Cross-domain single sign-on authentication of information security in network environment

被引:0
|
作者
Cui A.-J. [1 ,2 ]
Wang W. [2 ]
Zhang H.-F. [2 ]
Ma Y.-H. [2 ]
Li C. [3 ]
Wang X.-M. [1 ]
机构
[1] College of Electronical and Information Engineering, Lanzhou University of Technology, Lanzhou
[2] State Grid Gansu Electric Power Company, Lanzhou
[3] College of Foreign Languages, Lanzhou University of Technology, Lanzhou
关键词
Cross-domain single sign-on; Network security; Parameter information; Revocation of authentication;
D O I
10.1504/IJICT.2021.111924
中图分类号
学科分类号
摘要
Aiming at the problems of long response time, poor security and information integrity in cross-domain single sign-on authentication research of network security, this paper proposes a cross-domain single sign-on authentication method based on SAML, including the design of login authentication control and revocation authentication scheme. In login authentication, efficient interaction between identity providers and service providers reduces unnecessary steps to achieve single sign-on. At the same time, a revocation scheme based on cumulative function is proposed to ensure that the local root signature is used for system parameter information, thus further ensuring network security. The experimental results show that the login time of the proposed method is below 400 ms, and the login response takes a short time. The success rate of the proposed method against false login is over 90%, and the security is good. The data packet loss rate of this method is below 2%, high integrity and reliability. © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:89 / 104
页数:15
相关论文
共 50 条
  • [21] A Generic Construction of Dynamic Single Sign-on with Strong Security
    Han, Jinguang
    Mu, Yi
    Susilo, Willy
    Yan, Jun
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, 2010, 50 : 181 - +
  • [22] A Security Research on Single Sign-On System Based on CAS
    Zhang Xiao-yin
    Chen Guo-sheng
    2011 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATION AND EDUCATION TECHNOLOGY (ICCAET 2011), 2011, : 209 - 212
  • [23] SoK: Single Sign-On Security - An Evaluation of OpenID Connect
    Mainka, Christian
    Mladenov, Vladislav
    Schwenk, Joerg
    Wich, Tobias
    2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 251 - 266
  • [24] Tri-Level Cross-Domain Sign Prediction for Complex Network
    Pang, Jiali
    Guan, Donghai
    Yuan, Weiwei
    ADVANCED DATA MINING AND APPLICATIONS, ADMA 2019, 2019, 11888 : 95 - 106
  • [25] A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment
    Castiglione, Aniello
    Palmieri, Francesco
    Chen, Chin-Ling
    Chang, Yao-Chung
    INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING, 2016, 12 (01) : 34 - 48
  • [26] Identity-Based Cross-Domain Authentication by Blockchain via PKI Environment
    Wang, Jiahe
    Li, Shasha
    Wei, Songjie
    BLOCKCHAIN TECHNOLOGY AND APPLICATION: SECOND CCF CHINA BLOCKCHAIN CONFERENCE (CBCC 2019), 2020, 1176 : 131 - 144
  • [27] Research on CLPKC-IDPKC cross-domain identity authentication for IoT environment
    Liu, Quan
    Gong, Bei
    Ning, Zhenhu
    COMPUTER COMMUNICATIONS, 2020, 157 : 410 - 416
  • [28] Blockchain-based cross-domain authentication in a multi-domain Internet of drones environment
    Karmegam, Arivarasan
    Tomar, Ashish
    Tripathi, Sachin
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (19): : 27095 - 27122
  • [29] Analysis of Applicability of Open Single Sign-On Protocols in Distributed Information-Computing Environment
    Lazarev, S. A.
    Demidov, A., V
    Volkov, V. N.
    Stychuk, A. A.
    Polovinkin, D. A.
    2016 IEEE 10TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2016, : 525 - 529
  • [30] Security Challenges with Cross-Domain Information Exchange: Integrity and Guessing Attacks
    Engelstad, Paal E.
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1596 - 1605