SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 308
CROSS CLOUD SINGLE SIGN ON (SSO) USING TOKENS
Priyanka Patil1
, Snehal S. Talokar2
, Vishakha Gonnade3
, Vaishali Bhagat4
1, 2, 3
Student, Computer Science and Engineering, SRMCEW, Maharashtra, India
4
Lecturer, Information Technology, SRMCEW, Maharashtra, India
Abstract
The cloud computing service provider ensures the security of their services by username/password schemes. Such type of scheme may
be suitable for small personalized services but not for the large scale organizations where employees may require to login for more
than one application related to various clouds. This paper identifies the issues of multiple logins and presents how multiple
applications of various clouds are accessed by single login process securely. Single Sign-On is the mechanism where a user only need
to authenticate him/her self once, then has the ability to access other protected resources without having to re-authenticate. Our
objective is to design the single sign on architecture for more than one cloud’s applications. Due to that client log in only one time at
time and automatically user login in remaining cloud applications and assess successful same process is for log out only user logout
once then user logout properly from the all of the cloud applications. The login audits are done for the security purpose and its
controlling by admin panel. Cloud service providers also neither need to support redundant registration process for new accounts of
applications nor dealing with enormous databases for same user of multiple applications and managing multiple authentication
credentials is annoying for users and as well as for authentication system. In other words, Single sign-on (SSO) is the mechanism
whereby a single action of user authentication and authorization can permit a user to access all computers and systems where that
user has access permission, without the need to enter multiple passwords.
Keywords: Cloud Computing, Password Synchronization, Refreshing Mechanism, Session ID, Tokens.
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
Cloud computing is known as On-Demand computing and one
of the latest emerging topics in IT industry. The cloud
computing provide the services over the internet. The services
include applications, system hardware, collection of resources
on request etc.
Cloud classification is done on their usage mode, if cloud is
available for the general users on pay basis according to their
usage basis then it is called public cloud. If the customer
develops their own applications and run on their own
infrastructure then it is called private cloud. Integration of
these two clouds is called hybrid cloud.
Community cloud shares infrastructure between several
organizations from a specific community with common
concerns whether managed internally or by a third-party and
hosted internally or externally. The costs are spread over
fewer users than a public cloud but more than a private cloud.
The current scenario of web applications forces user to
remember the user credentials which make trouble to
remembering large number of identities and associated
password for the applications. In cloud computing the similar
problem faced by the user. This document gives the
information about the implementation of Single Sign On
(SSO) in cross cloud arrangement.
The following section contains the survey related to the
growth of cloud, security aspect, cloud is the first priority to
the vendors, revenue report, future and current usage, state of
cloud to the IT users and popularity survey of cloud
computing.
1.1 Cloud Growth
The survey conducted by International Data Corporation
(IDC) shows the strength of cloud computing to be
implemented in IT industry and gives the potential inspiration
to CSP. The Table 1 shows the cloud growth from year 2008
to 2012[1].
Table -1: Cloud Growth
Year 2008 2012 Growth
Cloud IT spending $ 16 B $42 B 27%
Total IT spending $383 B $ 494 B 7%
Total-cloud spend $367 B $ 452 B 4%
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 309
1.2 Cloud Security Survey
The following figure indicates that security as first rank
according to IT executives. This information is also collected
from two hundred six three IT professional by asking different
question related to the cloud, and many of the executives are
worried about security perspective of cloud. The Fig. 2.1
shows the survey on security [2].
Fig -1: Cloud security survey
1.3 Objective
The aim of our research is to suggest a design of the single
sign on web application in cross cloud manner. Due to that
client log in only once, at the time of opening first application
and automatically user get login in remaining applications and
access successful without re-authentication process which
makes user free from remembering user credentials.
2. EXISTING SYSTEM
Currently most common authentication approached used by
the cloud service provider is user credentials (i.e. username
and password) which requires each cloud service provider host
its own and separate user management system. The main
problem with this system is that for accessing services of
various cloud service providers user have to register first and
secondly user have to authenticate for each services. Another
problem with the existing system is those users have to
manage individual username/password pair for each cloud
service provider which becomes impractical to expect from
user to remember different user credentials for each
applications.
3. PASSWORD SYNCRONIZATION
The password synchronization is the process of changing each
password for different applications to the same value, so that
the user always enters the same password. Once you
implement password synchronization technique, users will
enter the same password when they login to any of the
synchronized systems, such as to their network, finance
system, e-mail, calendar or the mainframe.
In other words the password synchronisation is the
implementation of same password for each and every
applications or system. But using the same password is the
weakest policy for the security of system [4] where in SSO
only one password is used as similar to password
synchronisation but we can ensure the security by using the
strong policy.
Another important point is that in password synchronisation
[5] user still have to login in each application or system. In
single sign on user needs to login once for the primary
authentication only then user become authorised to access the
all available applications.
Following is the comparative table of password
synchronization and single sign on.
Table -2: Comparison of Password Synchronisation and
Single Sign On
Parameters Password
Synchronization
Single Sign-on
Process It is very simple
process user change
all passwords of
application to the
same password.
User needs to sign in
only one application
using single username
and passwords. Specific
server does the process
of authentication for
remaining applications.
Login
Times
User needs to login
each and every
time, to get access
to applications.
User needs to login only
once.
Manage
Credential
Data
Only management
of password
required.
Specific mechanism is
required for the client
such as refreshing and
validation of tokens.
Password
Policy
For all applications
same password is
the weakest policy.
One strong password is
better than password
synchronization.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 310
4. PROPOSED SYSTEM
In our proposed work the architecture of Single Sign On is
suggested in cross cloud manner. An admin cloud is used to
maintain the login sessions and generating the identifiers for
the each application’s accessing process. The user credentials
are used to form the tokens. The tokens are the encrypted form
of the user credentials and the physical address (machine key)
of the user machine.
The tokens are used under the supervision of admin who
checks the validation of the request send by the user. The
admin works as an access manager. Initially users have to send
the user credentials for the first time login process. Admin
gives token as authorization to get access for the remaining
applications.
The tokens generated by the admin clouds contain session
information about the authorised user. Session is a data
structure in the access manager memory that contains
information about an authorised user. The admin cloud is
responsible for the generation of session identifiers which are
responsible for time dependent behaviours of users.
Fig -2: Scenario of cross cloud single sign on
A security problem occurs in the above scenario is that if user
is not active at the application, another user tries to get access
for another application then admin generate a request to user
asking for the user credentials. The request generation is
refreshing mechanism.
To sign out user just only need to click on sign out logo which
make user to free from the sign out process of individual
applications and destroys all the tokens. The destruction of
tokens stops the use of history recalling from the user side and
inhibit the intruder to use the tokens [3].
5. WORKING
The working of single sign on is performed in the following
manner and illustrated in the figure 3.
1. The user first authenticate for the first application accessing
procedure
2. The authenticated user request another protected application
from another cloud.
3. As the request does not include an app-token, the
application server constructs a request-token which is
encrypted by a session key shared between the applications
cloud and the admin cloud. The user is redirected to the admin
cloud along with the request-token.
Fig -3: Working of single sign on
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 311
4. The admin cloud decrypt the request-token using the
session key and detects the user has a valid token. It constructs
an id-token and then returns URL, which will contain the
response-token, as well as the requested-token.
5. The user is redirected to the original resource, along with
the id-token.
6. The application cloud checks the id-token, rewrites the id-
token into an app-token, and creates an app-token to be placed
into a cookie for future requests.
7. User’s browser saves the app-token cookie; the application
serves the original request to the user.
8. Logging out of an application involves deleting all the
session cookies associated with this application on the server.
6. BENEFITS
The implementation of cross cloud single sign on system
improves the productivity of employee with less time users
spend logging into so many applications and it also reduces
the workload of the helpdesks for recovering the forgotten
passwords. Employee productivity is dramatically improved,
with less time users spend logging into multiple applications
and recovering the forgotten passwords.
Another benefit of this system is that it increases the system
security potentially by the user to choose a single complex and
more secure password instead of using multiple simple and
insecure passwords. SSO effectively reduces the password-
related workload to the helpdesk and lowers the costs
associated with managing passwords across multiple
distributed applications.
7. CONCLUSIONS
In cloud computing, Software as a Service application uses the
username/password scheme for the authentication purpose.
The implementation of private admin cloud with common
database for multiple applications of various clouds can
improve the security and remove the password problem.
The proposed system can also be helpful for all cloud service
provider to get the benefits of secure cross cloud single sign
on and the e-government sector where data sensitivity is very
high, cross cloud SSO helps government employee and users
to handle data of various departments like health, finance,
payment etc.
It is possible to implement the SSO concept which increase
the security level of users who manages passwords manually.
It also enables the user to use more secure passwords
REFERENCES
[1]. Shuai Z; Shufen Z; Xuebin C; Xiuzhen H; “Cloud
Computing Research and Development Trend”, 2nd
International conference on Future Networks, 2010. ICFN '
10.pp 23, 22-24 Jan 2010.
[2]. Chang, L, Ti ; Chin L; Chang, A.Y.; Chun J, C;(2010), “
Information security issue of enterprises adopting the
application of cloud computing”, IEEE 2010 Sixth
International Conference on Networked Computing and
Advanced Information Management (NCM),pp 645, 16-18
Aug. 2010.
[3]. ”Kerberos: The Definitive Guide”, Jason Garman
[4]. Kessler "Passwords - Strengths and Weaknesses", Internet
and Networking Security, Auerbach, 1997.
[5]. M-tech Information Company, “Definition of Password
Synchronization”, 2005
http://mtechit.com/concepts/password_synchronization.html
BIOGRAPHIES
Priyanka Patil has received the Diploma in
the Computer Science And Engineering from
R.G.T.U., Bhopal [M.P.] in 2011 and is
pursuing B.E Degree in C.S.E. from
S.R.M.C.E.W,Nagpur, Maharashtra INDIA.
Her field of interest is Computer Networking & Security.
Snehal S. Talokar, is pursuing B.E Degree in
C.S.E. from S.R.M.C.E.W, Nagpur,
Maharashtra India. Her field of interest is
VB.Net.
Vishakha Gonnade, is pursuing B.E Degree
in C.S.E. from S.R.M.C.E.W, Nagpur,
Maharashtra India. Her field of interest is
Cloud Computing.
Vaishali Bhagat has received the BE Degree
in Information Technology from RTMNU,
Maharashtra, India in 2008 & pursuing M.
Tech in CSE from RTMNU. Since 2010, she
is working in the department of IT as a
lecturer in SRMCEW, Nagpur, and Maharashtra, India.

