SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 717
Design And Implementation Of Enhanced Single Sign On System For
Education Systems
Pranay B. Sahare
Scholar Student, M.Tech,
Dept of CSE, Nagpur Institute of Technology, Nagpur, MH, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Consider a college education portal needs to
provide access to different domain courses and tutorials to
it’s students. But to incorporate numerous resources and
tutorials onto one education portal can be tedious andspace
constraint.
Multiple systemstypicallyrequiremultiplesign-ondialogues
to access the resources. Users need to register on multiple
portals to access the contents and courses and it indulge the
headache of remembering multiple sets ofcredentials.Users
also have to present credentials multiple times they login to
these portals/websites.With thesescenarios,whenthere are
more security domains, the more sign-ins required. It also
requires to restrict access to unauthorized users when log-
ins are authenticated. If there are redundancy of resources
across multiple websites, users may show lack of interest
due to redundancy and authorization. headache.
Single sign on system is the proposed method to provide
access to the educational learning resources/contents. In
this approach, one-time login is required and the logged in
user can access the relevant authorized service provider’s
resources without need to login to their UI facing.
This approach provides a secure way to authenticate users
by the unique hash password validation and time stamp
validation. If both the validation are performed, the
requesting user will be provided access to other website
resources as well where the user’s authorization is done
with the valid token and access key.
Hence, the other websites can share common resources
across multiple domains without the technology barrier.
Key Words: Resources, authorization, token, service
provider, portal, session, affiliate
1. INTRODUCTION
Single sign-on (SSO) is a session and
user authentication service thatpermitsa usertouseone set
of login credentials (e.g., name and password) to access
multiple applications. The serviceauthenticatestheenduser
for all the applications the user has been given rights to and
eliminates further prompts when the user switches
applications during the same session.Onthe back end,SSOis
helpful for logging user activities as well as monitoring user
accounts.
Single sign-on reduces human error, a major component
of systems failure and is therefore highly desirable but
difficult to implement. SSO avoids the monotonous task of
confirming identity over and over again through passwords
or other authentication systems.
By increasing the users of the distributed systems that
should often access to remote resource, different
authentication techniques are needed when users want to
enter the systems. Therefore, SSO technology has been
introduced as a special form of authentication mechanisms.
This technology is meant to facilitate the job for users in a
way that with one time authentication they could be able to
access to several software resources on different servers.
2. AUTHENTICATION PROCESS
1. The first step is logging into the main service(Facebook
or Google, for instance).
2. When you visit a new service, it redirects you to the
original (or parent) service to check if you are logged in
at that one.
3. An OTP (One-time password) token is returned.
4. The OTP token is then verified by the new service from
the parent’s servers, and only after successful
verification is the user granted entry.
Fig: Basic process diagram
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 718
Fig. Federated Identity
3. RELATED WORK
1. Kirti Bhandari, Parminder Kaur, “ImplementationofSingle
Sign-On Technique in Heterogeneous Distributed
Environment”, Volume 4, Issue 3, March 2014
In this paper they have implemented the Single Sign-On
Scenario in Distributed Heterogeneous Environment. They
proposed research that most distributed systems are
assembled from different components. Each of the
component acts as an isolated security domain
independently. In the multi sign-on environment, the end-
user who wants to use services housed in different servers
has to sign-on multiple times. User has to remember large
numbers of passwords. With multiplesignon,usermayhave
some bad habits that reduce the system security, such as,
using the same password for all the systems. Therefore,
multiple sign-on is very troublesome, so the single sign-on
solution has been introduced to solve this problem.
2. Daniel Kouˇril, Ludˇek Matyska, Michal Proch´azka,”Multi-
mechanism Single Sign-On in Grids” Masaryk University,
Botanick´a , Czech Republic.
Being based on one of the mechanisms, most grid
environmentstodayprovidestrongauthenticationprotocols,
however, they are usually bound with only one, in most
cases based on public key infrastructure (PKI). Such an
arrangement works pretty well, but unnecessarily limits
users since they are required touseonlytheonemechanism,
which may not be flexible or convenient. A better solution
would be to offer users a freedom to choose their own
authentication mechanism—provided it is strong enough—
