Professional Documents
Culture Documents
G.Suresh Reddy
Assoc.Professor & HOD
Department of Information and Technology
Abstract
single sign-on(SSO) provides access to many
resources once the user is initially authenticated .
it increases the negative impact in case the
credentials are available to other persons and
misused.
Therefore, single sign-on requires an increased
focus on the protection of the user credentials,
and should ideally be combined with strong
authentication methods
Conti
Credential privacy
Soundness of authentication
Existing system
Password based authentication
Two-Factor Authentication technique
With the increasing usage of network
services, a user may need to maintain more
and more ID/password pairs for accessing
different distributed service providers.
Existing SSO schemes which are failed to
provide security
Disadvantages of Existing
In Password based authentication security is
not reliable since leaking of the table could
lead to system breakage.
Two factor scheme vulnerable to
impersonation attacks.
* Credential privacy & soundness of
authentication
Proposed system
Single sign on mechanism to access the multi
service provider.
Mutual authentication
General RSA for service provider authentication
Standard RSA signature for user authentication
management
of
users
accounts
and
administrative
overhead
in
resetting
Modules
Initiation for key distribution
User registration for validation
Provider side User identification
Secure signature generation
Secure RSA VES scheme for authentication.
Dataflow
diagram
start
Initiation phase
Prime selection
&form key
generation
Authentication phase
end
chec
k
valid
User request
send
Service provider
receive
verify
invalid
User access
ER Diagram
Class diagram
Sequence diagram
conclusion
SSO scheme protect against two basic requirements.
Soundness- An unregistered user without a credential
should not be able to access the services offered by
service providers.
Credential privacy guarantees that colluded dishonest
service providers should not be able to fully recover a
users credential and then impersonate the user to log
in other service providers.
THANK YOU