Cross-domain single sign-on authentication of information security in network environment

被引:0
|
作者
Cui A.-J. [1 ,2 ]
Wang W. [2 ]
Zhang H.-F. [2 ]
Ma Y.-H. [2 ]
Li C. [3 ]
Wang X.-M. [1 ]
机构
[1] College of Electronical and Information Engineering, Lanzhou University of Technology, Lanzhou
[2] State Grid Gansu Electric Power Company, Lanzhou
[3] College of Foreign Languages, Lanzhou University of Technology, Lanzhou
关键词
Cross-domain single sign-on; Network security; Parameter information; Revocation of authentication;
D O I
10.1504/IJICT.2021.111924
中图分类号
学科分类号
摘要
Aiming at the problems of long response time, poor security and information integrity in cross-domain single sign-on authentication research of network security, this paper proposes a cross-domain single sign-on authentication method based on SAML, including the design of login authentication control and revocation authentication scheme. In login authentication, efficient interaction between identity providers and service providers reduces unnecessary steps to achieve single sign-on. At the same time, a revocation scheme based on cumulative function is proposed to ensure that the local root signature is used for system parameter information, thus further ensuring network security. The experimental results show that the login time of the proposed method is below 400 ms, and the login response takes a short time. The success rate of the proposed method against false login is over 90%, and the security is good. The data packet loss rate of this method is below 2%, high integrity and reliability. © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:89 / 104
页数:15
相关论文
共 50 条
  • [31] Automatic Security Classification by Machine Learning for Cross-Domain Information Exchange
    Hammer, Hugo
    Kongsgard, Kyrre Wahl
    Bai, Aleksander
    Yazidi, Anis
    Nordbotten, Nils Agne
    Engelstad, Paal E.
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1590 - 1595
  • [32] A Cross-domain Authentication Method for Cloud Computing
    Xu, Chen
    He, Jingsha
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 285 - 292
  • [33] A Cross-domain Authentication protocol Based on Hypercube
    Yao Yao
    Wang Xingwei
    2011 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, 2011, : 3528 - 3532
  • [34] Better single sign-on model in web application environment
    Department of Computer Science and Engineering, Northwestern Polytechnical University, Xi'an 710072, China
    Xibei Gongye Daxue Xuebao, 2006, 2 (214-218):
  • [35] Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On Systems
    Tolbert, Matthew M.
    Hess, Elie M.
    Nascimento, Mattheus C.
    Lei, Yunsen
    Shue, Craig A.
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2022, 2022, 13407 : 184 - 200
  • [36] A secure two-factor authentication scheme for single sign-on services
    Brasee, Kaleb
    Makki, S. Kami
    Zeadally, Sherali
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (04) : 315 - 323
  • [37] Cross-domain Attribute Conversion for Authentication and Authorization
    Thaler, Stefan
    den Hartog, Jerry
    Ayed, Dhouha
    Sommer, Dieter
    Hitchens, Michael
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 652 - 659
  • [38] A Cross-Domain Group Authentication Scheme for LTE-A Based Vehicular Network
    Xu, Cheng
    Ma, Maode
    Huang, Xiaohong
    Bao, Hong
    2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 595 - 599
  • [39] Cross-domain network representations
    Xue, Shan
    Lu, Jie
    Zhang, Guangquan
    PATTERN RECOGNITION, 2019, 94 : 135 - 148
  • [40] OpenID and the Enterprise: A Model-based Analysis of Single Sign-On Authentication
    Bellamy-McIntyre, Jacob
    Luterroth, Christof
    Weber, Gerald
    15TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE (EDOC 2011), 2011, : 129 - 138