and provide automatic translations that guarantee that all
services and componentsare securelyavailableregardless of
the choice of authentication mechanism. This technical
report surveys several authentication mechanisms that are
used in contemporary grid and other distributed systems
and also discusses possible transitions to translate
credentials. The report summarizes recent results in this
area, many of which have been achieved by the authors.
3. Gguilin Wang,”Security analysis of a single sign-on
mechanism for distributed computer networks", Industrial
informatics, ieee transactions on (volume:9 , issue: 1 ) Feb.
2013.
Recently, Chang and Lee proposed a new SSO scheme and
claimed its security by providing well-organized security
arguments. In this paper, however, Wang demonstrate that
their scheme is actually insecure as it fails tomeetcredential
privacy and soundness of authentication. Specifically, he
present two impersonation attacks. They proposed an
improvement for repairing the Chang-Lee scheme.
4. V.Priya, M.E, A. Rajeswari, J. Nithya,P.Shrivithya, “ASecure
Single Sign-On Mechanism for Distributed Computer
Networks”, (IJETCSE) Volume 7 Issue 1 –MARCH 2014
In this paper, however, we describe that their scheme is
actually insecure as it fail to meet credential privacy and
soundness of authentication. Specifically, we represent two
impersonation severities. The first attack allows a malicious
service provider, who has easily communicated with a legal
user twice, to resume the user’s credential and then to
impersonate the user to deal with the resourcesandservices
offered by other service providers.Innextattack,anoutsider
without any credential may be able to enjoy network
services freely by impersonating any legal user or a
nonexistent user. Here, they identify the flaws in their
security arguments to explain why attacks are possible
against their SSU scheme. Our attacks also apply to another
SSU scheme proposed by Hsu and Chuang, which has
inspired the design of the Chang–Lee scheme.
5. In 2007, Maryam et al demonstrates a centralized
password-based authentication system using SSO for Web-
based application in distributed environments. Centralised,
Distributed and Federated Approaches are introduced and
Cookie capabilities are used for implementation of this
system that is calledcentralizedcookie-basedSSOorCC-SSO.
In 2009, Magyari et al proposed a single sign-on mechanism
which is based on certificates generatedon requestforclient
applications.
4. PROPOSED APPROACH
Single sign on system is the proposed method to provide
access to the educational learning resources/contents. In
this approach, one-time login is required and the logged in
user can access the relevant authorized service provider’s
resources without need to login to their UI facing.
This approach provides a secure way to authenticate users
by the unique hash password validation and time stamp
validation. If both the validation are performed, the
requesting user will be provided access to other website
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 719
resources as well where the user’s authorization is done
with the valid token and access key. Hence, the other
websites can share common resources across multiple
domains without the technology barrier.
This approach can be applied in distributed environment as
well with few customization.
5. METHODOLOGY
A) User Registration Process
User / Institute need to register onto the Web
portal before they can start sharing their resources with the
other portals or website users. This will be the first time
registration. After registrationtheywill beprovidedwiththe
valid unique access key that they can use to allow users to
directly login to their website withoutlogincredentials.That
means when any user tries to access the other websites
content, that website can check it’s access key generated by
the SSO service and authenticate it.
B) Setup web service to authenticate client request
This service will allow a website to validate the requesting
user’s identity and authenticate it with the valid token and
access key. If it is valid then the requesting user will be
given access to the website resources. This web service
generates token and access key each time for newregistered
user.
6. MODULES FOR PROPOSED SYSTEM
Scope of the system can be fixed by the modules divided in
the project.
A) Design the Graphical User Interface (GUI) and
database
First have to design a graphic user interface and
database for proposed system, where all aspects and
functionality is covered in this module a user-friendly GUI
and Database can created. We use MySQL for database and
PHP and other web technology for GUI.ThisIncludes College
Website Login, Home Portal and Registered Institutes /
portals links.
B) Login Process
Login process includes College Website Login form
which will redirect the user to Home Screen where they can
see the SSO links to navigate to the different registered
portals.
C) Web Service
Web service is required to redirect
authenticated SSO users to the registered portals to access
the resources. This will be a restful API that will tell other
hosts that the user trying to access the resources is a valid
user and allow to login without credentials.
