Using Smart Card to Achieve a Single Sign-on for Multiple Cloud Services

2013 ◽  
Vol 30 (5) ◽  
pp. 410 ◽  
Author(s):  
Min-Shiang Hwang ◽  
Tsuei-Hung Sun
2016 ◽  
Vol 59 (6) ◽  
pp. 605-614 ◽  
Author(s):  
Brian Cusack ◽  
Eghbal Ghazizadeh

Author(s):  
Mushtaq Hasson ◽  
Ali A. Yassin ◽  
Abdulla J. Yassin ◽  
Abdullah Mohammed Rashid ◽  
Aqeel A. Yaseen ◽  
...  

As a hopeful computing paradigm, cloud services are obtainable to end users based on pay-as-you-go service. Security is represented one of the vital issues for the extended adoption of cloud computing, with the object of accessing several cloud service providers, applications, and services by using anonymity features to authenticate the user. We present a good authentication scheme based on quick response (QR) code and smart card. Furthermore, our proposed scheme has several crucial merits such as key management, mutual authentication, one-time password, user anonymity, freely chosen password, secure password changes, and revocation by using QR code. The security of proposed scheme depends on crypto-hash function, QR-code validation, and smart card. Moreover, we view that our proposed scheme can resist numerous malicious attacks and are more appropriate for practical applications than other previous works. The proposed scheme has proved as a strong mutual authentication based on burrows-abadi-needham (BAN) logic and security analysis. Furthermore, our proposed scheme has good results compared with related work.


Author(s):  
G. Nivedhitha ◽  
R. Ilakkiya

Cloud computing is a way to increase the capacity or add capabilities dynamically without any upfront investments. Despite the growth achieved from the cloud computing, security is still questionable which impacts the cloud model adoption. Aside of having network and application securities being adopted, there must be a security that authenticate the user when accessing the cloud services that is bound to the rules between the cloud computing provider and the client side. The existing system provides authentication based on keys Encryption algorithms either symmetric key-based or asymmetric are key-based. Both encryption approaches have a major problem related to encryption key management i.e. how to securely generate, store, access and exchange secrete keys. In this paper, an optimized infrastructure for secure authentication and authorization in Cloud Environment using SSO (Single Sign-On) is proposed. SSO is a process of authenticating once and gain access of multiple resources that aims at reducing number of login and password in heterogeneous environment and to gain balance in Security, Efficiency and Usability. Also an authentication model for cloud computing based on the Kerberos protocol to provide single sign-on and to prevent against DDOS attacks is also presented in this paper.


2014 ◽  
Vol 602-605 ◽  
pp. 3552-3555
Author(s):  
Wei Li ◽  
Yuan Bo Zhu ◽  
Ming Zou

Industrial cloud service platform launched a series of industrial services based on cloud computing for middle and small-sized enterprises. These services include CAD, CAE and other software services utilized on industrial design and manufacturing. Due to integrating various application systems, an efficient authentication technology was urgent required to realize the exchange and sharing of the identity information in the platform. Based on analysis and compare of various mainstream Single Sign-On (SSO) technologies, this paper proposed an SSO solution by using Central Authentication Service (CAS) protocol. Proposed system makes it easy and convenient to deal with login authentication and gain identity information of the whole platform. In addition, proposed system significantly improves the user experience.


2020 ◽  
Vol 5 (01) ◽  
pp. 19-33
Author(s):  
A. Taqwa Martadinata ◽  
Firdaus Firdaus

Teknologi Informasi (TI) serta Sistem Informasi (SI) saat ini wajib ada dalam menunjang sebuah organisasi atau perusahaan. Arsitektur yang baik beserta dokumentasinya yang sesuai memungkinkan kemudahan pemeliharaan agar sistem tidak menjadi usang. Dalam  hal  ini  arsitektur  TI didefinisikan  sebagai framework yang  terintegrasi  untuk  mengembangkan  atau memelihara  TI  yang  ada  dan  memperoleh  TI  yang  baru  untuk  mencapai  tujuan strategis organisasi. The Open Group Architectural Framework (TOGAF): Kuat pada Aspek Arsitektur Bisnis dan Arsitektur Teknis. Pada penelitian ini menggunakan TOGAF ADM mulai dari fase pendahuluan, kebutuhan manajemen, visi arsitektur, bisnis arsitektur, arsitektur system informasi, arsitektur teknologi,serta solusi dan peluang. Menetapkan 3 prinsip pengembangan arsitektur informasi teknologi adaptif pada Universitas Bina Insan. Pengembangan aplikasi berbasis single sign on (sso) untuk intergrasi antar system. Merupakan sebuah hasil dari penelitian ini yang dapat menghasilkan sebuah rancangan infrastruktur teknologi informasi yang berifat adaftip dengan konsep yang di adopsi berupa teknologi virtualisasi server, serta pemanfaatan proses bisnis mampu berjalan efisien, efektif serta sesuai yang diinginkan manajemen.


2015 ◽  
Vol 6 (9) ◽  
pp. 1606-1612
Author(s):  
Zaydoon Mohammad Hatamleh ◽  
Eslam Najim Badran ◽  
Bilal Mohammad Hatamleh

Sign in / Sign up

Export Citation Format

Share Document