Improving Privacy and Trust in Federated Identity Using SAML with Hash Based Encryption Algorithm

by   Jissy Ann George, et al.

Cloud computing is an upcoming technology that has been designed for commercial needs. One of the major issues in cloud computing is the difficulty to manage federated identities and the trust between the user and the service providers. This paper focuses on how security can be provided between the user and the service provider and how the user information can be authenticated. For the purpose of providing privacy and authentication, Security Assertion Markup Language (SAML) based Single Sign-On is used. Security is provided by using Hash based Encryption algorithm (HBE). HBE algorithm works with the help of Key Exchange Protocol which contains poly hash function. In the algorithm, Identity providers maintain user directory and authenticates user information; service provider provides the service to users. The user has to register their details with the identity provider prior to this. During this stage, Hash based Encryption algorithm is used to provide secure communication between the identity provider and the user. In this paper we suggest that higher security can be given to user login by using an additional cryptographic technique, i.e. Hash based Encryption algorithm with the help of the Key Exchange Protocol.


A Novel Blockchain-based Trust Model for Cloud Identity Management

Secure and reliable management of identities has become one of the great...

None Shall Pass: A blockchain-based federated identity management system

Authentication and authorization of a user's identity are generally done...

Securing the data in cloud using Algebra Homomorphic Encryption scheme based on updated Elgamal(AHEE)

Cloud computing is the broad and diverse phenomenon. Users are allowed t...

Why the Equifax Breach Should Not Have Mattered

Data security, which is concerned with the prevention of unauthorized ac...

An Approach to Identity Management in Clouds without Trusted Third Parties

The management of sensitive data, including identity management (IDM), i...

QRES: Quantitative Reasoning on Encrypted Security SLAs

While regulators advocate for higher cloud transparency, many Cloud Serv...

Generating and Managing Strong Passwords using Hotel Mnemonic

Weak passwords and availability of supercomputers to password crackers m...