An OAuth2.0-Based Unified Authentication System for Secure Services in the Smart Campus Environment

  title={An OAuth2.0-Based Unified Authentication System for Secure Services in the Smart Campus Environment},
  author={Baozhong Gao and Fang’ai Liu and Shouyan Du and Fansheng Meng},
Based on the construction of Shandong Normal University’s smart authentication system, this paper researches the key technologies of Open Authorization(OAuth) protocol, which allows secure authorization in a simple and standardized way from third-party applications accessing online services. Through the analysis of OAuth2.0 standard and the open API details between different applications, and concrete implementation procedure of the smart campus authentication platform, this paper summarizes… 
Se-LMS: Secured learning management systems for smart school
A multi-factor authentication and identity management for securing LMS is proposed and the proposed framework has been applied to cloud-based LMS to show the ability to mitigate an attack.


Security evaluation of the OAuth 2.0 framework
To evaluate whether the OAuth 2.0 specification is truly ready for industry application, an entire OAuth client server environment was developed and validated against the speciation threat model.
Providing Multi User Authentication and Anonymous Data sharing in cloud computing
This paper is using blowfish encryption and decryption algorithm for converting data into unknown format and get original data by using decryption process so that by implementing those concepts it can provide more security of data and also provide efficient user authentication.
IoT-OAS: An OAuth-Based Authorization Service Architecture for Secure Services in IoT Scenarios
An architecture targeting HTTP/CoAP services to provide an authorization framework, which can be integrated by invoking an external oauth-based authorization service (OAS), which is denoted as IoT-OAS is proposed.
Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions
Those issues that are preventing people from adopting the cloud are presented and a survey on solutions that have been done to minimize risks of these issues are given.
Authentication at Scale
Google is investing in client-side technologies, such as strong authentication with two-step verification using one-time passwords and public-key-based technology, for stronger user and device identification.
Inside the Identity Management Game
  • Lucy Lynch
  • Computer Science, Business
    IEEE Internet Computing
  • 2011
Techniques for managing authentication and authorization are critical to the next round of Internet innovation. Cloud-based services, the social Web, and rapidly expanding mobile platforms will
Recommendation Models for Open Authorization
This work proposed an extension to the OAuth 2.0 authorization that enables the provisioning of fine-grained authorization recommendations to users when granting permissions to third-party applications, and implemented its proposed OAuth extension as a browser extension that allows users to easily configure their privacy settings at application installation time.
Integrating User Customization and Authentication: The Identity Crisis
The integration of user customization with authentication follows four patterns. The local-user pattern tightly couples user authentication and customization. The external-user pattern loosely
OAuth Web Authorization Protocol
  • B. Leiba
  • Computer Science
    IEEE Internet Computing
  • 2012
OAuth, a new protocol for establishing identity management standards across services, provides an alternative to sharing usernames and passwords, and exposing ourselves to attacks on the authors' online data and identities.
API Access Control with OAuth: Coordinating interactions with the Internet of Things.
  • P. Windley
  • Computer Science
    IEEE Consumer Electronics Magazine
  • 2015
The use of restful application programming interfaces (APIs) is growing quickly as more and more organizations determine that they can expand their core business by attracting developers and becoming