Research analysis of single sign-on security mechanism for distributed computer networks
Pratik Junghare, Dinesh Nanekar, Akanksha Goel
In this aspect we are allowing users to sign on once and have their proof of identities verified by each application or services which they wanted to use afterwards. Number of applications have architectures used by users for utilizing various set of credentials for example tokens for particular application. The single sign on is new way of authentication that allow to legal user with single credential which authenticated by SP (service providers) in distributed networks. In 2012 Chang and Lee discovered mechanism totally based on RSA Cryptosystem mechanism. But that proposed system has two kind of attacks. One is impersonation attack and another one is session attack. Respectively, the first attack deals with credential privacy in the scheme as a malicious service provider is ready to recover the credentials of a legal user. However the other attack is an impersonation attack without credentials that is session attack which demonstrates how an outside attacker may freely make use of resources and services offered by service providers. In this newly system, to save credential generation privacy, the Trusted party authority signs a Schnorr signature on user identity; and to protect credential privacy.