Improved user authentication process for third-party identity management in distributed environment

Third-party identity management user authentication process using single sign-on (SSO) in distributed computer networks requires modification as the process of authenticating user to log into relying party (RP) resources by either identity provider (IDP) or hybrid relying party (HRP) depend always o...

Full description

Saved in:
Bibliographic Details
Main Authors: Kashif Nisar, Ibrahim A. Lawal, AbubakarAminu Mu’azu, Shamsuddeen Bala
Format: Article
Language:English
English
Published: The American Society of Mechanical Engineers(ASME) 2020
Online Access:https://eprints.ums.edu.my/id/eprint/27432/1/Improved%20user%20authentication%20process%20for%20third-party%20identity%20management%20in%20distributed%20environment%20abstract.pdf
https://eprints.ums.edu.my/id/eprint/27432/2/Improved%20User%20Authentication%20Process%20for%20Third-Party%20Identity%20Management%20in%20Distributed%20Environment%20Fulltext.pdf
https://eprints.ums.edu.my/id/eprint/27432/
https://doi.org/10.51153/kjcis.v3i2.51
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Malaysia Sabah
Language: English
English
id my.ums.eprints.27432
record_format eprints
spelling my.ums.eprints.274322021-06-25T06:08:28Z https://eprints.ums.edu.my/id/eprint/27432/ Improved user authentication process for third-party identity management in distributed environment Kashif Nisar Ibrahim A. Lawal AbubakarAminu Mu’azu Shamsuddeen Bala Third-party identity management user authentication process using single sign-on (SSO) in distributed computer networks requires modification as the process of authenticating user to log into relying party (RP) resources by either identity provider (IDP) or hybrid relying party (HRP) depend always on the authentication of user logins. In this research an algorithm is proposed to authenticate user only once by recording and encrypting user credential with one-way hashing algorithm (SHA2), this simplifies user subsequent logins into relying party by confirming user credentials without other authentication by IDP or HRP. Authentication time and response time continuous time plot of the proposed algorithm was plotted with respect to the arrival time of users in which we show the relationship of authentication time and response time with random arrival rate of users. The American Society of Mechanical Engineers(ASME) 2020 Article PeerReviewed text en https://eprints.ums.edu.my/id/eprint/27432/1/Improved%20user%20authentication%20process%20for%20third-party%20identity%20management%20in%20distributed%20environment%20abstract.pdf text en https://eprints.ums.edu.my/id/eprint/27432/2/Improved%20User%20Authentication%20Process%20for%20Third-Party%20Identity%20Management%20in%20Distributed%20Environment%20Fulltext.pdf Kashif Nisar and Ibrahim A. Lawal and AbubakarAminu Mu’azu and Shamsuddeen Bala (2020) Improved user authentication process for third-party identity management in distributed environment. Journal of Computing & Information Sciences, 3 (2). pp. 45-52. ISSN 1530-9827 https://doi.org/10.51153/kjcis.v3i2.51
institution Universiti Malaysia Sabah
building UMS Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Sabah
content_source UMS Institutional Repository
url_provider http://eprints.ums.edu.my/
language English
English
description Third-party identity management user authentication process using single sign-on (SSO) in distributed computer networks requires modification as the process of authenticating user to log into relying party (RP) resources by either identity provider (IDP) or hybrid relying party (HRP) depend always on the authentication of user logins. In this research an algorithm is proposed to authenticate user only once by recording and encrypting user credential with one-way hashing algorithm (SHA2), this simplifies user subsequent logins into relying party by confirming user credentials without other authentication by IDP or HRP. Authentication time and response time continuous time plot of the proposed algorithm was plotted with respect to the arrival time of users in which we show the relationship of authentication time and response time with random arrival rate of users.
format Article
author Kashif Nisar
Ibrahim A. Lawal
AbubakarAminu Mu’azu
Shamsuddeen Bala
spellingShingle Kashif Nisar
Ibrahim A. Lawal
AbubakarAminu Mu’azu
Shamsuddeen Bala
Improved user authentication process for third-party identity management in distributed environment
author_facet Kashif Nisar
Ibrahim A. Lawal
AbubakarAminu Mu’azu
Shamsuddeen Bala
author_sort Kashif Nisar
title Improved user authentication process for third-party identity management in distributed environment
title_short Improved user authentication process for third-party identity management in distributed environment
title_full Improved user authentication process for third-party identity management in distributed environment
title_fullStr Improved user authentication process for third-party identity management in distributed environment
title_full_unstemmed Improved user authentication process for third-party identity management in distributed environment
title_sort improved user authentication process for third-party identity management in distributed environment
publisher The American Society of Mechanical Engineers(ASME)
publishDate 2020
url https://eprints.ums.edu.my/id/eprint/27432/1/Improved%20user%20authentication%20process%20for%20third-party%20identity%20management%20in%20distributed%20environment%20abstract.pdf
https://eprints.ums.edu.my/id/eprint/27432/2/Improved%20User%20Authentication%20Process%20for%20Third-Party%20Identity%20Management%20in%20Distributed%20Environment%20Fulltext.pdf
https://eprints.ums.edu.my/id/eprint/27432/
https://doi.org/10.51153/kjcis.v3i2.51
_version_ 1760230621349675008