A Hybrid Model of Cross-Domain Authentication for Password Synchronization

Article Preview

Abstract:

Cross-domain authentication is a key technology used in distributed computing, however, it isn’t perfect. In this paper, a new type of hybrid cross-domain authentication model is proposed to make up its shortcoming in safety, scalability and password synchronization. In this model, advantages of Kerberos and SAML in cross-domain authentication process are combined, and it mixed password transport protocols is adopted to achieve password synchronization. Theoretical analysis shows it can enhance the security and scalability of cross-domain authentication, the efficiency of cross-domain authentication is also improved as the attainment of password synchronization.

You might also be interested in these eBooks

Info:

Periodical:

Key Engineering Materials (Volumes 474-476)

Pages:

729-734

Citation:

Online since:

April 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] H. Kim, K. G Shin, and W. Dabbous: Improving Cross-domain Authentication over Wireless Local Area Networks, "1st Int, l. Conf. Security and Privacy for Emerging Areas in Communication. Networks, p.127–38, (2005).

DOI: 10.1109/securecomm.2005.24

Google Scholar

[2] Li Gong: Increasing Availability and Security Authentication Service. IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5, pp.657-662, (1993).

DOI: 10.1109/49.223866

Google Scholar

[3] Nancy Loveland: Single Sign On Through Password Synchronization. SANS Institute, (2002).

Google Scholar

[4] Gough et al: System and Method for synchronizing a user password between and alternative computer operating environments. United States Patent: 7055042 B1, May 30, (2006).

Google Scholar

[5] WANG Feng-jiao, ZHANG Yu-qing: New security model for cross-realm C2C-PAKE protocol. Journal on Communications, Vol. 29, No. 4, pp.24-29, 2008 (in Chinese).

Google Scholar

[6] Byun J W, Lee D H, Lim J: Efficient and provably secure client-to—client password-based key exchange protocol / APWeb2006. Berlin: Springer-Verlag, pp.830-836, (2006).

DOI: 10.1007/11610113_81

Google Scholar

[7] Byun J W, Lee D H, Lim J: EC2C-PAKA: an Efficient client-to—client password-authenticated key agreement. Information Sciences, Vol. 117, No. 19, pp.3995-4013, (2007).

DOI: 10.1016/j.ins.2007.03.024

Google Scholar

[8] LiHuafeng, QianHuanyan: A GeneralHybrid Cryptograph Transfer Protocol Applied in Password Synchronization . Journal of Nanjin Normal University, Vol. 8 No. 4, pp.178-181, 2008(in Chinese).

Google Scholar

[9] Dae-Hee Seo, Im-Yeong Lee: Single Sign-on Authentication Model Using MAS (Multi-agent System) . Communications, Computers and Signal Processing, pp.692-695, (2003).

DOI: 10.1109/pacrim.2003.1235875

Google Scholar

[10] Bellovin S M, Merritt M: Limitations of the Kerberos Authentication Systems. Computer Communication Review, Vol. 20 No. 5, pp.119-132, (1990).

DOI: 10.1145/381906.381946

Google Scholar

[11] Myungsoo Kang: Choong Seon Hong, Hee, Jung Koo, Gil Haeng Lee. An SAML Based SSO Architecture for Secure Data Exchange between User and OSS, http: /www. apnoms. org/2005/technical/8_5. pdf, pp.609-617, (2006).

Google Scholar

[12] Jeff Hodges , Prateek Mishra , Bob Morgan , Tim Moses , Evan Prodromou : Add To MetaCart OASIS SSTC: SAML Security Considerations, draft-sstc-sec-consider-00, 10-Aug-2001: 1-12.

Google Scholar

[13] Bruce Schneier: Applied Cryptography – Protocols, algorithms, and source code. (China Machine Press, Beijing 2000).

Google Scholar

[14] W. tallings: Cryptography and Network Security Principles and Practices. (Prentice Hall, Inc 2008).

Google Scholar

[15] K. J. Hole, V. Moen, and T. Tjstheim: Case Study: Online Banking Security. IEEE Security and Privacy, Vol. 4 No. 2, p.14–20, (2006).

DOI: 10.1109/msp.2006.36

Google Scholar

[16] Narasimham Challa, Jayaram Pradhan: Performance Analysis of Public key Cryptographic Systems RSA and NTRU, IJCSNS International Journal of Computer Science and Network Security, pp.87-96, (2007).

Google Scholar