D) One Time Log out
This module will allow to sign out the sessions
completely from all the portals even if userlogsoutfromany
of the portal. This is an advantage of the SSO technique.
F) User Authentication
User Authentication via Hash Password and optionally face
recognition technique for the first time login to the main
website comes under this module.
7. IMPLEMENTATION
a) User will login to the college website/portal if have an
account. If user doesn’t have an account he needs to
sign up through the Registration page.
A) Login Form
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 720
B) Sign-up Form
C)
b) After login user will see the dashboard. Oncontentarea
there will be Affiliated/collaborated institute/website
links.
A) College Portal Dashboard
c) When user click the institute link, he will be redirected
to the SSO system which will accept the parameter and
validate it. If validation success then SSO will redirect
user to the specific website’s dashboard without login.
SSO system will generate a hash signatureandwill pass
to the Service provider website on their sidetovalidate
before sending them directly to dashboard.
d) If authentication fails, SSO will redirect user back tothe
college website.
e) Service providers need to sign up to the college portal
to collaborate with them.
A) Company Affiliation Form
f) If a user directly goes to the Service provider website
and he doesn’t have an account there, SP will popup a
login page for SSO system.
g) User have to provide login credentials that he created
on college portal and the SSO system will authenticate
it from the database and provide access to user of the
SP website.
h) If a user login to SP website and goes to collegewebsite,
it’s session is validated to providedirectaccessto
dashboard in this instance.
i) Another point to note - user and SP will havea common
shared secret key that they bothwill
use to generate access key and validationpurpose.Only
SSO module will know this shared secretto
authenticate the requests.
8. CONCLUSIONS
The ProposedSingleSign On Systemprovidesaccess
to resources on different websites/portalsfromtheinstitute
website. Only authenticated users/students can access the
resources and study materials.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 721
Single Sign On is now a standard to exchanges and share
resources across users of different domain using standard
protocols and authentication technique. It eliminates the job
of providing authorization on each application instance.
It also includes high level security for user credentials. Hash
Password authentication and tokens based ontimeduration
are used to manage the SSO process. It can accommodate
large bandwidth of users. Thetechniquecanbeimplemented
without technology barrier.
ACKNOWLEDGEMENT
We would like to express our appreciation to our parents
and all the lecturers who helped us to understand the
importance of knowledge and show us the best way to gain
it.
REFERENCES
[1] Kirti Bhandari, Parminder Kaur, “Implementation of
Single Sign-On Technique in Heterogeneous Distributed
Environment”, Volume 4, Issue 3, March 2014
[2] In 2004, Gang et al [2] proposed two designs of Single
Sign-On and discuss its advantages and disadvantage of
these two versions.
[3] In 2007, Maryam [6] et al demonstrates a centralized
password-based authentication system using SSO for Web-
based application in distributed environments. Centralised,
Distributed and Federated Approaches are introduced and
Cookie capabilities are used for implementation of this
system that is calledcentralizedcookie-basedSSOorCC-SSO.
[4] In 2009, Magyari et al [5] proposed a single sign-on
mechanism which is based on certificates generated on
request for client applications.
[5] In 2010, Moo Nam Ko et al [7] discussed Facebook
Connect services which allow users to login to other
websites using their Facebook identity and information and
which will then potentially feed back to a users Facebook
network information about their actions on the site.
Facebook Platform allows users to import their identity,
profile, privacy policy, social graph and content from
Facebook to third-party sites.
[6] Daniel Kouˇril, Ludˇek Matyska, Michal Proch´azka,”
Multi-mechanism Single Sign-On in Grids” Masaryk
University, Botanick´a , Czech Republic.
[7] Gguilin Wang,” Security analysis of a single sign-on
mechanism for distributed computer networks", Industrial
informatics, ieee transactions on (volume:9 , issue: 1 ) Feb.
2013.
[8] Arul Princy. A, Vairachilai.S, “A Survey on Single Sign-On
Mechanism for Multiple Service Authentications”, IJCSMC,
Vol. 2, Issue. 12, December 2013, pg.40 – 44.
[9] M. Bellare and P. Rogaway, “Entity authentication and
key distribution,” in Proc. of CRYPTO’, 1993, pp. 232–249.
[10] T.S. Wu, C.L. Hsu, “Efficient user identification scheme
with key distribution preserving anonymity for distributed
computer networks”, Computers and Security 23 (2) (2004)
120-125.
[11] V.Priya,M.E, A.Rajeswari,J.Nithya,P.Shrivithya, “ASecure
Single Sign-On Mechanism for Distributed Computer
Networks”, (IJETCSE) Volume 7 Issue 1 –MARCH 2014
BIOGRAPHY
Pranay B. Sahare
MTech CSE Student
NIT, Nagpur
Email: pranay.bbt@gmail.com

