Improved User Authentication Process for Third-Party Identity Management in Distributed Environment
PDF

Keywords

Single Sign-On
Third-party
Identity management
Distributed networks

How to Cite

Nisar, K., Bala, S., Mu’azu, A., & Lawal, I. A. (2018). Improved User Authentication Process for Third-Party Identity Management in Distributed Environment: Improved User Authentication Process for Third-Party Identity Management in Distributed Environment. KIET Journal of Computing and Information Sciences, 3(2), 8. https://doi.org/10.51153/kjcis.v3i2.51

Abstract

Third-party identity management user authentication process using single sign-on (SSO) in distributed computer networks requires modification as the process of authenticating user to log into relying party (RP) resources by either identity provider (IDP) or hybrid relying party (HRP) depend always on the authentication of user logins. In this research an algorithm is proposed to authenticate user only once by recording and encrypting user credential with one-way hashing algorithm (SHA2), this simplifies user subsequent logins into relying party by confirming user credentials without other authentication by IDP or HRP. Authentication time and response time continuous time plot of the proposed algorithm was plotted with respect to the arrival time of users in which we show the relationship of authentication time and response time with random arrival rate of users.

https://doi.org/10.51153/kjcis.v3i2.51
PDF

References

Armando, A., Carbone, R., Compagna, L., Cuellar, J., & Tobarra, L. (2008). Formal analysis of SAML 2.0 web browser single sign-on: Breaking the SAML-based single sign-on for google apps. Proceedings of the ACM Conference on Computer and Communications Security, 1–9. https://doi.org/10.1145/1456396.1456397

Beer Mohamed, M. I., Hassan, M. F., Safdar, S., & Saleem, M. Q. (2019). Adaptive security architectural model for protecting identity federation in service oriented computing. Journal of King Saud University - Computer and Information Sciences, xxxx. https://doi.

org/10.1016/j.jksuci.2019.03.004

David, B. M., Nascimento, A. C. a, & Tonicelli, R. (2008). A Framework for Secure

Elgendy, N., & Elragal, A. (2018). Big Data Analytics?: A Literature Review Paper Big Data Analytics?: A Literature Review Paper. September 2014, 214–227. https://doi.org/10.1007/978-3-319-08976-8

Gupta, A. K., Zeng, W. Bin, & Wu, Y. (2010). Probability and statistical models:

Haq, M. A. ul, Usman, R. M., Hashmi, S., & Al-Omeri, A. I. (2019). The Marshall-Olkin lengthbiased exponential distribution and its applications. Journal of King Saud University - Science, 31(2), 246–251. https://doi.org/10.1016/j.jksus.2017.09.006

Jensen, C. D., Marsh, S., Dimitrakos, T., & Murayama, Y. (2015). Trust management IX: 9th IFIP WG 11.11 international conference, IFIPTM 2015 Hamburg, Germany, may 26- 28, 2015 proceedings. IFIP Advances in Information and Communication Technology, 454(December 2016). https://doi.org/10.1007/978-3-319-18491-3

Li, B., Ge, S., Wo, T. Y., & Ma, D. F. (2004). Research and implementation of single signon mechanism for ASP pattern. Grid and Cooperative Computing Gcc 2004, Proceedings, 3251(2001), 161–166.

Vapen, A., Carlsson, N., Mahanti, A., & Shahmehri, N. (2016). A look at the third-party identity-management landscape. IEEE Internet Computing, 20(2), 18–25. https://doi.org/10.1109/MIC.2016.38

Vapen, A., Carlsson, N., Mahanti, A., & Shahmehri, N. (2014). Third-party identity management usage on the web. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8362 LNCS, 151–162. https://doi.org/10.1007/978-3-319-04918-2_15