Cross-domain single sign-on authentication of information security in network environment

被引:0
|
作者
Cui A.-J. [1 ,2 ]
Wang W. [2 ]
Zhang H.-F. [2 ]
Ma Y.-H. [2 ]
Li C. [3 ]
Wang X.-M. [1 ]
机构
[1] College of Electronical and Information Engineering, Lanzhou University of Technology, Lanzhou
[2] State Grid Gansu Electric Power Company, Lanzhou
[3] College of Foreign Languages, Lanzhou University of Technology, Lanzhou
关键词
Cross-domain single sign-on; Network security; Parameter information; Revocation of authentication;
D O I
10.1504/IJICT.2021.111924
中图分类号
学科分类号
摘要
Aiming at the problems of long response time, poor security and information integrity in cross-domain single sign-on authentication research of network security, this paper proposes a cross-domain single sign-on authentication method based on SAML, including the design of login authentication control and revocation authentication scheme. In login authentication, efficient interaction between identity providers and service providers reduces unnecessary steps to achieve single sign-on. At the same time, a revocation scheme based on cumulative function is proposed to ensure that the local root signature is used for system parameter information, thus further ensuring network security. The experimental results show that the login time of the proposed method is below 400 ms, and the login response takes a short time. The success rate of the proposed method against false login is over 90%, and the security is good. The data packet loss rate of this method is below 2%, high integrity and reliability. © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:89 / 104
页数:15
相关论文
共 50 条
  • [41] Authentication Algorithm Based on Hash-Tree for Web Single Sign-On
    Wei, Qiang
    Wu, Zehui
    Tao, Ronghua
    Ren, Dong
    MECHANICAL DESIGN AND POWER ENGINEERING, PTS 1 AND 2, 2014, 490-491 : 1368 - 1373
  • [42] Securely propagating authentication in an ensemble of personal devices using single sign-on
    Reddy, P
    O'Brien-Strain, E
    Rowson, J
    SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 178 - 189
  • [43] Tensions of network security and collaborative work practice: Understanding a single sign-on deployment in a regional hospital
    Heckle, Rosa R.
    Lutters, Wayne G.
    INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2011, 80 (08) : e49 - e61
  • [44] Security analysis of the SAML Single Sign-on Browser Artifact profile
    Gross, T
    19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 298 - 307
  • [45] Integrating network services of windows and UNIX for single sign-on
    Futagawa, J
    2004 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2004, : 323 - 328
  • [46] Dynamic security assertion markup language - Simplifying single sign-on
    Harding, Patrick
    Johansson, Leif
    Klingenstein, Nate
    IEEE SECURITY & PRIVACY, 2008, 6 (02) : 83 - 85
  • [47] Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
    Wang, Guilin
    Yu, Jiangshan
    Xie, Qi
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (01) : 294 - 302
  • [48] Cross-Domain Authentication Scheme Based on Proxy Re-Signature in Cloud Environment
    Yang X.-D.
    An F.-Y.
    Yang P.
    Liu T.-T.
    Xiao L.-K.
    Wang C.-F.
    Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (04): : 756 - 771
  • [49] Heterogeneous Cross-Domain Identity Authentication Scheme Based on Proxy Resignature in Cloud Environment
    Lv, Yongyang
    Liu, Wenju
    Wang, Ze
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [50] THE STUDY OF MULTI-LEVEL AUTHENTICATION-BASED SINGLE SIGN-ON SYSTEM
    Ying, Niu
    Yao, Zhao
    Hua, Zou
    PROCEEDINGS OF 2009 2ND IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, 2009, : 448 - 452