Improved user authentication process for third-party identity management in distributed environment
Third-party identity management user authentication process using single sign-on (SSO) in distributed computer networks requires modification as the process of authenticating user to log into relying party (RP) resources by either identity provider (IDP) or hybrid relying party (HRP) depend always o...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
The American Society of Mechanical Engineers(ASME)
2020
|
Online Access: | https://eprints.ums.edu.my/id/eprint/27432/1/Improved%20user%20authentication%20process%20for%20third-party%20identity%20management%20in%20distributed%20environment%20abstract.pdf https://eprints.ums.edu.my/id/eprint/27432/2/Improved%20User%20Authentication%20Process%20for%20Third-Party%20Identity%20Management%20in%20Distributed%20Environment%20Fulltext.pdf https://eprints.ums.edu.my/id/eprint/27432/ https://doi.org/10.51153/kjcis.v3i2.51 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Malaysia Sabah |
Language: | English English |
id |
my.ums.eprints.27432 |
---|---|
record_format |
eprints |
spelling |
my.ums.eprints.274322021-06-25T06:08:28Z https://eprints.ums.edu.my/id/eprint/27432/ Improved user authentication process for third-party identity management in distributed environment Kashif Nisar Ibrahim A. Lawal AbubakarAminu Mu’azu Shamsuddeen Bala Third-party identity management user authentication process using single sign-on (SSO) in distributed computer networks requires modification as the process of authenticating user to log into relying party (RP) resources by either identity provider (IDP) or hybrid relying party (HRP) depend always on the authentication of user logins. In this research an algorithm is proposed to authenticate user only once by recording and encrypting user credential with one-way hashing algorithm (SHA2), this simplifies user subsequent logins into relying party by confirming user credentials without other authentication by IDP or HRP. Authentication time and response time continuous time plot of the proposed algorithm was plotted with respect to the arrival time of users in which we show the relationship of authentication time and response time with random arrival rate of users. The American Society of Mechanical Engineers(ASME) 2020 Article PeerReviewed text en https://eprints.ums.edu.my/id/eprint/27432/1/Improved%20user%20authentication%20process%20for%20third-party%20identity%20management%20in%20distributed%20environment%20abstract.pdf text en https://eprints.ums.edu.my/id/eprint/27432/2/Improved%20User%20Authentication%20Process%20for%20Third-Party%20Identity%20Management%20in%20Distributed%20Environment%20Fulltext.pdf Kashif Nisar and Ibrahim A. Lawal and AbubakarAminu Mu’azu and Shamsuddeen Bala (2020) Improved user authentication process for third-party identity management in distributed environment. Journal of Computing & Information Sciences, 3 (2). pp. 45-52. ISSN 1530-9827 https://doi.org/10.51153/kjcis.v3i2.51 |
institution |
Universiti Malaysia Sabah |
building |
UMS Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Sabah |
content_source |
UMS Institutional Repository |
url_provider |
http://eprints.ums.edu.my/ |
language |
English English |
description |
Third-party identity management user authentication process using single sign-on (SSO) in distributed computer networks requires modification as the process of authenticating user to log into relying party (RP) resources by either identity provider (IDP) or hybrid relying party (HRP) depend always on the authentication of user logins. In this research an algorithm is proposed to authenticate user only once by recording and encrypting user credential with one-way hashing algorithm (SHA2), this simplifies user subsequent logins into relying party by confirming user credentials without other authentication by IDP or HRP. Authentication time and response time continuous time plot of the proposed algorithm was plotted with respect to the arrival time of users in which we show the relationship of authentication time and response time with random arrival rate of users. |
format |
Article |
author |
Kashif Nisar Ibrahim A. Lawal AbubakarAminu Mu’azu Shamsuddeen Bala |
spellingShingle |
Kashif Nisar Ibrahim A. Lawal AbubakarAminu Mu’azu Shamsuddeen Bala Improved user authentication process for third-party identity management in distributed environment |
author_facet |
Kashif Nisar Ibrahim A. Lawal AbubakarAminu Mu’azu Shamsuddeen Bala |
author_sort |
Kashif Nisar |
title |
Improved user authentication process for third-party identity management in distributed environment |
title_short |
Improved user authentication process for third-party identity management in distributed environment |
title_full |
Improved user authentication process for third-party identity management in distributed environment |
title_fullStr |
Improved user authentication process for third-party identity management in distributed environment |
title_full_unstemmed |
Improved user authentication process for third-party identity management in distributed environment |
title_sort |
improved user authentication process for third-party identity management in distributed environment |
publisher |
The American Society of Mechanical Engineers(ASME) |
publishDate |
2020 |
url |
https://eprints.ums.edu.my/id/eprint/27432/1/Improved%20user%20authentication%20process%20for%20third-party%20identity%20management%20in%20distributed%20environment%20abstract.pdf https://eprints.ums.edu.my/id/eprint/27432/2/Improved%20User%20Authentication%20Process%20for%20Third-Party%20Identity%20Management%20in%20Distributed%20Environment%20Fulltext.pdf https://eprints.ums.edu.my/id/eprint/27432/ https://doi.org/10.51153/kjcis.v3i2.51 |
_version_ |
1760230621349675008 |