More Related Content

PDF
Advanced mechanism for single sign on for distributed computer networks
PDF
Database Security Two Way Authentication Using Graphical Password
PDF
Design and Implementation of Enhanced Single Sign on System for Education Sys...
PDF
I1804015458
PDF
Effectiveness of various user authentication techniques
PDF
IRJET - Graphical Password Authentication for Banking System
PDF
Dr. ritu soni
PDF
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
Advanced mechanism for single sign on for distributed computer networks
Database Security Two Way Authentication Using Graphical Password
Design and Implementation of Enhanced Single Sign on System for Education Sys...
I1804015458
Effectiveness of various user authentication techniques
IRJET - Graphical Password Authentication for Banking System
Dr. ritu soni
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS

What's hot (19)

PDF
User Identity Verification Using Mouse Signature
PDF
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
PDF
Online Signature Authentication by Using Mouse Behavior
PDF
An Overview on Authentication Approaches and Their Usability in Conjunction w...
PDF
Secure Internet Voting System
DOC
Authentication Models
PDF
Security for Future Networks: A Prospective Study of AAIs
PDF
IRJET - Scrutinize the Utility of Preserved Data with Privacy
PDF
Continuous and Transparent User Identity Verification for Secure Internet Ser...
PDF
IRJET- Web Application for Secured Two Factor Authentication
PDF
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
PDF
IRJET - TTL: Tap to Login
PDF
Prevention of SQL injection in E- Commerce
PPTX
SQL injection
PDF
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
PDF
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
PDF
Remote Exploitation of the Dropbox SDK for Android
PDF
SpoofedMe - Intruding Accounts using Social Login Providers
User Identity Verification Using Mouse Signature
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
Online Signature Authentication by Using Mouse Behavior
An Overview on Authentication Approaches and Their Usability in Conjunction w...
Secure Internet Voting System
Authentication Models
Security for Future Networks: A Prospective Study of AAIs
IRJET - Scrutinize the Utility of Preserved Data with Privacy
Continuous and Transparent User Identity Verification for Secure Internet Ser...
IRJET- Web Application for Secured Two Factor Authentication
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
IRJET - TTL: Tap to Login
Prevention of SQL injection in E- Commerce
SQL injection
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
Remote Exploitation of the Dropbox SDK for Android
SpoofedMe - Intruding Accounts using Social Login Providers
Ad

