IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 308
CROSS CLOUD SINGLE SIGN ON (SSO) USING TOKENS
Priyanka Patil1
, Snehal S. Talokar2
, Vishakha Gonnade3
, Vaishali Bhagat4
1, 2, 3
Student, Computer Science and Engineering, SRMCEW, Maharashtra, India
4
Lecturer, Information Technology, SRMCEW, Maharashtra, India
Abstract
The cloud computing service provider ensures the security of their services by username/password schemes. Such type of scheme may
be suitable for small personalized services but not for the large scale organizations where employees may require to login for more
than one application related to various clouds. This paper identifies the issues of multiple logins and presents how multiple
applications of various clouds are accessed by single login process securely. Single Sign-On is the mechanism where a user only need
to authenticate him/her self once, then has the ability to access other protected resources without having to re-authenticate. Our
objective is to design the single sign on architecture for more than one cloud’s applications. Due to that client log in only one time at
time and automatically user login in remaining cloud applications and assess successful same process is for log out only user logout
once then user logout properly from the all of the cloud applications. The login audits are done for the security purpose and its
controlling by admin panel. Cloud service providers also neither need to support redundant registration process for new accounts of
applications nor dealing with enormous databases for same user of multiple applications and managing multiple authentication
credentials is annoying for users and as well as for authentication system. In other words, Single sign-on (SSO) is the mechanism
whereby a single action of user authentication and authorization can permit a user to access all computers and systems where that
user has access permission, without the need to enter multiple passwords.
Keywords: Cloud Computing, Password Synchronization, Refreshing Mechanism, Session ID, Tokens.
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
Cloud computing is known as On-Demand computing and one
of the latest emerging topics in IT industry. The cloud
computing provide the services over the internet. The services
include applications, system hardware, collection of resources
on request etc.
Cloud classification is done on their usage mode, if cloud is
available for the general users on pay basis according to their
usage basis then it is called public cloud. If the customer
develops their own applications and run on their own
infrastructure then it is called private cloud. Integration of
these two clouds is called hybrid cloud.
Community cloud shares infrastructure between several
organizations from a specific community with common
concerns whether managed internally or by a third-party and
hosted internally or externally. The costs are spread over
fewer users than a public cloud but more than a private cloud.
The current scenario of web applications forces user to
remember the user credentials which make trouble to
remembering large number of identities and associated
password for the applications. In cloud computing the similar
problem faced by the user. This document gives the
information about the implementation of Single Sign On
(SSO) in cross cloud arrangement.
The following section contains the survey related to the
growth of cloud, security aspect, cloud is the first priority to
the vendors, revenue report, future and current usage, state of
cloud to the IT users and popularity survey of cloud
computing.
1.1 Cloud Growth
The survey conducted by International Data Corporation
(IDC) shows the strength of cloud computing to be
implemented in IT industry and gives the potential inspiration
to CSP. The Table 1 shows the cloud growth from year 2008
to 2012[1].
Table -1: Cloud Growth
Year 2008 2012 Growth
Cloud IT spending $ 16 B $42 B 27%
Total IT spending $383 B $ 494 B 7%
Total-cloud spend $367 B $ 452 B 4%
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 309
1.2 Cloud Security Survey
The following figure indicates that security as first rank
according to IT executives. This information is also collected
from two hundred six three IT professional by asking different
question related to the cloud, and many of the executives are
worried about security perspective of cloud. The Fig. 2.1
shows the survey on security [2].
Fig -1: Cloud security survey
1.3 Objective
The aim of our research is to suggest a design of the single
sign on web application in cross cloud manner. Due to that
client log in only once, at the time of opening first application
and automatically user get login in remaining applications and
access successful without re-authentication process which
makes user free from remembering user credentials.
2. EXISTING SYSTEM
Currently most common authentication approached used by
the cloud service provider is user credentials (i.e. username
and password) which requires each cloud service provider host
its own and separate user management system. The main
problem with this system is that for accessing services of
various cloud service providers user have to register first and
secondly user have to authenticate for each services. Another
problem with the existing system is those users have to
manage individual username/password pair for each cloud
service provider which becomes impractical to expect from
user to remember different user credentials for each
applications.
3. PASSWORD SYNCRONIZATION
The password synchronization is the process of changing each
password for different applications to the same value, so that
the user always enters the same password. Once you
implement password synchronization technique, users will
enter the same password when they login to any of the
synchronized systems, such as to their network, finance
system, e-mail, calendar or the mainframe.
In other words the password synchronisation is the
implementation of same password for each and every
applications or system. But using the same password is the
weakest policy for the security of system [4] where in SSO
only one password is used as similar to password
synchronisation but we can ensure the security by using the
strong policy.
Another important point is that in password synchronisation
[5] user still have to login in each application or system. In
single sign on user needs to login once for the primary
authentication only then user become authorised to access the
all available applications.
Following is the comparative table of password
synchronization and single sign on.
Table -2: Comparison of Password Synchronisation and
Single Sign On
Parameters Password
Synchronization
Single Sign-on
Process It is very simple
process user change
