  	  Scrutinize the Utility of Preserved Data with PrivacyIRJET -  	  Scrutinize the Utility of Preserved Data with Privacy
IRJET - Scrutinize the Utility of Preserved Data with Privacy
 
Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conferenceSIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
 
Prevention of SQL injection in E- Commerce
Prevention of SQL injection in E- CommercePrevention of SQL injection in E- Commerce
Prevention of SQL injection in E- Commerce
 
SQL injection
SQL injectionSQL injection
SQL injection
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Remote Exploitation of the Dropbox SDK for Android
Remote Exploitation of the Dropbox SDK for AndroidRemote Exploitation of the Dropbox SDK for Android
Remote Exploitation of the Dropbox SDK for Android
 
SpoofedMe - Intruding Accounts using Social Login Providers
SpoofedMe - Intruding Accounts using Social Login Providers SpoofedMe - Intruding Accounts using Social Login Providers
SpoofedMe - Intruding Accounts using Social Login Providers
 

Viewers also liked

A study on push pull analysis associated with awkward
A study on push pull analysis associated with awkwardA study on push pull analysis associated with awkward
A study on push pull analysis associated with awkwardeSAT Publishing House
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkeSAT Publishing House
 
Improving the efficiency of weigher using plc controller
Improving the efficiency of weigher using plc controllerImproving the efficiency of weigher using plc controller
Improving the efficiency of weigher using plc controllereSAT Publishing House
 
Industrial application of machine vision
Industrial application of machine visionIndustrial application of machine vision
Industrial application of machine visioneSAT Publishing House
 
Treatment of kitchen waste by microbial culture
Treatment of kitchen waste by microbial cultureTreatment of kitchen waste by microbial culture
Treatment of kitchen waste by microbial cultureeSAT Publishing House
 
Effects on p h behaviour of expansive and non expansive soils contaminated wi...
Effects on p h behaviour of expansive and non expansive soils contaminated wi...Effects on p h behaviour of expansive and non expansive soils contaminated wi...
Effects on p h behaviour of expansive and non expansive soils contaminated wi...eSAT Publishing House
 
Theoretical flexural behavior of sandwich panel using
Theoretical flexural behavior of sandwich panel usingTheoretical flexural behavior of sandwich panel using
Theoretical flexural behavior of sandwich panel usingeSAT Publishing House
 
Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...eSAT Publishing House
 
Life cycle assessment and simulation enablers of sustainable product design
Life cycle assessment and simulation enablers of sustainable product designLife cycle assessment and simulation enablers of sustainable product design
Life cycle assessment and simulation enablers of sustainable product designeSAT Publishing House
 
Image fusion using nsct denoising and target extraction for visual surveillance
Image fusion using nsct denoising and target extraction for visual surveillanceImage fusion using nsct denoising and target extraction for visual surveillance
Image fusion using nsct denoising and target extraction for visual surveillanceeSAT Publishing House
 
Hci and its effective use in design and development of good user interface
Hci and its effective use in design and development of good user interfaceHci and its effective use in design and development of good user interface
Hci and its effective use in design and development of good user interfaceeSAT Publishing House
 
Fpga based interfacing for 8-bit and 32-bit electronic devices
Fpga based interfacing for 8-bit and 32-bit electronic devicesFpga based interfacing for 8-bit and 32-bit electronic devices
Fpga based interfacing for 8-bit and 32-bit electronic deviceseSAT Publishing House
 
Managing over allocation of resource in steel
Managing over allocation of resource in steelManaging over allocation of resource in steel
Managing over allocation of resource in steeleSAT Publishing House
 
Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...eSAT Publishing House
 
Use of location aided algorithm using wi fi in indoor
Use of location aided algorithm using wi fi in indoorUse of location aided algorithm using wi fi in indoor
Use of location aided algorithm using wi fi in indooreSAT Publishing House
 
