Authentication Token as SSO Devices
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Authentication is a process by which a person verifies that someone is who he claims he is. There are many ways of authentication as user login authentication, one-way authentication of communicating entities and two-way authentication. User login authentication uses password based mechanism like keeping password secret. There is a mechanism single sign on service which uses password based mechanism. We proposed a design of authentication token as single sign on (SSO) devices to provide a Secure and reliable authentication with increasing of acceptability. The single sign-on service provides the multi-logins possible but less comfortable in use and requires the passwords for login. Passwordbased mechanisms dominate as they are easy to use frequent and do not need additional hardware. However, lots of users do not realize the threads with respect to password-based mechanism like repeatedly use the same password, sophisticated attacks like repudiation, traffic analysis, snooping, replaying etc. and hacks. Mechanisms based on two-factor authentication using Onetime Passwords, crypto-token may solve these security problems but because of complexity it is less comfortable in usage. In order to raise user acceptance of these methods we combine the idea of two-factor authentication with single sign-on service for local and remote authentication. This combined approach leads to a win-win-situation: token-based authentication reduces the risk of stolen authentication factors and stops the attacks and reduces the hacks as the tokens are protected against misuse by a secret pin and it does not need much more user effort than password-based mechanisms and the multi-logins are also possible as we are using the Single Sign-On service. The proposed system will consist of an authentication token i.e. crypto-token with single sign-on service.
Authors and Affiliations
Praveen Kumar Maheshwari, Ajay Palmure, Bharati S. Ainapure
Tone Reservation Technique Based Clipping and Filtering Method for PAPR Reduction by Scaling Residual noise
OFDM is an extinguishly used next-generation wireless transmission technique because of its easy equalization. OFDM can send over hundreds of parallel data streams via multiple carriers which makes the possibility of...
Dos Attack Detection System Using Anomaly Based Technique In Interconnected Systems
Denial-of-service (dos) attacks are one kind of violent and threatening invasive behaviour to online servers. Dos attacks harshly humiliate the ease of use of a victim, which can be a host, a router, or an entire net...
An Efficient Hindi Language Interface using Relational Databases
Database Management Systems have been used extensively for accessing, storing and retrieving data. However, database systems are not understandable to every user because they are hard to use. A plethora of egovernance...
Principled Probabilistic Methods To Integrate Information From The Query Workload Into The Data Annotation Process
The aspiration of CADS is to persuade and inferior the cost of crafting adequately interpreted documents that can be right away helpful for usually issued partially prearranged enquiries. Our solution ambition is to...
Minimizing End-To-End Delay in Interactive Network Applications
Multiple users interaction in network applications such as teleconferencing, network gaming, and online trading are gaining popularity but these applications require that the delay difference in between multiple clie...