all passwords of
application to the
same password.
User needs to sign in
only one application
using single username
and passwords. Specific
server does the process
of authentication for
remaining applications.
Login
Times
User needs to login
each and every
time, to get access
to applications.
User needs to login only
once.
Manage
Credential
Data
Only management
of password
required.
Specific mechanism is
required for the client
such as refreshing and
validation of tokens.
Password
Policy
For all applications
same password is
the weakest policy.
One strong password is
better than password
synchronization.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 310
4. PROPOSED SYSTEM
In our proposed work the architecture of Single Sign On is
suggested in cross cloud manner. An admin cloud is used to
maintain the login sessions and generating the identifiers for
the each application’s accessing process. The user credentials
are used to form the tokens. The tokens are the encrypted form
of the user credentials and the physical address (machine key)
of the user machine.
The tokens are used under the supervision of admin who
checks the validation of the request send by the user. The
admin works as an access manager. Initially users have to send
the user credentials for the first time login process. Admin
gives token as authorization to get access for the remaining
applications.
The tokens generated by the admin clouds contain session
information about the authorised user. Session is a data
structure in the access manager memory that contains
information about an authorised user. The admin cloud is
responsible for the generation of session identifiers which are
responsible for time dependent behaviours of users.
Fig -2: Scenario of cross cloud single sign on
A security problem occurs in the above scenario is that if user
is not active at the application, another user tries to get access
for another application then admin generate a request to user
asking for the user credentials. The request generation is
refreshing mechanism.
To sign out user just only need to click on sign out logo which
make user to free from the sign out process of individual
applications and destroys all the tokens. The destruction of
tokens stops the use of history recalling from the user side and
inhibit the intruder to use the tokens [3].
5. WORKING
The working of single sign on is performed in the following
manner and illustrated in the figure 3.
1. The user first authenticate for the first application accessing
procedure
2. The authenticated user request another protected application
from another cloud.
3. As the request does not include an app-token, the
application server constructs a request-token which is
encrypted by a session key shared between the applications
cloud and the admin cloud. The user is redirected to the admin
cloud along with the request-token.
Fig -3: Working of single sign on
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 311
4. The admin cloud decrypt the request-token using the
session key and detects the user has a valid token. It constructs
an id-token and then returns URL, which will contain the
response-token, as well as the requested-token.
5. The user is redirected to the original resource, along with
the id-token.
6. The application cloud checks the id-token, rewrites the id-
token into an app-token, and creates an app-token to be placed
into a cookie for future requests.
7. User’s browser saves the app-token cookie; the application
serves the original request to the user.
8. Logging out of an application involves deleting all the
session cookies associated with this application on the server.
6. BENEFITS
The implementation of cross cloud single sign on system
improves the productivity of employee with less time users
spend logging into so many applications and it also reduces
the workload of the helpdesks for recovering the forgotten
passwords. Employee productivity is dramatically improved,
with less time users spend logging into multiple applications
and recovering the forgotten passwords.
Another benefit of this system is that it increases the system
security potentially by the user to choose a single complex and
more secure password instead of using multiple simple and
insecure passwords. SSO effectively reduces the password-
related workload to the helpdesk and lowers the costs
associated with managing passwords across multiple
distributed applications.
7. CONCLUSIONS
In cloud computing, Software as a Service application uses the
username/password scheme for the authentication purpose.
The implementation of private admin cloud with common
database for multiple applications of various clouds can
improve the security and remove the password problem.
The proposed system can also be helpful for all cloud service
provider to get the benefits of secure cross cloud single sign
on and the e-government sector where data sensitivity is very
high, cross cloud SSO helps government employee and users
to handle data of various departments like health, finance,
payment etc.
It is possible to implement the SSO concept which increase
the security level of users who manages passwords manually.
It also enables the user to use more secure passwords
REFERENCES
[1]. Shuai Z; Shufen Z; Xuebin C; Xiuzhen H; “Cloud
Computing Research and Development Trend”, 2nd
International conference on Future Networks, 2010. ICFN '
10.pp 23, 22-24 Jan 2010.
[2]. Chang, L, Ti ; Chin L; Chang, A.Y.; Chun J, C;(2010), “
Information security issue of enterprises adopting the
application of cloud computing”, IEEE 2010 Sixth
International Conference on Networked Computing and
Advanced Information Management (NCM),pp 645, 16-18
Aug. 2010.
[3]. ”Kerberos: The Definitive Guide”, Jason Garman
[4]. Kessler "Passwords - Strengths and Weaknesses", Internet
and Networking Security, Auerbach, 1997.
[5]. M-tech Information Company, “Definition of Password
Synchronization”, 2005
http://mtechit.com/concepts/password_synchronization.html
BIOGRAPHIES
Priyanka Patil has received the Diploma in
the Computer Science And Engineering from
R.G.T.U., Bhopal [M.P.] in 2011 and is
pursuing B.E Degree in C.S.E. from
S.R.M.C.E.W,Nagpur, Maharashtra INDIA.
Her field of interest is Computer Networking & Security.
Snehal S. Talokar, is pursuing B.E Degree in
C.S.E. from S.R.M.C.E.W, Nagpur,
Maharashtra India. Her field of interest is
VB.Net.
Vishakha Gonnade, is pursuing B.E Degree
in C.S.E. from S.R.M.C.E.W, Nagpur,
Maharashtra India. Her field of interest is
Cloud Computing.
Vaishali Bhagat has received the BE Degree
in Information Technology from RTMNU,
Maharashtra, India in 2008 & pursuing M.
Tech in CSE from RTMNU. Since 2010, she
is working in the department of IT as a
lecturer in SRMCEW, Nagpur, and Maharashtra, India.

