Implementasi Protokol Single Sign On (SSO) Menggunakan Face Recognition
Main Article Content
Abstract
Akun (user) merupakan kunci dari segala sistem untuk bisa mengakses sistem tersebut. Sekarang setiap orang memiliki banyak akun dari sistem yang berbeda-beda. Semua akun tersebut harus diingat untuk bisa mengakses sistem. Untuk mengatasi hal seperti ini diperlukan perangkat pengelolaan akun yang terpusat yaitu menggunakan protokol Single Sign On (SSO). Dalam Penelitian ini menggunakan metode pengembangan sistem linier sequential model. Metode pengembangan sistem linier sequential model melalui empat tahapan proses yaitu analisis, desain, pengkodean dan pengujian. Pengujian yang dilakukan diantaranya pengujian blackbox, performance testing, efficiency, portability, usability, pengujian Algoritma Eigenface untuk Face Recognition, dan pengujian Multi login sistem. Hasil penelitian berupa tahapan-tahapan pengembangan sistem dengan hasil pengujian blackbox yaitu seluruh fungsi sistem berjalan dengan baik. Pada pengujian performance testing menunjukkan kinerja sistem sangat baik. Pada pengujian efficiency menghasilkan nilai diatas rata-rata GTMetrix. Pada pengujian aspek portability menunjukkan sistem bisa diakses di 3 browser. Pada pengujian usability menunjukan sistem layak digunakan. Dari pengujian Algoritma Eigenface menunjukkan proses verifikasi wajah berjalan lancar tanpa terkendala. Dapat mengakses sistem dengan login melalui sistem yang berbeda menunjukkan uji multi login sistem berhasil. Simpulan yang dapat diambil dari penelitian ini adalah sistem login SSO dapat mempermudah pengelolaan akun untuk admin dan pengguna. Sistem login SSO layak diterapkan dengan menggunakan autentikasi Face Recognition. Saran untuk pengembangan sistem lebih lanjut yaitu diperlukan penambahan fungsi enkripsi dan pembangunan dedicated server sendiri untuk Face Recognition
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
References
[2] D. Richard Kuhn,Vincent C. Hu W. Timothy Polk, Shu-Jen Chang. Introduction to Public Key Technology and the Federal PKI Infrastructure. NIST SP 800-32, 2001.
[3] J. Wayman, 1999. Technical testing and evaluation of biometric identification devices, in A. Jain, et al. (eds) Biometrics: Personal Identification in Networked Society. Kluwer Academic Press.
[4] Michael Zimmerman. Biometrics and User Authentication. SANS Institute. M.Zimmerman, "Biometrics and User Authentication," SANS Institute, 2002.
[5] Patrik telnoni. 2014. SAML single sign-on protocol development using combination of speech and speaker recognition. International Conference on Advanced Informatics: Concept, Theory and Application, ICAICTA.
[6] Jani Hursti. 1997. Single Sign-On. Helsinki University of Technology .
[7] Madhavi A. Indalkar, Prof. Ram Joshi. 2014, Efficient and Secure Single Sign On Mechanism for Distributed Network, Int. Journal of Engineering Research and Applications.
[8] Jeaf Wang. 2013. Spatially Enhanced Local Binary Patterns for Face Detection and Recognition in Mobile Device Applications. Department of Electrical and Computer Engineering University of Toronto.
[9] M. A. Turk and A. P. Pentland. 1991. Face Recognition Using Eigenfaces.
[10] Divyarajsinh N. Parmar, Brijesh B. Mehta. 2013. Face Recognition Methods & Applications. Int.J.Computer Technology & Applications,Vol 4 (1),84-86, ISSN:2229-6093.
[11] Pressman, Roger S. 2002. Rekayasa Perangkat Lunak :Pendekatan Praktisi (Buku 1). Yogyakarta : Andi.
[12] Jain, Shreya. 2011. 10 Best Tools for Test Automation. On line at: http://www.toolsjournal.com/[diakses pada hari Sabtu, 10 September 2016]