More Related Content

What's hot

A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...IRJET Journal
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesIAEME Publication
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication IJMER
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationIRJET Journal
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...IJERA Editor
 
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images SequenceGraphical Password Authentication using Images Sequence
Graphical Password Authentication using Images SequenceIRJET Journal
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET Journal
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET Journal
 
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...IRJET Journal
 
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARDINTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARDIJCI JOURNAL
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET Journal
 
Image-Based Authentication from Confident Technologies
Image-Based Authentication from Confident TechnologiesImage-Based Authentication from Confident Technologies
Image-Based Authentication from Confident TechnologiesConfident Technologies
 
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET Journal
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computingijcsa
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure AuthenticationIRJET Journal
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkIJERA Editor
 
Prevention of SQL injection in E- Commerce
Prevention of SQL injection in E- CommercePrevention of SQL injection in E- Commerce
Prevention of SQL injection in E- Commerceijceronline
 

What's hot (20)

A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
Kx3518741881
Kx3518741881Kx3518741881
Kx3518741881
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
 
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images SequenceGraphical Password Authentication using Images Sequence
Graphical Password Authentication using Images Sequence
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
 
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
 
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARDINTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
Image-Based Authentication from Confident Technologies
Image-Based Authentication from Confident TechnologiesImage-Based Authentication from Confident Technologies
Image-Based Authentication from Confident Technologies
 
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computing
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed Network
 
Prevention of SQL injection in E- Commerce
Prevention of SQL injection in E- CommercePrevention of SQL injection in E- Commerce
Prevention of SQL injection in E- Commerce
 

Similar to Design and Implementation of Enhanced Single Sign on System for Education Systems

MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESIRJET Journal
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computingeSAT Publishing House
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IRJET Journal
 
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder LockIRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder LockIRJET Journal
 
Issues of Embedded System Component Based Development in Mesh Networks
Issues of Embedded System  Component Based Development in Mesh NetworksIssues of Embedded System  Component Based Development in Mesh Networks
Issues of Embedded System Component Based Development in Mesh NetworksIRJET Journal
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds IRJET Journal
 
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSA CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSIJNSA Journal
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat appIRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODEIRJET Journal
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth TechnologyIRJET Journal
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET Journal
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through TokenIRJET Journal
 
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...IRJET Journal
 
IRJET- E-Attendance Manager: A Review
IRJET-  	  E-Attendance Manager: A ReviewIRJET-  	  E-Attendance Manager: A Review
IRJET- E-Attendance Manager: A ReviewIRJET Journal
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor AuthenticationIRJET Journal
 
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTFingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTIRJET Journal
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataIRJET Journal
 
IRJET- In-House File Tracking System
IRJET-  	  In-House File Tracking SystemIRJET-  	  In-House File Tracking System
IRJET- In-House File Tracking SystemIRJET Journal
 

Similar to Design and Implementation of Enhanced Single Sign on System for Education Systems (20)

MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder LockIRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder Lock
 
Issues of Embedded System Component Based Development in Mesh Networks
Issues of Embedded System  Component Based Development in Mesh NetworksIssues of Embedded System  Component Based Development in Mesh Networks
Issues of Embedded System Component Based Development in Mesh Networks
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
 
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSA CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat app
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth Technology
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
 
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
 
IRJET- E-Attendance Manager: A Review
IRJET-  	  E-Attendance Manager: A ReviewIRJET-  	  E-Attendance Manager: A Review
IRJET- E-Attendance Manager: A Review
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTFingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOT
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
 
