Applied Research of Single Sign on Technology in Cloud Services

Article Preview

Abstract:

Industrial cloud service platform launched a series of industrial services based on cloud computing for middle and small-sized enterprises. These services include CAD, CAE and other software services utilized on industrial design and manufacturing. Due to integrating various application systems, an efficient authentication technology was urgent required to realize the exchange and sharing of the identity information in the platform. Based on analysis and compare of various mainstream Single Sign-On (SSO) technologies, this paper proposed an SSO solution by using Central Authentication Service (CAS) protocol. Proposed system makes it easy and convenient to deal with login authentication and gain identity information of the whole platform. In addition, proposed system significantly improves the user experience.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3552-3555

Citation:

Online since:

August 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Dinei Florencio, Cormac Herley. A Large-Scale Study of Web Password Habits, In Proc. 16th International Conference on World Wide Web. New York, USA. 2007: 657-666.

DOI: 10.1145/1242572.1242661

Google Scholar

[2] Trinh, Hien Thu. Do I know you?-Ask Google,. The single sign-on revolution. In Proc. National Conference of Undergraduate Research(NCUR) . (2013).

Google Scholar

[3] Information on http: /www. authenticationworld. com/Single-Sign-On-Authentication.

Google Scholar

[4] Alliance, Liberty. Liberty ID-FF Protocols and Schema Specification., Liberty Alliance 175 (2004): 176.

Google Scholar

[5] Bajaj, Siddharth, et al. Web services federation language (ws-federation)., Retrieved April 14 (2003): (2005).

Google Scholar

[6] Morgan, R. L., et al. Federated Security: The Shibboleth Approach. Educause Quarterly. 2004: 12-17.

Google Scholar

[7] Radha, V., and D. Hitha Reddy. A Survey on Single Sign-On Techniques. Procedia Technology. 2012: 134-139.

DOI: 10.1016/j.protcy.2012.05.019

Google Scholar

[8] Cantor, Scott, et al. Assertions and protocols for the oasis security assertion markup language., OASIS Standard (March 2005).

Google Scholar

[9] Recordon, David, and Drummond Reed. OpenID 2. 0: a platform for user-centric identity management., Proceedings of the second ACM workshop on Digital identity management. ACM, (2006).

DOI: 10.1145/1179529.1179532

Google Scholar

[10] Information on http: /www. jasig. org.

Google Scholar