Viewers also liked (20)

PDF
A study on push pull analysis associated with awkward
PDF
Design of digital video watermarking scheme using matlab simulink
PDF
Improving the efficiency of weigher using plc controller
PDF
Industrial application of machine vision
PDF
Treatment of kitchen waste by microbial culture
PDF
Effects on p h behaviour of expansive and non expansive soils contaminated wi...
PDF
Theoretical flexural behavior of sandwich panel using
PDF
Study on security and quality of service implementations in p2 p overlay netw...
PDF
Life cycle assessment and simulation enablers of sustainable product design
PDF
Image fusion using nsct denoising and target extraction for visual surveillance
PDF
Hci and its effective use in design and development of good user interface
PDF
Fpga based interfacing for 8-bit and 32-bit electronic devices
PDF
Managing over allocation of resource in steel
PDF
Implementation of a bit error rate tester of a wireless communication system ...
PDF
Use of location aided algorithm using wi fi in indoor
PDF
Vibgyor a sustainability assessment tool for residential building
PDF
A great land mark to achieve 4 g mobile communications
PDF
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
PDF
Design and development of electro optical system for acquisition of ppg signa...
PDF
Analysis of energy efficiency aspects in energy management
A study on push pull analysis associated with awkward
Design of digital video watermarking scheme using matlab simulink
Improving the efficiency of weigher using plc controller
Industrial application of machine vision
Treatment of kitchen waste by microbial culture
Effects on p h behaviour of expansive and non expansive soils contaminated wi...
Theoretical flexural behavior of sandwich panel using
Study on security and quality of service implementations in p2 p overlay netw...
Life cycle assessment and simulation enablers of sustainable product design
Image fusion using nsct denoising and target extraction for visual surveillance
Hci and its effective use in design and development of good user interface
Fpga based interfacing for 8-bit and 32-bit electronic devices
Managing over allocation of resource in steel
Implementation of a bit error rate tester of a wireless communication system ...
Use of location aided algorithm using wi fi in indoor
Vibgyor a sustainability assessment tool for residential building
A great land mark to achieve 4 g mobile communications
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Design and development of electro optical system for acquisition of ppg signa...
Analysis of energy efficiency aspects in energy management
Ad

Similar to Cross cloud single sign on (sso) using tokens (20)

PDF
International Journal of Engineering Inventions (IJEI)
PDF
Efficient and Secure Single Sign on Mechanism for Distributed Network
PDF
Two Aspect Validation Control Frameworks for Online Distributed Services
PDF
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
PDF
Automated login method selection in a multi modal authentication - login meth...
PDF
Automated login method selection in a multi modal authentication - login meth...
PDF
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
PDF
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
PDF
Secure multiple bank transaction log a case study
PDF
IRJET- Multi sharing Data using OTP
PDF
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
PDF
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
PDF
A secure communication in smart phones using two factor authentications
PDF
A secure communication in smart phones using two factor authentication
PDF
Single sign on mechanism for distributed computing
PDF
IRJET- Smart Mobile Attendance System using Bluetooth Technology
PDF
publishable paper
PDF
IRJET- Survey on Blockchain based Digital Certificate System
PDF
Online dating system management project report.pdf
PDF
The Ultimate Guide to SSO Portals: Streamlining Access to Digital Services
International Journal of Engineering Inventions (IJEI)
Efficient and Secure Single Sign on Mechanism for Distributed Network
Two Aspect Validation Control Frameworks for Online Distributed Services
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
Secure multiple bank transaction log a case study
IRJET- Multi sharing Data using OTP
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentication
Single sign on mechanism for distributed computing
IRJET- Smart Mobile Attendance System using Bluetooth Technology
publishable paper
IRJET- Survey on Blockchain based Digital Certificate System
Online dating system management project report.pdf
The Ultimate Guide to SSO Portals: Streamlining Access to Digital Services

More from eSAT Publishing House (20)