IRJET- In-House File Tracking System
IRJET-  	  In-House File Tracking SystemIRJET-  	  In-House File Tracking System
IRJET- In-House File Tracking System
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSrknatarajan
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 

Design and Implementation of Enhanced Single Sign on System for Education Systems

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 717 Design And Implementation Of Enhanced Single Sign On System For Education Systems Pranay B. Sahare Scholar Student, M.Tech, Dept of CSE, Nagpur Institute of Technology, Nagpur, MH, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Consider a college education portal needs to provide access to different domain courses and tutorials to it’s students. But to incorporate numerous resources and tutorials onto one education portal can be tedious andspace constraint. Multiple systemstypicallyrequiremultiplesign-ondialogues to access the resources. Users need to register on multiple portals to access the contents and courses and it indulge the headache of remembering multiple sets ofcredentials.Users also have to present credentials multiple times they login to these portals/websites.With thesescenarios,whenthere are more security domains, the more sign-ins required. It also requires to restrict access to unauthorized users when log- ins are authenticated. If there are redundancy of resources across multiple websites, users may show lack of interest due to redundancy and authorization. headache. Single sign on system is the proposed method to provide access to the educational learning resources/contents. In this approach, one-time login is required and the logged in user can access the relevant authorized service provider’s resources without need to login to their UI facing. This approach provides a secure way to authenticate users by the unique hash password validation and time stamp validation. If both the validation are performed, the requesting user will be provided access to other website resources as well where the user’s authorization is done with the valid token and access key. Hence, the other websites can share common resources across multiple domains without the technology barrier. Key Words: Resources, authorization, token, service provider, portal, session, affiliate 1. INTRODUCTION Single sign-on (SSO) is a session and user authentication service thatpermitsa usertouseone set of login credentials (e.g., name and password) to access multiple applications. The serviceauthenticatestheenduser for all the applications the user has been given rights to and eliminates further prompts when the user switches applications during the same session.Onthe back end,SSOis helpful for logging user activities as well as monitoring user accounts. Single sign-on reduces human error, a major component of systems failure and is therefore highly desirable but difficult to implement. SSO avoids the monotonous task of confirming identity over and over again through passwords or other authentication systems. By increasing the users of the distributed systems that should often access to remote resource, different authentication techniques are needed when users want to enter the systems. Therefore, SSO technology has been introduced as a special form of authentication mechanisms. This technology is meant to facilitate the job for users in a way that with one time authentication they could be able to access to several software resources on different servers. 2. AUTHENTICATION PROCESS 1. The first step is logging into the main service(Facebook or Google, for instance). 2. When you visit a new service, it redirects you to the original (or parent) service to check if you are logged in at that one. 3. An OTP (One-time password) token is returned. 4. The OTP token is then verified by the new service from the parent’s servers, and only after successful verification is the user granted entry. Fig: Basic process diagram
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 718 Fig. Federated Identity 3. RELATED WORK 1. Kirti Bhandari, Parminder Kaur, “ImplementationofSingle Sign-On Technique in Heterogeneous Distributed Environment”, Volume 4, Issue 3, March 2014 In this paper they have implemented the Single Sign-On Scenario in Distributed Heterogeneous Environment. They proposed research that most distributed systems are assembled from different components. Each of the component acts as an isolated security domain independently. In the multi sign-on environment, the end- user who wants to use services housed in different servers has to sign-on multiple times. User has to remember large numbers of passwords. With multiplesignon,usermayhave some bad habits that reduce the system security, such as, using the same password for all the systems. Therefore, multiple sign-on is very troublesome, so the single sign-on solution has been introduced to solve this problem. 