Vibgyor a sustainability assessment tool for residential building
Vibgyor a sustainability assessment tool for residential buildingVibgyor a sustainability assessment tool for residential building
Vibgyor a sustainability assessment tool for residential buildingeSAT Publishing House
 
A great land mark to achieve 4 g mobile communications
A great land mark to achieve 4 g mobile communicationsA great land mark to achieve 4 g mobile communications
A great land mark to achieve 4 g mobile communicationseSAT Publishing House
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...eSAT Publishing House
 
Design and development of electro optical system for acquisition of ppg signa...
Design and development of electro optical system for acquisition of ppg signa...Design and development of electro optical system for acquisition of ppg signa...
Design and development of electro optical system for acquisition of ppg signa...eSAT Publishing House
 
Analysis of energy efficiency aspects in energy management
Analysis of energy efficiency aspects in energy managementAnalysis of energy efficiency aspects in energy management
Analysis of energy efficiency aspects in energy managementeSAT Publishing House
 

Viewers also liked (20)

A study on push pull analysis associated with awkward
A study on push pull analysis associated with awkwardA study on push pull analysis associated with awkward
A study on push pull analysis associated with awkward
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
 
Improving the efficiency of weigher using plc controller
Improving the efficiency of weigher using plc controllerImproving the efficiency of weigher using plc controller
Improving the efficiency of weigher using plc controller
 
Industrial application of machine vision
Industrial application of machine visionIndustrial application of machine vision
Industrial application of machine vision
 
Treatment of kitchen waste by microbial culture
Treatment of kitchen waste by microbial cultureTreatment of kitchen waste by microbial culture
Treatment of kitchen waste by microbial culture
 
Effects on p h behaviour of expansive and non expansive soils contaminated wi...
Effects on p h behaviour of expansive and non expansive soils contaminated wi...Effects on p h behaviour of expansive and non expansive soils contaminated wi...
Effects on p h behaviour of expansive and non expansive soils contaminated wi...
 
Theoretical flexural behavior of sandwich panel using
Theoretical flexural behavior of sandwich panel usingTheoretical flexural behavior of sandwich panel using
Theoretical flexural behavior of sandwich panel using
 
Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...
 
Life cycle assessment and simulation enablers of sustainable product design
Life cycle assessment and simulation enablers of sustainable product designLife cycle assessment and simulation enablers of sustainable product design
Life cycle assessment and simulation enablers of sustainable product design
 
Image fusion using nsct denoising and target extraction for visual surveillance
Image fusion using nsct denoising and target extraction for visual surveillanceImage fusion using nsct denoising and target extraction for visual surveillance
Image fusion using nsct denoising and target extraction for visual surveillance
 
Hci and its effective use in design and development of good user interface
Hci and its effective use in design and development of good user interfaceHci and its effective use in design and development of good user interface
Hci and its effective use in design and development of good user interface
 
Fpga based interfacing for 8-bit and 32-bit electronic devices
Fpga based interfacing for 8-bit and 32-bit electronic devicesFpga based interfacing for 8-bit and 32-bit electronic devices
Fpga based interfacing for 8-bit and 32-bit electronic devices
 
Managing over allocation of resource in steel
Managing over allocation of resource in steelManaging over allocation of resource in steel
Managing over allocation of resource in steel
 
Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...
 
Use of location aided algorithm using wi fi in indoor
Use of location aided algorithm using wi fi in indoorUse of location aided algorithm using wi fi in indoor
Use of location aided algorithm using wi fi in indoor
 
Vibgyor a sustainability assessment tool for residential building
Vibgyor a sustainability assessment tool for residential buildingVibgyor a sustainability assessment tool for residential building
Vibgyor a sustainability assessment tool for residential building
 
A great land mark to achieve 4 g mobile communications
A great land mark to achieve 4 g mobile communicationsA great land mark to achieve 4 g mobile communications
A great land mark to achieve 4 g mobile communications
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
 
Design and development of electro optical system for acquisition of ppg signa...
Design and development of electro optical system for acquisition of ppg signa...Design and development of electro optical system for acquisition of ppg signa...
Design and development of electro optical system for acquisition of ppg signa...
 