PDF
Likely impacts of hudhud on the environment of visakhapatnam
PDF
Impact of flood disaster in a drought prone area – case study of alampur vill...
PDF
Hudhud cyclone – a severe disaster in visakhapatnam
PDF
Groundwater investigation using geophysical methods a case study of pydibhim...
PDF
Flood related disasters concerned to urban flooding in bangalore, india
PDF
Enhancing post disaster recovery by optimal infrastructure capacity building
PDF
Effect of lintel and lintel band on the global performance of reinforced conc...
PDF
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
PDF
Wind damage to buildings, infrastrucuture and landscape elements along the be...
PDF
Shear strength of rc deep beam panels – a review
PDF
Role of voluntary teams of professional engineers in dissater management – ex...
PDF
Risk analysis and environmental hazard management
PDF
Review study on performance of seismically tested repaired shear walls
PDF
Monitoring and assessment of air quality with reference to dust particles (pm...
PDF
Low cost wireless sensor networks and smartphone applications for disaster ma...
PDF
Coastal zones – seismic vulnerability an analysis from east coast of india
PDF
Can fracture mechanics predict damage due disaster of structures
PDF
Assessment of seismic susceptibility of rc buildings
PDF
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
PDF
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Likely impacts of hudhud on the environment of visakhapatnam
Impact of flood disaster in a drought prone area – case study of alampur vill...
Hudhud cyclone – a severe disaster in visakhapatnam
Groundwater investigation using geophysical methods a case study of pydibhim...
Flood related disasters concerned to urban flooding in bangalore, india
Enhancing post disaster recovery by optimal infrastructure capacity building
Effect of lintel and lintel band on the global performance of reinforced conc...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Shear strength of rc deep beam panels – a review
Role of voluntary teams of professional engineers in dissater management – ex...
Risk analysis and environmental hazard management
Review study on performance of seismically tested repaired shear walls
Monitoring and assessment of air quality with reference to dust particles (pm...
Low cost wireless sensor networks and smartphone applications for disaster ma...
Coastal zones – seismic vulnerability an analysis from east coast of india
Can fracture mechanics predict damage due disaster of structures
Assessment of seismic susceptibility of rc buildings
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...

Recently uploaded (20)

PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
PPT on Performance Review to get promotions
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Lecture Notes Electrical Wiring System Components
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Sustainable Sites - Green Building Construction
PPTX
additive manufacturing of ss316l using mig welding
PDF
composite construction of structures.pdf
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
web development for engineering and engineering
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
bas. eng. economics group 4 presentation 1.pptx
PPT on Performance Review to get promotions
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Lecture Notes Electrical Wiring System Components
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Sustainable Sites - Green Building Construction
additive manufacturing of ss316l using mig welding
composite construction of structures.pdf
Model Code of Practice - Construction Work - 21102022 .pdf
Automation-in-Manufacturing-Chapter-Introduction.pdf
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
R24 SURVEYING LAB MANUAL for civil enggi
web development for engineering and engineering
CYBER-CRIMES AND SECURITY A guide to understanding