2. Daniel Kouˇril, Ludˇek Matyska, Michal Proch´azka,”Multi- mechanism Single Sign-On in Grids” Masaryk University, Botanick´a , Czech Republic. Being based on one of the mechanisms, most grid environmentstodayprovidestrongauthenticationprotocols, however, they are usually bound with only one, in most cases based on public key infrastructure (PKI). Such an arrangement works pretty well, but unnecessarily limits users since they are required touseonlytheonemechanism, which may not be flexible or convenient. A better solution would be to offer users a freedom to choose their own authentication mechanism—provided it is strong enough— and provide automatic translations that guarantee that all services and componentsare securelyavailableregardless of the choice of authentication mechanism. This technical report surveys several authentication mechanisms that are used in contemporary grid and other distributed systems and also discusses possible transitions to translate credentials. The report summarizes recent results in this area, many of which have been achieved by the authors. 3. Gguilin Wang,”Security analysis of a single sign-on mechanism for distributed computer networks", Industrial informatics, ieee transactions on (volume:9 , issue: 1 ) Feb. 2013. Recently, Chang and Lee proposed a new SSO scheme and claimed its security by providing well-organized security arguments. In this paper, however, Wang demonstrate that their scheme is actually insecure as it fails tomeetcredential privacy and soundness of authentication. Specifically, he present two impersonation attacks. They proposed an improvement for repairing the Chang-Lee scheme. 4. V.Priya, M.E, A. Rajeswari, J. Nithya,P.Shrivithya, “ASecure Single Sign-On Mechanism for Distributed Computer Networks”, (IJETCSE) Volume 7 Issue 1 –MARCH 2014 In this paper, however, we describe that their scheme is actually insecure as it fail to meet credential privacy and soundness of authentication. Specifically, we represent two impersonation severities. The first attack allows a malicious service provider, who has easily communicated with a legal user twice, to resume the user’s credential and then to impersonate the user to deal with the resourcesandservices offered by other service providers.Innextattack,anoutsider without any credential may be able to enjoy network services freely by impersonating any legal user or a nonexistent user. Here, they identify the flaws in their security arguments to explain why attacks are possible against their SSU scheme. Our attacks also apply to another SSU scheme proposed by Hsu and Chuang, which has inspired the design of the Chang–Lee scheme. 5. In 2007, Maryam et al demonstrates a centralized password-based authentication system using SSO for Web- based application in distributed environments. Centralised, Distributed and Federated Approaches are introduced and Cookie capabilities are used for implementation of this system that is calledcentralizedcookie-basedSSOorCC-SSO. In 2009, Magyari et al proposed a single sign-on mechanism which is based on certificates generatedon requestforclient applications. 4. PROPOSED APPROACH Single sign on system is the proposed method to provide access to the educational learning resources/contents. In this approach, one-time login is required and the logged in user can access the relevant authorized service provider’s resources without need to login to their UI facing. This approach provides a secure way to authenticate users by the unique hash password validation and time stamp validation. If both the validation are performed, the requesting user will be provided access to other website
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 719 resources as well where the user’s authorization is done with the valid token and access key. Hence, the other websites can share common resources across multiple domains without the technology barrier. This approach can be applied in distributed environment as well with few customization. 5. METHODOLOGY A) User Registration Process User / Institute need to register onto the Web portal before they can start sharing their resources with the other portals or website users. This will be the first time registration. After registrationtheywill beprovidedwiththe valid unique access key that they can use to allow users to directly login to their website withoutlogincredentials.That means when any user tries to access the other websites content, that website can check it’s access key generated by the SSO service and authenticate it. B) Setup web service to authenticate client request This service will allow a website to validate the requesting user’s identity and authenticate it with the valid token and access key. If it is valid then the requesting user will be given access to the website resources. This web service generates token and access key each time for newregistered user. 6. MODULES FOR PROPOSED SYSTEM Scope of the system can be fixed by the modules divided in the project. A) Design the Graphical User Interface (GUI) and database First have to design a graphic user interface and database for proposed system, where all aspects and functionality is covered in this module a user-friendly GUI and Database can created. We use MySQL for database and PHP and other web technology for GUI.ThisIncludes College Website Login, Home Portal and Registered Institutes / portals links. B) Login Process Login process includes College Website Login form which will redirect the user to Home Screen where they can see the SSO links to navigate to the different registered portals. C) Web Service Web service is required to redirect authenticated SSO users to the registered portals to access the resources. This will be a restful API that will tell other hosts that the user trying to access the resources is a valid user and allow to login without credentials. D) One Time Log out This module will allow to sign out the sessions completely from all the portals even if userlogsoutfromany of the portal. This is an advantage of the SSO technique. F) User Authentication User Authentication via Hash Password and optionally face recognition technique for the first time login to the main website comes under this module. 7. IMPLEMENTATION a) User will login to the college website/portal if have an account. If user doesn’t have an account he needs to sign up through the Registration page. A) Login Form
