Rinky G. Chhatwani et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.6, June- 2014, pg. 623-632
© 2014, IJCSMC All Rights Reserved 623
Available Online at www.ijcsmc.com
International Journal of Computer Science and Mobile Computing
A Monthly Journal of Computer Science and Information Technology
ISSN 2320–088X
IJCSMC, Vol. 3, Issue. 6, June 2014, pg.623 – 632
RESEARCH ARTICLE
Implementation of Single Sign-On
Mechanism for Distributed Computing
MS. Rinky G. Chhatwani
1
Dr.D.G.Harkut
2
M.E 2
nd
yr, PRMCEAM, Badnera H.O.D, PRMCEAM, Badnera
rinkychhatwani@gmail.com
1
dg.harkut@gmail.com
2
Abstract: With wide spreading of distributed computer networks, it has become popular to allow users accessing
various network services offered by distributed service providers. It is usually not practical by asking one user to
maintain different pairs of identity and passwords for different service providers, since this could increase the
workload of both users and service providers as well as the communication overhead of networks. So, for this it
requires a single sign-on authentication mechanism that is a single login for multiple service providers, which
would not increase the workload. There are various attacks and parameters that need to be considered while
providing security to authentication system. In this paper, we provide a comprehensive review of existing work
done on Single sign-on. Then for security of single sign-on, what parameters and attacks should be covered.
Next, Implementation of Single Sign-on for distributed computing using user-id and password along with
biometric verification. Then security analysis is done. Next, we present the comparison and lastly we conclude,
specifying the future work.
Keywords: Authentication, Soundness, Anonymity, Single sign-On, Biometrics, security
1. INTRODUCTION
In insecure network environments, Communication securely through open network is one of the common
necessities. Cryptography is one of the primary tools for providing better security. The primary goals or aspects of
security are data confidentiality, data integrity, and authentication [42]. Single Sign-on means that after obtaining a
credential from a trusted authority, each legal user can use this single credential to authenticate itself and then access
multiple service providers.
Three methods can be used for secure Single Sign-On.
1. Cryptography based.
2. Using Smart Card.
3. Biometric based.