More Related Content

PDF
Advanced mechanism for single sign on for distributed computer networks
PDF
Database Security Two Way Authentication Using Graphical Password
PDF
Design and Implementation of Enhanced Single Sign on System for Education Sys...
PDF
I1804015458
PDF
Effectiveness of various user authentication techniques
PDF
IRJET - Graphical Password Authentication for Banking System
PDF
Dr. ritu soni
PDF
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
Advanced mechanism for single sign on for distributed computer networks
Database Security Two Way Authentication Using Graphical Password
Design and Implementation of Enhanced Single Sign on System for Education Sys...
I1804015458
Effectiveness of various user authentication techniques
IRJET - Graphical Password Authentication for Banking System
Dr. ritu soni
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS

What's hot (19)

PDF
User Identity Verification Using Mouse Signature
PDF
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
PDF
Online Signature Authentication by Using Mouse Behavior
PDF
An Overview on Authentication Approaches and Their Usability in Conjunction w...
PDF
Secure Internet Voting System
DOC
Authentication Models
PDF
Security for Future Networks: A Prospective Study of AAIs
PDF
IRJET - Scrutinize the Utility of Preserved Data with Privacy
PDF
Continuous and Transparent User Identity Verification for Secure Internet Ser...
PDF
IRJET- Web Application for Secured Two Factor Authentication
PDF
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
PDF
IRJET - TTL: Tap to Login
PDF
Prevention of SQL injection in E- Commerce
PPTX
SQL injection
PDF
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
PDF
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
PDF
Remote Exploitation of the Dropbox SDK for Android
PDF
SpoofedMe - Intruding Accounts using Social Login Providers
User Identity Verification Using Mouse Signature
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
Online Signature Authentication by Using Mouse Behavior
An Overview on Authentication Approaches and Their Usability in Conjunction w...
Secure Internet Voting System
Authentication Models
Security for Future Networks: A Prospective Study of AAIs
IRJET - Scrutinize the Utility of Preserved Data with Privacy
Continuous and Transparent User Identity Verification for Secure Internet Ser...
IRJET- Web Application for Secured Two Factor Authentication
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
IRJET - TTL: Tap to Login
Prevention of SQL injection in E- Commerce
SQL injection
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
Remote Exploitation of the Dropbox SDK for Android
SpoofedMe - Intruding Accounts using Social Login Providers
Ad