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 720 B) Sign-up Form C) b) After login user will see the dashboard. Oncontentarea there will be Affiliated/collaborated institute/website links. A) College Portal Dashboard c) When user click the institute link, he will be redirected to the SSO system which will accept the parameter and validate it. If validation success then SSO will redirect user to the specific website’s dashboard without login. SSO system will generate a hash signatureandwill pass to the Service provider website on their sidetovalidate before sending them directly to dashboard. d) If authentication fails, SSO will redirect user back tothe college website. e) Service providers need to sign up to the college portal to collaborate with them. A) Company Affiliation Form f) If a user directly goes to the Service provider website and he doesn’t have an account there, SP will popup a login page for SSO system. g) User have to provide login credentials that he created on college portal and the SSO system will authenticate it from the database and provide access to user of the SP website. h) If a user login to SP website and goes to collegewebsite, it’s session is validated to providedirectaccessto dashboard in this instance. i) Another point to note - user and SP will havea common shared secret key that they bothwill use to generate access key and validationpurpose.Only SSO module will know this shared secretto authenticate the requests. 8. CONCLUSIONS The ProposedSingleSign On Systemprovidesaccess to resources on different websites/portalsfromtheinstitute website. Only authenticated users/students can access the resources and study materials.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 721 Single Sign On is now a standard to exchanges and share resources across users of different domain using standard protocols and authentication technique. It eliminates the job of providing authorization on each application instance. It also includes high level security for user credentials. Hash Password authentication and tokens based ontimeduration are used to manage the SSO process. It can accommodate large bandwidth of users. Thetechniquecanbeimplemented without technology barrier. ACKNOWLEDGEMENT We would like to express our appreciation to our parents and all the lecturers who helped us to understand the importance of knowledge and show us the best way to gain it. REFERENCES [1] Kirti Bhandari, Parminder Kaur, “Implementation of Single Sign-On Technique in Heterogeneous Distributed Environment”, Volume 4, Issue 3, March 2014 [2] In 2004, Gang et al [2] proposed two designs of Single Sign-On and discuss its advantages and disadvantage of these two versions. [3] In 2007, Maryam [6] et al demonstrates a centralized password-based authentication system using SSO for Web- based application in distributed environments. Centralised, Distributed and Federated Approaches are introduced and Cookie capabilities are used for implementation of this system that is calledcentralizedcookie-basedSSOorCC-SSO. [4] In 2009, Magyari et al [5] proposed a single sign-on mechanism which is based on certificates generated on request for client applications. [5] In 2010, Moo Nam Ko et al [7] discussed Facebook Connect services which allow users to login to other websites using their Facebook identity and information and which will then potentially feed back to a users Facebook network information about their actions on the site. Facebook Platform allows users to import their identity, profile, privacy policy, social graph and content from Facebook to third-party sites. [6] Daniel Kouˇril, Ludˇek Matyska, Michal Proch´azka,” Multi-mechanism Single Sign-On in Grids” Masaryk University, Botanick´a , Czech Republic. [7] Gguilin Wang,” Security analysis of a single sign-on mechanism for distributed computer networks", Industrial informatics, ieee transactions on (volume:9 , issue: 1 ) Feb. 2013. [8] Arul Princy. A, Vairachilai.S, “A Survey on Single Sign-On Mechanism for Multiple Service Authentications”, IJCSMC, Vol. 2, Issue. 12, December 2013, pg.40 – 44. [9] M. Bellare and P. Rogaway, “Entity authentication and key distribution,” in Proc. of CRYPTO’, 1993, pp. 232–249. [10] T.S. Wu, C.L. Hsu, “Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks”, Computers and Security 23 (2) (2004) 120-125. [11] V.Priya,M.E, A.Rajeswari,J.Nithya,P.Shrivithya, “ASecure Single Sign-On Mechanism for Distributed Computer Networks”, (IJETCSE) Volume 7 Issue 1 –MARCH 2014 BIOGRAPHY Pranay B. Sahare MTech CSE Student NIT, Nagpur Email: pranay.bbt@gmail.com