Cross cloud single sign on (sso) using tokens

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 308 CROSS CLOUD SINGLE SIGN ON (SSO) USING TOKENS Priyanka Patil1 , Snehal S. Talokar2 , Vishakha Gonnade3 , Vaishali Bhagat4 1, 2, 3 Student, Computer Science and Engineering, SRMCEW, Maharashtra, India 4 Lecturer, Information Technology, SRMCEW, Maharashtra, India Abstract The cloud computing service provider ensures the security of their services by username/password schemes. Such type of scheme may be suitable for small personalized services but not for the large scale organizations where employees may require to login for more than one application related to various clouds. This paper identifies the issues of multiple logins and presents how multiple applications of various clouds are accessed by single login process securely. Single Sign-On is the mechanism where a user only need to authenticate him/her self once, then has the ability to access other protected resources without having to re-authenticate. Our objective is to design the single sign on architecture for more than one cloud’s applications. Due to that client log in only one time at time and automatically user login in remaining cloud applications and assess successful same process is for log out only user logout once then user logout properly from the all of the cloud applications. The login audits are done for the security purpose and its controlling by admin panel. Cloud service providers also neither need to support redundant registration process for new accounts of applications nor dealing with enormous databases for same user of multiple applications and managing multiple authentication credentials is annoying for users and as well as for authentication system. In other words, Single sign-on (SSO) is the mechanism whereby a single action of user authentication and authorization can permit a user to access all computers and systems where that user has access permission, without the need to enter multiple passwords. Keywords: Cloud Computing, Password Synchronization, Refreshing Mechanism, Session ID, Tokens. ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION Cloud computing is known as On-Demand computing and one of the latest emerging topics in IT industry. The cloud computing provide the services over the internet. The services include applications, system hardware, collection of resources on request etc. Cloud classification is done on their usage mode, if cloud is available for the general users on pay basis according to their usage basis then it is called public cloud. If the customer develops their own applications and run on their own infrastructure then it is called private cloud. Integration of these two clouds is called hybrid cloud. Community cloud shares infrastructure between several organizations from a specific community with common concerns whether managed internally or by a third-party and hosted internally or externally. The costs are spread over fewer users than a public cloud but more than a private cloud. The current scenario of web applications forces user to remember the user credentials which make trouble to remembering large number of identities and associated password for the applications. In cloud computing the similar problem faced by the user. This document gives the information about the implementation of Single Sign On (SSO) in cross cloud arrangement. The following section contains the survey related to the growth of cloud, security aspect, cloud is the first priority to the vendors, revenue report, future and current usage, state of cloud to the IT users and popularity survey of cloud computing. 1.1 Cloud Growth The survey conducted by International Data Corporation (IDC) shows the strength of cloud computing to be implemented in IT industry and gives the potential inspiration to CSP. The Table 1 shows the cloud growth from year 2008 to 2012[1]. Table -1: Cloud Growth Year 2008 2012 Growth Cloud IT spending $ 16 B $42 B 27% Total IT spending $383 B $ 494 B 7% Total-cloud spend $367 B $ 452 B 4%
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 309 1.2 Cloud Security Survey The following figure indicates that security as first rank according to IT executives. This information is also collected from two hundred six three IT professional by asking different question related to the cloud, and many of the executives are worried about security perspective of cloud. The Fig. 2.1 shows the survey on security [2]. Fig -1: Cloud security survey 1.3 Objective The aim of our research is to suggest a design of the single sign on web application in cross cloud manner. Due to that client log in only once, at the time of opening first application and automatically user get login in remaining applications and access successful without re-authentication process which makes user free from remembering user credentials. 2. EXISTING SYSTEM Currently most common authentication approached used by the cloud service provider is user credentials (i.e. username and password) which requires each cloud service provider host its own and separate user management system. The main problem with this system is that for accessing services of various cloud service providers user have to register first and secondly user have to authenticate for each services. Another problem with the existing system is those users have to manage individual username/password pair for each cloud service provider which becomes impractical to expect from user to remember different user credentials for each applications. 3. PASSWORD SYNCRONIZATION The password synchronization is the process of changing each password for different applications to the same value, so that the user always enters the same password. Once you implement password synchronization technique, users will enter the same password when they login to any of the synchronized systems, such as to their network, finance system, e-mail, calendar or the mainframe. In other words the password synchronisation is the implementation of same password for each and every applications or system. But using the same password is the weakest policy for the security of system [4] where in SSO only one password is used as similar to password synchronisation but we can ensure the security by using the strong policy. Another important point is that in password synchronisation [5] user still have to login in each application or system. In single sign on user needs to login once for the primary authentication only then user become authorised to access the all available applications. Following is the comparative table of password synchronization and single sign on. Table -2: Comparison of Password Synchronisation and Single Sign On Parameters Password Synchronization Single Sign-on Process It is very simple process user change all passwords of application to the same password. User needs to sign in only one application using single username and passwords. Specific server does the process of authentication for remaining applications. Login Times User needs to login each and every time, to get access to applications. User needs to login only once. Manage Credential Data Only management of password required. Specific mechanism is required for the client such as refreshing and validation of tokens. Password Policy For all applications same password is the weakest policy. One strong password is better than password synchronization.