Viewers also liked (18)

PDF
Experimental study on corrosion prevention with rebars along with fibre in r ...
PDF
Comparative studies on heat transfer and fluid flow in cored brick and pebble...
PDF
Zigbee based differential pilot protection of transmission line
PDF
Distributed dynamic frequency allocation in wireless cellular networks using ...
PDF
Wi play audio streaming over wi-fi
PDF
Counter based design of dpll for wireless communication
PDF
Virtual’s culture based information technology
PDF
Performance analysis of voip over wired and wireless networks network impleme...
PDF
Live multimedia streaming and video on demand issues and challenges
PDF
Real time implemantion of stc and ftc radar system based on fpga
PDF
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...
PDF
Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...
PDF
An intrusion detection model based on fuzzy membership function using gnp
PDF
Corrosion characteristics of al 0.91 mg-0.55si-1.12fe-0.39ca al-alloy aged at...
PDF
Measurement systems analysis and a study of anova method
PDF
Automatic vision based inspection of railway track
PDF
Occupational health and safety (ohs) management vis à-vis different phases of...
PDF
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
Experimental study on corrosion prevention with rebars along with fibre in r ...
Comparative studies on heat transfer and fluid flow in cored brick and pebble...
Zigbee based differential pilot protection of transmission line
Distributed dynamic frequency allocation in wireless cellular networks using ...
Wi play audio streaming over wi-fi
Counter based design of dpll for wireless communication
Virtual’s culture based information technology
Performance analysis of voip over wired and wireless networks network impleme...
Live multimedia streaming and video on demand issues and challenges
Real time implemantion of stc and ftc radar system based on fpga
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...
Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...
An intrusion detection model based on fuzzy membership function using gnp
Corrosion characteristics of al 0.91 mg-0.55si-1.12fe-0.39ca al-alloy aged at...
Measurement systems analysis and a study of anova method
Automatic vision based inspection of railway track
Occupational health and safety (ohs) management vis à-vis different phases of...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
Ad

Similar to Cross cloud single sign on (sso) using tokens (20)

PDF
International Journal of Engineering Inventions (IJEI)
PDF
Efficient and Secure Single Sign on Mechanism for Distributed Network
PDF
Two Aspect Validation Control Frameworks for Online Distributed Services
PDF
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
PDF
Automated login method selection in a multi modal authentication - login meth...
PDF
Automated login method selection in a multi modal authentication - login meth...
PDF
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
PDF
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
PDF
Secure multiple bank transaction log a case study
PDF
IRJET- Multi sharing Data using OTP
PDF
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
PDF
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
PDF
A secure communication in smart phones using two factor authentication
PDF
A secure communication in smart phones using two factor authentications
PDF
Single sign on mechanism for distributed computing
PDF
IRJET- Smart Mobile Attendance System using Bluetooth Technology
PDF
publishable paper
PDF
IRJET- Survey on Blockchain based Digital Certificate System
PDF
Online dating system management project report.pdf
PDF
The Ultimate Guide to SSO Portals: Streamlining Access to Digital Services
International Journal of Engineering Inventions (IJEI)
Efficient and Secure Single Sign on Mechanism for Distributed Network
Two Aspect Validation Control Frameworks for Online Distributed Services
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
Secure multiple bank transaction log a case study
IRJET- Multi sharing Data using OTP
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentications
Single sign on mechanism for distributed computing
IRJET- Smart Mobile Attendance System using Bluetooth Technology
publishable paper
IRJET- Survey on Blockchain based Digital Certificate System
Online dating system management project report.pdf
The Ultimate Guide to SSO Portals: Streamlining Access to Digital Services

More from eSAT Journals (20)