Analysis of energy efficiency aspects in energy management
Analysis of energy efficiency aspects in energy managementAnalysis of energy efficiency aspects in energy management
Analysis of energy efficiency aspects in energy management
 

Similar to Cross cloud single sign on (sso) using tokens

Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkIJERA Editor
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONSANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONSijistjournal
 
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Conference Papers
 
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Conference Papers
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesHitachi ID Systems, Inc.
 
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET Journal
 
Secure multiple bank transaction log a case study
Secure multiple bank transaction log a case studySecure multiple bank transaction log a case study
Secure multiple bank transaction log a case studyeSAT Publishing House
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET Journal
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM csandit
 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMIJNSA Journal
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationeSAT Journals
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationseSAT Publishing House
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computingeSAT Publishing House
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth TechnologyIRJET Journal
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET Journal
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
 

Similar to Cross cloud single sign on (sso) using tokens (20)

International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed Network
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONSANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
 
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...
 
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
 
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
 
Secure multiple bank transaction log a case study
Secure multiple bank transaction log a case studySecure multiple bank transaction log a case study
Secure multiple bank transaction log a case study
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth Technology
 
publishable paper
publishable paperpublishable paper
publishable paper
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate System
 
J017325660
J017325660J017325660
J017325660
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 

Recently uploaded (20)

KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 

Cross cloud single sign on (sso) using tokens

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 308 CROSS CLOUD SINGLE SIGN ON (SSO) USING TOKENS Priyanka Patil1 , Snehal S. Talokar2 , Vishakha Gonnade3 , Vaishali Bhagat4 1, 2, 3 Student, Computer Science and Engineering, SRMCEW, Maharashtra, India 4 Lecturer, Information Technology, SRMCEW, Maharashtra, India Abstract The cloud computing service provider ensures the security of their services by username/password schemes. Such type of scheme may be suitable for small personalized services but not for the large scale organizations where employees may require to login for more than one application related to various clouds. This paper identifies the issues of multiple logins and presents how multiple applications of various clouds are accessed by single login process securely. Single Sign-On is the mechanism where a user only need to authenticate him/her self once, then has the ability to access other protected resources without having to re-authenticate. Our objective is to design the single sign on architecture for more than one cloud’s applications. Due to that client log in only one time at time and automatically user login in remaining cloud applications and assess successful same process is for log out only user logout once then user logout properly from the all of the cloud applications. The login audits are done for the security purpose and its controlling by admin panel. Cloud service providers also neither need to support redundant registration process for new accounts of applications nor dealing with enormous databases for same user of multiple applications and managing multiple authentication credentials is annoying for users and as well as for authentication system. In other words, Single sign-on (SSO) is the mechanism whereby a single action of user authentication and authorization can permit a user to access all computers and systems where that user has access permission, without the need to enter multiple passwords. Keywords: Cloud Computing, Password Synchronization, Refreshing Mechanism, Session ID, Tokens. ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION Cloud computing is known as On-Demand computing and one of the latest emerging topics in IT industry. The cloud computing provide the services over the internet. The services include applications, system hardware, collection of resources on request etc. Cloud classification is done on their usage mode, if cloud is available for the general users on pay basis according to their usage basis then it is called public cloud. If the customer develops their own applications and run on their own infrastructure then it is called private cloud. Integration of these two clouds is called hybrid cloud. Community cloud shares infrastructure between several organizations from a specific community with common concerns whether managed internally or by a third-party and hosted internally or externally. The costs are spread over fewer users than a public cloud but more than a private cloud. The current scenario of web applications forces user to remember the user credentials which make trouble to remembering large number of identities and associated password for the applications. In cloud computing the similar problem faced by the user. This document gives the information about the implementation of Single Sign On (SSO) in cross cloud arrangement. The following section contains the survey related to the growth of cloud, security aspect, cloud is the first priority to the vendors, revenue report, future and current usage, state of cloud to the IT users and popularity survey of cloud computing. 1.1 Cloud Growth The survey conducted by International Data Corporation (IDC) shows the strength of cloud computing to be implemented in IT industry and gives the potential inspiration to CSP. The Table 1 shows the cloud growth from year 2008 to 2012[1]. Table -1: Cloud Growth Year 2008 2012 Growth Cloud IT spending $ 16 B $42 B 27% Total IT spending $383 B $ 494 B 7% Total-cloud spend $367 B $ 452 B 4%
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 309 1.2 Cloud Security Survey The following figure indicates that security as first rank according to IT executives. This information is also collected from two hundred six three IT professional by asking different question related to the cloud, and many of the executives are worried about security perspective of cloud. The Fig. 2.1 shows the survey on security [2]. Fig -1: Cloud security survey 1.3 Objective The aim of our research is to suggest a design of the single sign on web application in cross cloud manner. Due to that client log in only once, at the time of opening first application and automatically user get login in remaining applications and access successful without re-authentication process which makes user free from remembering user credentials. 2. EXISTING SYSTEM Currently most common authentication approached used by the cloud service provider is user credentials (i.e. username and password) which requires each cloud service provider host its own and separate user management system. The main problem with this system is that for accessing services of various cloud service providers user have to register first and secondly user have to authenticate for each services. Another problem with the existing system is those users have to manage individual username/password pair for each cloud service provider which becomes impractical to expect from user to remember different user credentials for each applications. 3. PASSWORD SYNCRONIZATION The password synchronization is the process of changing each password for different applications to the same value, so that the user always enters the same password. Once you implement password synchronization technique, users will enter the same password when they login to any of the synchronized systems, such as to their network, finance system, e-mail, calendar or the mainframe. In other words the password synchronisation is the implementation of same password for each and every applications or system. But using the same password is the weakest policy for the security of system [4] where in SSO only one password is used as similar to password synchronisation but we can ensure the security by using the strong policy. Another important point is that in password synchronisation [5] user still have to login in each application or system. In single sign on user needs to login once for the primary authentication only then user become authorised to access the all available applications. Following is the comparative table of password synchronization and single sign on. Table -2: Comparison of Password Synchronisation and Single Sign On Parameters Password Synchronization Single Sign-on Process It is very simple process user change all passwords of application to the same password. User needs to sign in only one application using single username and passwords. Specific server does the process of authentication for remaining applications. Login Times User needs to login each and every time, to get access to applications. User needs to login only once. Manage Credential Data Only management of password required. Specific mechanism is required for the client such as refreshing and validation of tokens. Password Policy For all applications same password is the weakest policy. One strong password is better than password synchronization.