skip to main content
10.1145/3386723.3387875acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnissConference Proceedingsconference-collections
research-article

Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud

Authors Info & Claims
Published:18 May 2020Publication History

ABSTRACT

Even though the cloud paradigm and its associated services has been adopted in various enterprise applications, there has been major issues with regard to authenticating users' critical data. Single Sign on (SSO) is a user authentication technique through which a server authenticates and allows a user to use a single aspect of login credentials, for example, to access multiple services in the cloud. Even though SSO reduces the number of logins that are needed over heterogeneous environments, the risk that might be associated with the security of SSO might be detrimental if, for example, a Man-in-the Middle (MITM) attacker manages to gain control of the SSO credentials. It is also possible to get the identity of the users who have logged into Active Directory or intranet and this identity can easily be used to log into other web-based applications, and this requires the use of the Security Assertion Mark-up Language (SAML). SAML is basically a standard that allows users to be logged into applications as per their sessions. The problem that this paper addresses is the lack of a proactive technique of hardening cloud-based SAML while combining SSO with a Multi-Factor Authentication (MFA) at the time of writing this paper. The authors have, therefore, proposed an effective approach that unifies SSO with MFA in this context. Based on the base score index conducted over Common Vulnerability Scoring System (CVSS), the architecture proves to be reliable, feasible and with better performance.

