Improving Privacy and Trust in Federated Identity Using SAML with Hash Based Encryption Algorithm

被引:0
|
作者
George, Jissy Ann [1 ]
Veni, S. [2 ]
Soomroo, Safeeullah [3 ]
机构
[1] AMA Int Univ, Coll Adm & Financial Serv, Salmabad, Bahrain
[2] Karpagam Univ, Dept Comp Sci, Coimbatore, Tamil Nadu, India
[3] AMA Int Univ, Coll Comp Studies, Salmabad, Bahrain
关键词
Cloud security; identity provider; Security Assertion Markup Language; Single sign-on; Hash Based Encryption;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing is an upcoming technology that has been designed for commercial needs. One of the major issues in cloud computing is the difficulty to manage federated identities and the trust between the user and the service providers. This paper focuses on how security can be provided between the user and the service provider and how the user information can be authenticated. For the purpose of providing privacy and authentication, Security Assertion Markup Language (SAML) based Single Sign-On is used. Security is provided by using Hash based Encryption algorithm (HBE). HBE algorithm works with the help of Key Exchange Protocol which contains poly hash function. In the algorithm, Identity providers maintain user directory and authenticates user information; service provider provides the service to users. The user has to register their details with the identity provider prior to this. During this stage, Hash based Encryption algorithm is used to provide secure communication between the identity provider and the user. In this paper we suggest that higher security can be given to user login by using an additional cryptographic technique, i.e. Hash based Encryption algorithm with the help of the Key Exchange Protocol.
引用
下载
收藏
页数:5
相关论文
共 50 条
  • [31] Improving Security in a Virtual Network by Using Attribute Based Encryption Algorithm
    Wilson, Vinil
    Krishnan, Ajeesh G.
    PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [32] A privacy encryption algorithm based on an improved chaotic system
    Wang, Xingyuan
    Wang, Yu
    Unar, Salahuddin
    Wang, Mingxu
    Wang Shibing
    OPTICS AND LASERS IN ENGINEERING, 2019, 122 : 335 - 346
  • [33] A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption
    Zwattendorfer, Bernd
    Slamanig, Daniel
    Stranacher, Klaus
    Hoerandner, Felix
    COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2014, 2014, 8735 : 92 - 103
  • [34] Cloud-Based Utility Service Framework for Trust Negotiations Using Federated Identity Management
    Premarathne, Uthpala Subodhani
    Khalil, Ibrahim
    Tari, Zahir
    Zomaya, Albert
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (02) : 290 - 302
  • [35] RETRACTED ARTICLE: An improved source location privacy protection using adaptive trust sector-based authentication with honey encryption algorithm in WSN
    A. Arivarasi
    P. Ramesh
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 9 - 9
  • [36] A Remote-Attestation-Based Extended Hash Algorithm for Privacy Protection
    Zhang, Yongxiong
    You, Yucong
    Wang, Liangming
    Yi, Luxia
    2017 INTERNATIONAL CONFERENCE ON COMPUTER NETWORK, ELECTRONIC AND AUTOMATION (ICCNEA), 2017, : 254 - 257
  • [37] A chaos based image encryption and lossless compression algorithm using hash table and Chinese Remainder Theorem
    Brindha, M.
    Gounden, N. Ammasai
    APPLIED SOFT COMPUTING, 2016, 40 : 379 - 390
  • [38] Presentation of encryption method for RGB images based on an evolutionary algorithm using chaos functions and hash tables
    Hesam Omranpour
    Zeynab Mohammadi Ledari
    Masoumeh Taheri
    Multimedia Tools and Applications, 2023, 82 : 9343 - 9360
  • [39] Improving on-device speaker verification using federated learning with privacy
    Granqvist, Filip
    Seigel, Matt
    van Dalen, Rogier
    Cahill, Aine
    Shum, Stephen
    Paulik, Matthias
    INTERSPEECH 2020, 2020, : 4328 - 4332
  • [40] Presentation of encryption method for RGB images based on an evolutionary algorithm using chaos functions and hash tables
    Omranpour, Hesam
    Ledari, Zeynab Mohammadi
    Taheri, Masoumeh
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (06) : 9343 - 9360