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 310 4. PROPOSED SYSTEM In our proposed work the architecture of Single Sign On is suggested in cross cloud manner. An admin cloud is used to maintain the login sessions and generating the identifiers for the each application’s accessing process. The user credentials are used to form the tokens. The tokens are the encrypted form of the user credentials and the physical address (machine key) of the user machine. The tokens are used under the supervision of admin who checks the validation of the request send by the user. The admin works as an access manager. Initially users have to send the user credentials for the first time login process. Admin gives token as authorization to get access for the remaining applications. The tokens generated by the admin clouds contain session information about the authorised user. Session is a data structure in the access manager memory that contains information about an authorised user. The admin cloud is responsible for the generation of session identifiers which are responsible for time dependent behaviours of users. Fig -2: Scenario of cross cloud single sign on A security problem occurs in the above scenario is that if user is not active at the application, another user tries to get access for another application then admin generate a request to user asking for the user credentials. The request generation is refreshing mechanism. To sign out user just only need to click on sign out logo which make user to free from the sign out process of individual applications and destroys all the tokens. The destruction of tokens stops the use of history recalling from the user side and inhibit the intruder to use the tokens [3]. 5. WORKING The working of single sign on is performed in the following manner and illustrated in the figure 3. 1. The user first authenticate for the first application accessing procedure 2. The authenticated user request another protected application from another cloud. 3. As the request does not include an app-token, the application server constructs a request-token which is encrypted by a session key shared between the applications cloud and the admin cloud. The user is redirected to the admin cloud along with the request-token. Fig -3: Working of single sign on
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 311 4. The admin cloud decrypt the request-token using the session key and detects the user has a valid token. It constructs an id-token and then returns URL, which will contain the response-token, as well as the requested-token. 5. The user is redirected to the original resource, along with the id-token. 6. The application cloud checks the id-token, rewrites the id- token into an app-token, and creates an app-token to be placed into a cookie for future requests. 7. User’s browser saves the app-token cookie; the application serves the original request to the user. 8. Logging out of an application involves deleting all the session cookies associated with this application on the server. 6. BENEFITS The implementation of cross cloud single sign on system improves the productivity of employee with less time users spend logging into so many applications and it also reduces the workload of the helpdesks for recovering the forgotten passwords. Employee productivity is dramatically improved, with less time users spend logging into multiple applications and recovering the forgotten passwords. Another benefit of this system is that it increases the system security potentially by the user to choose a single complex and more secure password instead of using multiple simple and insecure passwords. SSO effectively reduces the password- related workload to the helpdesk and lowers the costs associated with managing passwords across multiple distributed applications. 7. CONCLUSIONS In cloud computing, Software as a Service application uses the username/password scheme for the authentication purpose. The implementation of private admin cloud with common database for multiple applications of various clouds can improve the security and remove the password problem. The proposed system can also be helpful for all cloud service provider to get the benefits of secure cross cloud single sign on and the e-government sector where data sensitivity is very high, cross cloud SSO helps government employee and users to handle data of various departments like health, finance, payment etc. It is possible to implement the SSO concept which increase the security level of users who manages passwords manually. It also enables the user to use more secure passwords REFERENCES [1]. Shuai Z; Shufen Z; Xuebin C; Xiuzhen H; “Cloud Computing Research and Development Trend”, 2nd International conference on Future Networks, 2010. ICFN ' 10.pp 23, 22-24 Jan 2010. [2]. Chang, L, Ti ; Chin L; Chang, A.Y.; Chun J, C;(2010), “ Information security issue of enterprises adopting the application of cloud computing”, IEEE 2010 Sixth International Conference on Networked Computing and Advanced Information Management (NCM),pp 645, 16-18 Aug. 2010. [3]. ”Kerberos: The Definitive Guide”, Jason Garman [4]. Kessler "Passwords - Strengths and Weaknesses", Internet and Networking Security, Auerbach, 1997. [5]. M-tech Information Company, “Definition of Password Synchronization”, 2005 http://mtechit.com/concepts/password_synchronization.html BIOGRAPHIES Priyanka Patil has received the Diploma in the Computer Science And Engineering from R.G.T.U., Bhopal [M.P.] in 2011 and is pursuing B.E Degree in C.S.E. from S.R.M.C.E.W,Nagpur, Maharashtra INDIA. Her field of interest is Computer Networking & Security. Snehal S. Talokar, is pursuing B.E Degree in C.S.E. from S.R.M.C.E.W, Nagpur, Maharashtra India. Her field of interest is VB.Net. Vishakha Gonnade, is pursuing B.E Degree in C.S.E. from S.R.M.C.E.W, Nagpur, Maharashtra India. Her field of interest is Cloud Computing. Vaishali Bhagat has received the BE Degree in Information Technology from RTMNU, Maharashtra, India in 2008 & pursuing M. Tech in CSE from RTMNU. Since 2010, she is working in the department of IT as a lecturer in SRMCEW, Nagpur, and Maharashtra, India.