Improving Privacy and Trust in Federated Identity Using SAML with Hash Based Encryption Algorithm

被引:0
|
作者
George, Jissy Ann [1 ]
Veni, S. [2 ]
Soomroo, Safeeullah [3 ]
机构
[1] AMA Int Univ, Coll Adm & Financial Serv, Salmabad, Bahrain
[2] Karpagam Univ, Dept Comp Sci, Coimbatore, Tamil Nadu, India
[3] AMA Int Univ, Coll Comp Studies, Salmabad, Bahrain
关键词
Cloud security; identity provider; Security Assertion Markup Language; Single sign-on; Hash Based Encryption;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing is an upcoming technology that has been designed for commercial needs. One of the major issues in cloud computing is the difficulty to manage federated identities and the trust between the user and the service providers. This paper focuses on how security can be provided between the user and the service provider and how the user information can be authenticated. For the purpose of providing privacy and authentication, Security Assertion Markup Language (SAML) based Single Sign-On is used. Security is provided by using Hash based Encryption algorithm (HBE). HBE algorithm works with the help of Key Exchange Protocol which contains poly hash function. In the algorithm, Identity providers maintain user directory and authenticates user information; service provider provides the service to users. The user has to register their details with the identity provider prior to this. During this stage, Hash based Encryption algorithm is used to provide secure communication between the identity provider and the user. In this paper we suggest that higher security can be given to user login by using an additional cryptographic technique, i.e. Hash based Encryption algorithm with the help of the Key Exchange Protocol.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Image encryption algorithm based on lattice hash function and privacy protection
    Wang, Yu
    Chen, Liquan
    Yu, Kunliang
    Lu, Tianyu
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (13) : 18251 - 18277
  • [2] Image encryption algorithm based on lattice hash function and privacy protection
    Yu Wang
    Liquan Chen
    Kunliang Yu
    Tianyu Lu
    [J]. Multimedia Tools and Applications, 2022, 81 : 18251 - 18277
  • [3] Using XACML for privacy control in SAML-based identity federations
    Hommel, W
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 3677 : 160 - 169
  • [4] Improving User Privacy in Identity-Based Encryption Environments
    Adams, Carlisle
    [J]. CRYPTOGRAPHY, 2022, 6 (04)
  • [5] A hash-based image encryption algorithm
    Cheddad, Abbas
    Condell, Joan
    Curran, Kevin
    McKevitt, Paul
    [J]. OPTICS COMMUNICATIONS, 2010, 283 (06) : 879 - 893
  • [6] Privacy Preserving Federated Learning Using CKKS Homomorphic Encryption
    Qiu, Fengyuan
    Yang, Hao
    Zhou, Lu
    Ma, Chuan
    Fang, LiMing
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 427 - 440
  • [7] Privacy Preservation using Federated Learning and Homomorphic Encryption: A Study
    Ajay, D. M.
    [J]. 2022 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2022, : 451 - 458
  • [8] Privacy-Preserving Federated Learning Using Homomorphic Encryption
    Park, Jaehyoung
    Lim, Hyuk
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (02):
  • [9] A Hash-Based Fast Image Encryption Algorithm
    Han, Ruifeng
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [10] Research on Wireless Data Encryption Based on Hash Algorithm
    Gao Hongtao
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL II, 2010, : 377 - 380