K. Nisar, Shamsuddeen Bala, A. Mu'azu, Ibrahim A. Lawal
{"title":"分布式环境下第三方身份管理的改进用户认证流程","authors":"K. Nisar, Shamsuddeen Bala, A. Mu'azu, Ibrahim A. Lawal","doi":"10.51153/kjcis.v3i2.51","DOIUrl":null,"url":null,"abstract":"Third-party identity management user authentication process using single sign-on (SSO) in distributed computer networks requires modification as the process of authenticating user to log into relying party (RP) resources by either identity provider (IDP) or hybrid relying party (HRP) depend always on the authentication of user logins. In this research an algorithm is proposed to authenticate user only once by recording and encrypting user credential with one-way hashing algorithm (SHA2), this simplifies user subsequent logins into relying party by confirming user credentials without other authentication by IDP or HRP. Authentication time and response time continuous time plot of the proposed algorithm was plotted with respect to the arrival time of users in which we show the relationship of authentication time and response time with random arrival rate of users.","PeriodicalId":299009,"journal":{"name":"KIET Journal of Computing and Information Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Improved User Authentication Process for Third-Party Identity Management in Distributed Environment\",\"authors\":\"K. Nisar, Shamsuddeen Bala, A. Mu'azu, Ibrahim A. Lawal\",\"doi\":\"10.51153/kjcis.v3i2.51\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Third-party identity management user authentication process using single sign-on (SSO) in distributed computer networks requires modification as the process of authenticating user to log into relying party (RP) resources by either identity provider (IDP) or hybrid relying party (HRP) depend always on the authentication of user logins. In this research an algorithm is proposed to authenticate user only once by recording and encrypting user credential with one-way hashing algorithm (SHA2), this simplifies user subsequent logins into relying party by confirming user credentials without other authentication by IDP or HRP. Authentication time and response time continuous time plot of the proposed algorithm was plotted with respect to the arrival time of users in which we show the relationship of authentication time and response time with random arrival rate of users.\",\"PeriodicalId\":299009,\"journal\":{\"name\":\"KIET Journal of Computing and Information Sciences\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"KIET Journal of Computing and Information Sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.51153/kjcis.v3i2.51\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"KIET Journal of Computing and Information Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.51153/kjcis.v3i2.51","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Improved User Authentication Process for Third-Party Identity Management in Distributed Environment
Third-party identity management user authentication process using single sign-on (SSO) in distributed computer networks requires modification as the process of authenticating user to log into relying party (RP) resources by either identity provider (IDP) or hybrid relying party (HRP) depend always on the authentication of user logins. In this research an algorithm is proposed to authenticate user only once by recording and encrypting user credential with one-way hashing algorithm (SHA2), this simplifies user subsequent logins into relying party by confirming user credentials without other authentication by IDP or HRP. Authentication time and response time continuous time plot of the proposed algorithm was plotted with respect to the arrival time of users in which we show the relationship of authentication time and response time with random arrival rate of users.