SSO Mechanism in Distributed Environment PDF
SSO Mechanism in Distributed Environment PDF
IJ IACS
ISSN 2347 8616
Volume 4, Issue 6
June 2015
I.
Introduction
A wired network [1] [4] [5] is a computer networks
composed of distributed environment in different
locations. Wired networks can be used in newscast
arrangements. The use of wired linkage needs
limited energy and computational facility.
Distributed wired contain self-organizing and selfhealing networks. This network allows a new node
to join the network with the help of Authenticated
server. SSO Mechanism contains five phases:
system initialization phase, user identification
phase, hacking phase, recovering phase, security
analysis. Attack will perform on system on the basis
of password and user name of User. To overcome
the impersonation attack single sign on Mechanism
can be used with the security mechanism. The user
contains multiple username and password for
retrieving the different services from service
provider [2]. But in single sign on mechanism only
need single username and password for accessing
the different services from service provider. Except
the authorized person or admin, even a non-trusted
authority and service providers are not able to forge
valid records for a new user. Attacker is the
unauthorized party when trying to access the any
services from service provider then systems
133
134
135
V. CONCLUSION
The existing method determine the
two attacks The first attack, is an impersonation
attack, to identify like as an behavior of trusted
party and copy the details in a method or in a
communications and make use of services
obtainable by service providers. The attacker can
interrupt the requirement of for an SSO scheme and
thus successfully impersonate a legal user without
holding a valid recommendation. The other attack,
the credential recovering attack compromises the
credential privacy in the ChangLee scheme as a
malicious service provider is able to recover the
credential of a legal user. In real life, these attacks
may be both users means intruder and outsider at
high risk. In proposed method using Single Sign On
mechanisms can be used. By using Single user
name and password to access the different services
with SQL injection and denial of service attacks
perform on system then system identifies that attack
block that user for that session only. Using RSA
technique to encode and decrypt the message and to
securely
access
the
authenticated
and
communicated with a user .With the help of secure
socket layer to protect the message from attacker.
The result is to provide high security without any
attack
136
REFERENCES
1.
2.
3.
4.
5.