PDF
Mechanical properties of hybrid fiber reinforced concrete for pavements
PDF
Material management in construction – a case study
PDF
Managing drought short term strategies in semi arid regions a case study
PDF
Life cycle cost analysis of overlay for an urban road in bangalore
PDF
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
PDF
Laboratory investigation of expansive soil stabilized with natural inorganic ...
PDF
Influence of reinforcement on the behavior of hollow concrete block masonry p...
PDF
Influence of compaction energy on soil stabilized with chemical stabilizer
PDF
Geographical information system (gis) for water resources management
PDF
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
PDF
Factors influencing compressive strength of geopolymer concrete
PDF
Experimental investigation on circular hollow steel columns in filled with li...
PDF
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
PDF
Evaluation of punching shear in flat slabs
PDF
Evaluation of performance of intake tower dam for recent earthquake in india
PDF
Evaluation of operational efficiency of urban road network using travel time ...
PDF
Estimation of surface runoff in nallur amanikere watershed using scs cn method
PDF
Estimation of morphometric parameters and runoff using rs & gis techniques
PDF
Effect of variation of plastic hinge length on the results of non linear anal...
PDF
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Mechanical properties of hybrid fiber reinforced concrete for pavements
Material management in construction – a case study
Managing drought short term strategies in semi arid regions a case study
Life cycle cost analysis of overlay for an urban road in bangalore
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of compaction energy on soil stabilized with chemical stabilizer
Geographical information system (gis) for water resources management
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Factors influencing compressive strength of geopolymer concrete
Experimental investigation on circular hollow steel columns in filled with li...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Evaluation of punching shear in flat slabs
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of operational efficiency of urban road network using travel time ...
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of morphometric parameters and runoff using rs & gis techniques
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of use of recycled materials on indirect tensile strength of asphalt c...

Recently uploaded (20)

PDF
August -2025_Top10 Read_Articles_ijait.pdf
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PPT
Total quality management ppt for engineering students
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PPTX
communication and presentation skills 01
PPTX
Current and future trends in Computer Vision.pptx
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PDF
Soil Improvement Techniques Note - Rabbi
PPTX
Management Information system : MIS-e-Business Systems.pptx
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PPTX
Fundamentals of Mechanical Engineering.pptx
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PPTX
CyberSecurity Mobile and Wireless Devices
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
August -2025_Top10 Read_Articles_ijait.pdf
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
Total quality management ppt for engineering students
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
Exploratory_Data_Analysis_Fundamentals.pdf
communication and presentation skills 01
Current and future trends in Computer Vision.pptx
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
Soil Improvement Techniques Note - Rabbi
Management Information system : MIS-e-Business Systems.pptx
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
Fundamentals of safety and accident prevention -final (1).pptx
Fundamentals of Mechanical Engineering.pptx
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
CyberSecurity Mobile and Wireless Devices
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
III.4.1.2_The_Space_Environment.p pdffdf
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems

Cross cloud single sign on (sso) using tokens

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 308 CROSS CLOUD SINGLE SIGN ON (SSO) USING TOKENS Priyanka Patil1 , Snehal S. Talokar2 , Vishakha Gonnade3 , Vaishali Bhagat4 1, 2, 3 Student, Computer Science and Engineering, SRMCEW, Maharashtra, India 4 Lecturer, Information Technology, SRMCEW, Maharashtra, India Abstract The cloud computing service provider ensures the security of their services by username/password schemes. Such type of scheme may be suitable for small personalized services but not for the large scale organizations where employees may require to login for more than one application related to various clouds. This paper identifies the issues of multiple logins and presents how multiple applications of various clouds are accessed by single login process securely. Single Sign-On is the mechanism where a user only need to authenticate him/her self once, then has the ability to access other protected resources without having to re-authenticate. Our objective is to design the single sign on architecture for more than one cloud’s applications. Due to that client log in only one time at time and automatically user login in remaining cloud applications and assess successful same process is for log out only user logout once then user logout properly from the all of the cloud applications. The login audits are done for the security purpose and its controlling by admin panel. Cloud service providers also neither need to support redundant registration process for new accounts of applications nor dealing with enormous databases for same user of multiple applications and managing multiple authentication credentials is annoying for users and as well as for authentication system. In other words, Single sign-on (SSO) is the mechanism whereby a single action of user authentication and authorization can permit a user to access all computers and systems where that user has access permission, without the need to enter multiple passwords. Keywords: Cloud Computing, Password Synchronization, Refreshing Mechanism, Session ID, Tokens. ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION Cloud computing is known as On-Demand computing and one of the latest emerging topics in IT industry. The cloud computing provide the services over the internet. The services include applications, system hardware, collection of resources on request etc. Cloud classification is done on their usage mode, if cloud is available for the general users on pay basis according to their usage basis then it is called public cloud. If the customer develops their own applications and run on their own infrastructure then it is called private cloud. Integration of these two clouds is called hybrid cloud. Community cloud shares infrastructure between several organizations from a specific community with common concerns whether managed internally or by a third-party and hosted internally or externally. The costs are spread over fewer users than a public cloud but more than a private cloud. The current scenario of web applications forces user to remember the user credentials which make trouble to remembering large number of identities and associated password for the applications. In cloud computing the similar problem faced by the user. This document gives the information about the implementation of Single Sign On (SSO) in cross cloud arrangement. The following section contains the survey related to the growth of cloud, security aspect, cloud is the first priority to the vendors, revenue report, future and current usage, state of cloud to the IT users and popularity survey of cloud computing. 1.1 Cloud Growth The survey conducted by International Data Corporation (IDC) shows the strength of cloud computing to be implemented in IT industry and gives the potential inspiration to CSP. The Table 1 shows the cloud growth from year 2008 to 2012[1]. Table -1: Cloud Growth Year 2008 2012 Growth Cloud IT spending $ 16 B $42 B 27% Total IT spending $383 B $ 494 B 7% Total-cloud spend $367 B $ 452 B 4%
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 309 1.2 Cloud Security Survey The following figure indicates that security as first rank according to IT executives. This information is also collected from two hundred six three IT professional by asking different question related to the cloud, and many of the executives are worried about security perspective of cloud. The Fig. 2.1 shows the survey on security [2]. Fig -1: Cloud security survey 1.3 Objective The aim of our research is to suggest a design of the single sign on web application in cross cloud manner. Due to that client log in only once, at the time of opening first application and automatically user get login in remaining applications and access successful without re-authentication process which makes user free from remembering user credentials. 2. EXISTING SYSTEM Currently most common authentication approached used by the cloud service provider is user credentials (i.e. username and password) which requires each cloud service provider host its own and separate user management system. The main problem with this system is that for accessing services of various cloud service providers user have to register first and secondly user have to authenticate for each services. Another problem with the existing system is those users have to manage individual username/password pair for each cloud service provider which becomes impractical to expect from user to remember different user credentials for each applications. 3. PASSWORD SYNCRONIZATION The password synchronization is the process of changing each password for different applications to the same value, so that the user always enters the same password. Once you implement password synchronization technique, users will enter the same password when they login to any of the synchronized systems, such as to their network, finance system, e-mail, calendar or the mainframe. In other words the password synchronisation is the implementation of same password for each and every applications or system. But using the same password is the weakest policy for the security of system [4] where in SSO only one password is used as similar to password synchronisation but we can ensure the security by using the strong policy. Another important point is that in password synchronisation [5] user still have to login in each application or system. In single sign on user needs to login once for the primary authentication only then user become authorised to access the all available applications. Following is the comparative table of password synchronization and single sign on. Table -2: Comparison of Password Synchronisation and Single Sign On Parameters Password Synchronization Single Sign-on Process It is very simple process user change all passwords of application to the same password. User needs to sign in only one application using single username and passwords. Specific server does the process of authentication for remaining applications. Login Times User needs to login each and every time, to get access to applications. User needs to login only once. Manage Credential Data Only management of password required. Specific mechanism is required for the client such as refreshing and validation of tokens. Password Policy For all applications same password is the weakest policy. One strong password is better than password synchronization.