References

  1. Rouse, M and Teravainen, T. (2016). Single sign-on (SSO). Available at: http://searchsecurity.techtarget.com/definition/single-sign-on [Accessed 13th February, 2018]Google ScholarGoogle Scholar
  2. S. Jain, S. Kumawat, R. Kumar and S. Kumar, "National Conference on Computational and Mathematical Sciences," in COMPUTATIA-IV, 2014.Google ScholarGoogle Scholar
  3. S. O. Kuyoro, F. Ibikunle and O. Awodele, "Cloud computing security issues and challenges," International Journal of Computer Networks (IJCN), vol. 3, no. 5, pp. 247--255, 2011.Google ScholarGoogle Scholar
  4. F. Gens, "Wordpress," 17 December 2009. [Online]. Available: https://cloudintegration.wordpress.com/2009/12/17/idc-publishes-cloud-services-benefits-and-challenges/amp/. [Accessed 23 February 2018].Google ScholarGoogle Scholar
  5. C. T. S. Xue and F. T. W. Xin, "Benefits and challenges of the adoption of cloud computing in business," International Journal on Cloud Computing: Services and Architecture (IJJCSA), vol. 6, no. 6, pp. 1--15, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  6. K. Kavitha, "Study on Cloud Computing Model and its Benefits, Challenges," International Journal of Innovative Research in Computer and Communication Engineering, vol. 2, no. 1, pp. 2423--2431, 2014.Google ScholarGoogle Scholar
  7. [M. Lebied, "The datapine Blog," 13 January 2017. [Online]. Available: https://www.datapine.com/blog/top-6-cloud-computing-challenges/. [Accessed 24 02 2018].Google ScholarGoogle Scholar
  8. K. Renaud, "Quantifying the quality of web authentication mechanisms: a usability perspective," Journal of Web Engineering, vol. 3, pp. 95--123, 2004.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. C. Hardt, "Distributed hierarchical identity management system authentication mechanisms," ed: Google Patents, 2008.Google ScholarGoogle Scholar
  10. J. H. Dunn and C. E. Martin, "Authentication mechanisms for call control message integrity and origin verification," ed: Google Patents, 2009.Google ScholarGoogle Scholar
  11. R. Chow, M. Jakobsson, R. Masuoka, J. Molina, Y. Niu, E. Shi, et al., "Authentication in the clouds: a framework and its application to mobile users," in Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 2010, pp. 1--6.Google ScholarGoogle Scholar
  12. A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "Security and cloud computing: Intercloud identity management infrastructure," in Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), 2010 19th IEEE International Workshop on, 2010, pp. 263--265.Google ScholarGoogle Scholar
  13. A. J. Choudhury, P. Kumar, M. Sain, H. Lim, and H. Jae-Lee, "A strong user authentication framework for cloud computing," in Services Computing Conference (APSCC), 2011 IEEE Asia-Pacific, 2011, pp. 110--115.Google ScholarGoogle Scholar
  14. H.-H. Zhu, Q.-H. He, H. Tang, and W.-H. Cao, "Voiceprint-biometric template design and authentication based on cloud computing security," in Cloud and Service Computing (CSC), 2011 International Conference on, 2011, pp. 302--308.Google ScholarGoogle Scholar
  15. Y. Z. An, Z. F. Zaaba and N. F. Samsudin, "Reviews on Security Issues and Challenges in Cloud Computing," in IOP Conference Series: Materials Science and Engineering, 2016.Google ScholarGoogle Scholar
  16. V. Radha and D. Hitha Reddy, "A survey on Single Sign-On Techniques," Procedia Technology, vol. 4, pp. 134--139, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  17. K. I. Ramatsakane and S. W. Leung, "Pick Location Security: Seamless Integrated Multi-Factor Authentication," in IST Africa, 2017.Google ScholarGoogle Scholar
  18. S. H. Khan and M. A. Akbar, "Multi-Factor Authentication on Cloud," in 2015 International Conference on Digital Image Computing: Techniques and Applications (DICTA), 2015.Google ScholarGoogle Scholar
  19. F. Rehman and M. Shah, "The Framework for Efficient Passphrase-based Multifactor Authentication in Cloud Computing," in 2016 22nd International Conference on Automation and Computing (ICAC), 2016.Google ScholarGoogle Scholar
  20. A. A. Yassin, A. Ibrahim and D. Zou, "Efficient Password-based Two Factors Authentication in Cloud Computing," International Journal of Security and Its Applications, vol. 6, no. 2, pp. 143--148, 2012.Google ScholarGoogle Scholar
  21. López, A. (2015). Common Vulnerability Scoring System v3.0. Available at: https://www.certsi.es/en/blog/cvss-3-en [Accessed 13th February, 2018].Google ScholarGoogle Scholar
  22. Mell, P., Scarfone, K. and Romanosky, S., (2007). A Complete Guide to the Common Vulnerability Scoring System Version 2.0. Availabale t: http://www.nazimkaradag.com/wp-content/uploads/2014/11/cvss-guide.pdf [Accessed 25th Feb, 2017]Google ScholarGoogle Scholar
  23. Spoorthi, V., & Sekaran, K. C. (2014, August). Mobile single sign-on solution for enterprise cloud applications. In Networks & Soft Computing (ICNSC), 2014 First International Conference on (pp. 273--277). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  24. Moghaddam, F. F., Karimi, O., & Hajivali, M. (2013, November). Applying a single sign-on algorithm based on cloud computing concepts for SaaS applications. In Communications (MICC), 2013 IEEE Malaysia International Conference on (pp. 335--339). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  25. Zwattendorfer, B., & Tauber, A. (2012). Secure cross-cloud single sign-on (SSO) using eIDs. In Internet Technology and Secured Transactions, 2012 International Conference for (pp. 150--155). IEEE.Google ScholarGoogle Scholar
  26. Revar, A. G., & Bhavsar, M. D. (2011). Securing user authentication using single sign-on in Cloud Computing. In Engineering (NUiCONE), 2011 Nirma University International Conference on (pp. 1--4). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  27. Abdo, J. B., Demerjian, J., Chaouchi, H., Barbar, K., & Pujolle, G. (2014, April). Single-sign-on in operator centric mobile cloud architecture. In Electrotechnical Conference (MELECON), 2014 17th IEEE Mediterranean (pp. 151--155). IEEE.Google ScholarGoogle Scholar
  28. Cabarcos, P. A., Mendoza, F. A., Guerrero, R. S., Lopez, A. M., & Diaz-Sanchez, D. (2012). SuSSo: seamless and ubiquitous single sign-on for cloud service continuity across devices. IEEE Transactions on Consumer Electronics, 58(4), 1425--1433.Google ScholarGoogle Scholar
  29. Kebande, V. R., Kigwana, I., Venter, H. S., Karie, N. M., & Wario, R. D. (2018, August). CVSS Metric-Based Analysis, Classification and Assessment of Computer Network Threats and Vulnerabilities. In 2018 International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD) (pp. 1--10). IEEE.Google ScholarGoogle Scholar

Index Terms

  1. Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        NISS '20: Proceedings of the 3rd International Conference on Networking, Information Systems & Security
        March 2020
        528 pages
        ISBN:9781450376341
        DOI:10.1145/3386723

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 18 May 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader