Cross-domain single sign-on authentication of information security in network environment

被引:0
|
作者
Cui A.-J. [1 ,2 ]
Wang W. [2 ]
Zhang H.-F. [2 ]
Ma Y.-H. [2 ]
Li C. [3 ]
Wang X.-M. [1 ]
机构
[1] College of Electronical and Information Engineering, Lanzhou University of Technology, Lanzhou
[2] State Grid Gansu Electric Power Company, Lanzhou
[3] College of Foreign Languages, Lanzhou University of Technology, Lanzhou
关键词
Cross-domain single sign-on; Network security; Parameter information; Revocation of authentication;
D O I
10.1504/IJICT.2021.111924
中图分类号
学科分类号
摘要
Aiming at the problems of long response time, poor security and information integrity in cross-domain single sign-on authentication research of network security, this paper proposes a cross-domain single sign-on authentication method based on SAML, including the design of login authentication control and revocation authentication scheme. In login authentication, efficient interaction between identity providers and service providers reduces unnecessary steps to achieve single sign-on. At the same time, a revocation scheme based on cumulative function is proposed to ensure that the local root signature is used for system parameter information, thus further ensuring network security. The experimental results show that the login time of the proposed method is below 400 ms, and the login response takes a short time. The success rate of the proposed method against false login is over 90%, and the security is good. The data packet loss rate of this method is below 2%, high integrity and reliability. © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:89 / 104
页数:15
相关论文
共 50 条
  • [1] The Application of Cross-domain Single Sign-on in Municipal Portal
    Hu, Hongtao
    Guo, Zifang
    2013 IEEE INTERNATIONAL CONFERENCE OF IEEE REGION 10 (TENCON), 2013,
  • [2] Single Sign-on System Security Authentication Model Research
    Liu, Yiqin
    2016 ISSGBM INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND SOCIAL SCIENCES (ISSGBM-ICS 2016), PT 3, 2016, 68 : 494 - 498
  • [3] Security Vulnerabilities in SAML based Single Sign-On Authentication in Cloud
    Kaur, Kirandeep
    Bansal, Divya
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 294 - 298
  • [4] Single sign-on and access control for network security service
    Kim, T
    Roh, JH
    Choi, D
    Cho, Y
    Jin, S
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 357 - 360
  • [5] Security methods and approaches for internal and external network hospital information systems with single sign-on
    Kardaras, Konstantinos
    Lambrou, George I.
    Koutsouris, Dimitrios
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2019, 11 (04) : 434 - 446
  • [6] Enabling Single Sign-On Authentication for Web Repositories using Domain Directory Services
    Kurian, Jayan C.
    Goh, Dion Hoe-Lian
    Htoo, Tint Hla Hla
    Wheeler, Lynn
    Hazel, Loh
    INTERNATIONAL SYMPOSIUM OF INFORMATION TECHNOLOGY 2008, VOLS 1-4, PROCEEDINGS: COGNITIVE INFORMATICS: BRIDGING NATURAL AND ARTIFICIAL KNOWLEDGE, 2008, : 48 - +
  • [7] Towards cross-middleware authentication and single sign-on for ARC Grid middleware
    Qiang, Weizhong
    Konstantinov, Aleksandr
    COMPUTER SCIENCE-RESEARCH AND DEVELOPMENT, 2009, 23 (3-4): : 267 - 274
  • [8] A Single Sign-On Scheme for Cross Domain Web Applications Based on SOA
    He, Enze
    Wen, Qiaoyan
    INTERNET OF THINGS-BK, 2012, 312 : 581 - 589
  • [9] Security Key Management Protocol for Cross-domain Authentication of Internet of Vehicles
    Cui, Meili
    Ning, Zhenhu
    Gao, Junchen
    Peng, Jin
    2024 4TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING, ICICSE 2024, 2024, : 126 - 130
  • [10] A method for improving the security of blockchain-based cross-domain authentication
    Kong, Lingrui
    Wang, Jizhi
    Zhao, Yue
    Sui, Tongtong
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 177 - 183