AUTHENTIFICATION OF CERTIFICATE IN NETWORK BY USING UNIQUE SIGN-ON ALGORITHM.
Author(s):
DR VENKATESAN , DR VENKATRAMANA, DR KARUNAKAR REDDY , DR SAMBASIVA RAO
Keywords:
Distributed Systems, Authentication, Token, Attacks, Sign-On, and Credentials.
Abstract
A computer network is a special category of network, which make possible the users to use different network check which are provided by the check providers. In the distributed computer networks, user confirmation is an important process for protect. In the verification process, the choice is taken whether the user is authorized or illegitimate and subsequent to that allows the users to access the utilities in web. For that we are implemented new process of Single sign-on Mechanism (SSOM) is a new verification mechanism that facilitates an officially permitted user with a single sign in credential to be authenticated by many service providers in distributed computer networks. In additional to the service provider’s verification, user verification is also important to avoid bogus servers. The data exchange between a user and a service provider in the completion of the user and service provider verification and a session key is provided to preserve the security in network; that security status has demonstratively shown in this proposal is actually insecure as it fails to convene credential confidentiality and reliability of confirmation. Specifically, we present two different steps of attacks in the system. Main one is attack access a malicious service provider in internet, different types of users may communicate twice in the system. Chang and Lee method is one of the single-sign on mechanism which is obtainable by Chang and Lee for providing security in the distributed computer networks. We recognize the flaws in their protection elements to explain why attacks are possible alongside their SSOM method. Our attacks also related to another SSOM method proposed by Chuang and Hsu, which motivate the design of Chang-Lee Methods. We support the learning of the reliability of authentication as one open problem.
Article Details
Unique Paper ID: 147355

Publication Volume & Issue: Volume 5, Issue 2

Page(s): 784 - 787
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews