Improving Privacy and Trust in Federated Identity Using SAML with Hash Based Encryption Algorithm

02/05/2018
by   Jissy Ann George, et al.
0

Cloud computing is an upcoming technology that has been designed for commercial needs. One of the major issues in cloud computing is the difficulty to manage federated identities and the trust between the user and the service providers. This paper focuses on how security can be provided between the user and the service provider and how the user information can be authenticated. For the purpose of providing privacy and authentication, Security Assertion Markup Language (SAML) based Single Sign-On is used. Security is provided by using Hash based Encryption algorithm (HBE). HBE algorithm works with the help of Key Exchange Protocol which contains poly hash function. In the algorithm, Identity providers maintain user directory and authenticates user information; service provider provides the service to users. The user has to register their details with the identity provider prior to this. During this stage, Hash based Encryption algorithm is used to provide secure communication between the identity provider and the user. In this paper we suggest that higher security can be given to user login by using an additional cryptographic technique, i.e. Hash based Encryption algorithm with the help of the Key Exchange Protocol.

READ FULL TEXT
research
03/12/2019

A Novel Blockchain-based Trust Model for Cloud Identity Management

Secure and reliable management of identities has become one of the great...
research
07/05/2022

None Shall Pass: A blockchain-based federated identity management system

Authentication and authorization of a user's identity are generally done...
research
04/29/2023

Decentralised Identity Federations using Blockchain

Federated Identity Management has proven its worth by offering economic ...
research
03/15/2023

vFHE: Verifiable Fully Homomorphic Encryption with Blind Hash

Fully homomorphic encryption (FHE) is a powerful encryption technique th...
research
03/24/2023

One Protocol to Rule Them All? On Securing Interoperable Messaging

European lawmakers have ruled that users on different platforms should b...
research
10/03/2021

Generating and Managing Strong Passwords using Hotel Mnemonic

Weak passwords and availability of supercomputers to password crackers m...
research
03/28/2019

An Approach to Identity Management in Clouds without Trusted Third Parties

The management of sensitive data, including identity management (IDM), i...

Please sign up or login with your details

Forgot password? Click here to reset