Implementation of Identity Management Using Open ID Protocol

  • Authors

    • K L.Swathi
    • P Divya
    • A Amruthavarshini
    • Dr B.VijayaBabu
    2018-05-31
    https://doi.org/10.14419/ijet.v7i2.32.13538
  • Open ID Protocol, Identity Management.
  • Identity Management has turned into an imperative theme in the distributed computing conditions, where cloud suppliers need to control usernames, passwords and other data used to recognize, validate and approve clients for some, unique facilitated applications. Every one of the vulnerabilities seen on non-cloud arrangements are presently found in the cloud, yet different issues are presented. One would be the capacity to oversee characters of clients when sending information to the cloud .Second would be the identity administration of clients accepting information from the cloud. Furthermore, third would be administration of user id’s when information is moved from cloud to cloud. Open ID is an open standard and decentralized confirmation protocol. Promoted by the non-benefit Open ID Foundation, it enables clients to be verified by co-working locales (known as Relying Parties or RP) utilizing an outsider administration, taking out the requirement for website admin to give their own particular specially appointed login frameworks, and enabling clients to sign into numerous inconsequential sites without having a different personality and secret key for each.

     

     

  • References

    1. [1] Javier Fabrega, J0nathan C Herz0g, and J0shua D Guttman, "Strand Spaces: Why is a Security Pr0t0c01 C0rrect?,"in leee Symp0sium 0n Security and Privacy Pr0ceedings, 0k1and Ca1if0rnia, 1998, pp: l6o-17l.

      [2] Char1ie Kaufman, Radia Per1man, and Mike Spencer, netw0rk Security private c0mmunicati0n in a pub1ic w0r1d, Sec0nd Editi0n ed. New Jersey, USA: Prenticeha11, 2oo2, lsbn: o-l3-o46ol9-2.

      [3] Jan De C1ercq, "Sing1e Sign-0n architectures," in infrastructure Security internati0na1 C0nference infrasec, v01. 2537, Brist01, UK, 2oo2, pp: 4o-58.

      [4] Furne11 S., An assessment 0f website passw0rd practices, inf0rmati0n 0f th0usands 0f users was st01en. The hackers c0mputers and security 26 2oo7, Science direct. used this inf0rmati0n t0 c0mpr0mise emai1 acc0unts 0f a11 users.

      [5] Jennifer G Steiner, C1iff0rd Neumann, and Jeffrey I Schi11er, "Kerber0s: An authenticati0n service f0r 0pen netw0rk Systems," in Pr0ceedings 0f the Winter l988 Usenix C0nference, l988, PP:l9l-2ol.

      [6] D0uglas R. Stins0n, Crypt0graphy The0ry and Practice, Third Editi0ned.Chapman& hall, 2oo6, lsbn:- l-58488-5o8-4.

      [7] Reeder R, Schechter S, When the Passw0rd D0esn’t W0rk – Sec0ndary authenticati0n f0r Websites, leee C0mputer and Reliability S0cieties, March/April 2oll.

      [8] Sipi0r J, Ward B, R0ngione N, Ethics of C011ecting and Using C0nsumer internet Data, lnf0rmati0n System Management, Winter 2oo4.

      [9] Linden G, Smith B, Y0rk J, Amaz0n.c0m Rec0mmendati0ns – ltem-t0-ltem C011ab0rative Fi1tering, lee internet C0mputing Jan-Feb 2oo3, leee C0mputer S0ciety.

      [10] J0hansen T, J0rstad I, Thanh D., identity management in m0bi1e ubiquit0us envir0nments, internet m0nit0ring and Pr0tecti0n, 2oo8, leee C0mputer S0ciety.

      [11] Schlager C, N0wey T, M0ntenegr0 J, A Reference m0de1 f0r authenticati0n and auth0rizati0n infrastructures Respecting Privacy and Flexibility in b2c ec0mmerce, Pr0ceedings 0f lnt’l C0nference 0n Avai1abi1ity, Re1iabi1ity and Security 2oo6, leee.

      [12] Zhang Y, Chen J, Universa1 identity management M0de1 Based 0n An0nym0us credentia1s, leee lnternati0na1 c0nference 0n services c0mputing, 2o1o, leee C0mputer S0ciety.

      [13] Sun S, P0spisil E, Muslukh0v I, Dindar N, Hawkey K, Bezn0s0v K., What makes users refuse web sing1e sign-0n? An empirica1 lnvestigati0n 0f 0penID, Pr0ceedings 0f Symp0sium 0n usab1e Privacy and security.

      [14] Tsyrk1evich E, Tsyrk1evich V, 0penID: Sing1e Sign-0n f0r the internet: A security St0ry, Pr0ceedings 0f Black hat USA 2oo7.

  • Downloads

  • How to Cite

    L.Swathi, K., Divya, P., Amruthavarshini, A., & B.VijayaBabu, D. (2018). Implementation of Identity Management Using Open ID Protocol. International Journal of Engineering & Technology, 7(2.32), 104-107. https://doi.org/10.14419/ijet.v7i2.32.13538