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 310 4. PROPOSED SYSTEM In our proposed work the architecture of Single Sign On is suggested in cross cloud manner. An admin cloud is used to maintain the login sessions and generating the identifiers for the each application’s accessing process. The user credentials are used to form the tokens. The tokens are the encrypted form of the user credentials and the physical address (machine key) of the user machine. The tokens are used under the supervision of admin who checks the validation of the request send by the user. The admin works as an access manager. Initially users have to send the user credentials for the first time login process. Admin gives token as authorization to get access for the remaining applications. The tokens generated by the admin clouds contain session information about the authorised user. Session is a data structure in the access manager memory that contains information about an authorised user. The admin cloud is responsible for the generation of session identifiers which are responsible for time dependent behaviours of users. Fig -2: Scenario of cross cloud single sign on A security problem occurs in the above scenario is that if user is not active at the application, another user tries to get access for another application then admin generate a request to user asking for the user credentials. The request generation is refreshing mechanism. To sign out user just only need to click on sign out logo which make user to free from the sign out process of individual applications and destroys all the tokens. The destruction of tokens stops the use of history recalling from the user side and inhibit the intruder to use the tokens [3]. 5. WORKING The working of single sign on is performed in the following manner and illustrated in the figure 3. 1. The user first authenticate for the first application accessing procedure 2. The authenticated user request another protected application from another cloud. 3. As the request does not include an app-token, the application server constructs a request-token which is encrypted by a session key shared between the applications cloud and the admin cloud. The user is redirected to the admin cloud along with the request-token. Fig -3: Working of single sign on
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 311 4. The admin cloud decrypt the request-token using the session key and detects the user has a valid token. It constructs an id-token and then returns URL, which will contain the response-token, as well as the requested-token. 5. The user is redirected to the original resource, along with the id-token. 6. The application cloud checks the id-token, rewrites the id- token into an app-token, and creates an app-token to be placed into a cookie for future requests. 7. User’s browser saves the app-token cookie; the application serves the original request to the user. 8. Logging out of an application involves deleting all the session cookies associated with this application on the server. 6. BENEFITS The implementation of cross cloud single sign on system improves the productivity of employee with less time users spend logging into so many applications and it also reduces the workload of the helpdesks for recovering the forgotten passwords. Employee productivity is dramatically improved, with less time users spend logging into multiple applications and recovering the forgotten passwords. Another benefit of this system is that it increases the system security potentially by the user to choose a single complex and more secure password instead of using multiple simple and insecure passwords. SSO effectively reduces the password- related workload to the helpdesk and lowers the costs associated with managing passwords across multiple distributed applications. 7. CONCLUSIONS In cloud computing, Software as a Service application uses the username/password scheme for the authentication purpose. The implementation of private admin cloud with common database for multiple applications of various clouds can improve the security and remove the password problem. The proposed system can also be helpful for all cloud service provider to get the benefits of secure cross cloud single sign on and the e-government sector where data sensitivity is very high, cross cloud SSO helps government employee and users to handle data of various departments like health, finance, payment etc. It is possible to implement the SSO concept which increase the security level of users who manages passwords manually. It also enables the user to use more secure passwords REFERENCES [1]. Shuai Z; Shufen Z; Xuebin C; Xiuzhen H; “Cloud Computing Research and Development Trend”, 2nd International conference on Future Networks, 2010. ICFN ' 10.pp 23, 22-24 Jan 2010. [2]. Chang, L, Ti ; Chin L; Chang, A.Y.; Chun J, C;(2010), “ Information security issue of enterprises adopting the application of cloud computing”, IEEE 2010 Sixth International Conference on Networked Computing and Advanced Information Management (NCM),pp 645, 16-18 Aug. 2010. [3]. ”Kerberos: The Definitive Guide”, Jason Garman [4]. Kessler "Passwords - Strengths and Weaknesses", Internet and Networking Security, Auerbach, 1997. [5]. M-tech Information Company, “Definition of Password Synchronization”, 2005 http://mtechit.com/concepts/password_synchronization.html BIOGRAPHIES Priyanka Patil has received the Diploma in the Computer Science And Engineering from R.G.T.U., Bhopal [M.P.] in 2011 and is pursuing B.E Degree in C.S.E. from S.R.M.C.E.W,Nagpur, Maharashtra INDIA. Her field of interest is Computer Networking & Security. Snehal S. Talokar, is pursuing B.E Degree in C.S.E. from S.R.M.C.E.W, Nagpur, Maharashtra India. Her field of interest is VB.Net. Vishakha Gonnade, is pursuing B.E Degree in C.S.E. from S.R.M.C.E.W, Nagpur, Maharashtra India. Her field of interest is Cloud Computing. Vaishali Bhagat has received the BE Degree in Information Technology from RTMNU, Maharashtra, India in 2008 & pursuing M. Tech in CSE from RTMNU. Since 2010, she is working in the department of IT as a lecturer in SRMCEW, Nagpur, and Maharashtra, India.