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 310 4. PROPOSED SYSTEM In our proposed work the architecture of Single Sign On is suggested in cross cloud manner. An admin cloud is used to maintain the login sessions and generating the identifiers for the each application’s accessing process. The user credentials are used to form the tokens. The tokens are the encrypted form of the user credentials and the physical address (machine key) of the user machine. The tokens are used under the supervision of admin who checks the validation of the request send by the user. The admin works as an access manager. Initially users have to send the user credentials for the first time login process. Admin gives token as authorization to get access for the remaining applications. The tokens generated by the admin clouds contain session information about the authorised user. Session is a data structure in the access manager memory that contains information about an authorised user. The admin cloud is responsible for the generation of session identifiers which are responsible for time dependent behaviours of users. Fig -2: Scenario of cross cloud single sign on A security problem occurs in the above scenario is that if user is not active at the application, another user tries to get access for another application then admin generate a request to user asking for the user credentials. The request generation is refreshing mechanism. To sign out user just only need to click on sign out logo which make user to free from the sign out process of individual applications and destroys all the tokens. The destruction of tokens stops the use of history recalling from the user side and inhibit the intruder to use the tokens [3]. 5. WORKING The working of single sign on is performed in the following manner and illustrated in the figure 3. 1. The user first authenticate for the first application accessing procedure 2. The authenticated user request another protected application from another cloud. 3. As the request does not include an app-token, the application server constructs a request-token which is encrypted by a session key shared between the applications cloud and the admin cloud. The user is redirected to the admin cloud along with the request-token. Fig -3: Working of single sign on
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 311 4. The admin cloud decrypt the request-token using the session key and detects the user has a valid token. It constructs an id-token and then returns URL, which will contain the response-token, as well as the requested-token. 5. The user is redirected to the original resource, along with the id-token. 6. The application cloud checks the id-token, rewrites the id- token into an app-token, and creates an app-token to be placed into a cookie for future requests. 7. User’s browser saves the app-token cookie; the application serves the original request to the user. 8. Logging out of an application involves deleting all the session cookies associated with this application on the server. 6. BENEFITS The implementation of cross cloud single sign on system improves the productivity of employee with less time users spend logging into so many applications and it also reduces the workload of the helpdesks for recovering the forgotten passwords. Employee productivity is dramatically improved, with less time users spend logging into multiple applications and recovering the forgotten passwords. Another benefit of this system is that it increases the system security potentially by the user to choose a single complex and more secure password instead of using multiple simple and insecure passwords. SSO effectively reduces the password- related workload to the helpdesk and lowers the costs associated with managing passwords across multiple distributed applications. 7. CONCLUSIONS In cloud computing, Software as a Service application uses the username/password scheme for the authentication purpose. The implementation of private admin cloud with common database for multiple applications of various clouds can improve the security and remove the password problem. The proposed system can also be helpful for all cloud service provider to get the benefits of secure cross cloud single sign on and the e-government sector where data sensitivity is very high, cross cloud SSO helps government employee and users to handle data of various departments like health, finance, payment etc. It is possible to implement the SSO concept which increase the security level of users who manages passwords manually. It also enables the user to use more secure passwords REFERENCES [1]. Shuai Z; Shufen Z; Xuebin C; Xiuzhen H; “Cloud Computing Research and Development Trend”, 2nd International conference on Future Networks, 2010. ICFN ' 10.pp 23, 22-24 Jan 2010. [2]. Chang, L, Ti ; Chin L; Chang, A.Y.; Chun J, C;(2010), “ Information security issue of enterprises adopting the application of cloud computing”, IEEE 2010 Sixth International Conference on Networked Computing and Advanced Information Management (NCM),pp 645, 16-18 Aug. 2010. [3]. ”Kerberos: The Definitive Guide”, Jason Garman [4]. Kessler "Passwords - Strengths and Weaknesses", Internet and Networking Security, Auerbach, 1997. [5]. M-tech Information Company, “Definition of Password Synchronization”, 2005 http://mtechit.com/concepts/password_synchronization.html BIOGRAPHIES Priyanka Patil has received the Diploma in the Computer Science And Engineering from R.G.T.U., Bhopal [M.P.] in 2011 and is pursuing B.E Degree in C.S.E. from S.R.M.C.E.W,Nagpur, Maharashtra INDIA. Her field of interest is Computer Networking & Security. Snehal S. Talokar, is pursuing B.E Degree in C.S.E. from S.R.M.C.E.W, Nagpur, Maharashtra India. Her field of interest is VB.Net. Vishakha Gonnade, is pursuing B.E Degree in C.S.E. from S.R.M.C.E.W, Nagpur, Maharashtra India. Her field of interest is Cloud Computing. Vaishali Bhagat has received the BE Degree in Information Technology from RTMNU, Maharashtra, India in 2008 & pursuing M. Tech in CSE from RTMNU. Since 2010, she is working in the department of IT as a lecturer in SRMCEW, Nagpur, and Maharashtra, India.