Browse > Article
http://dx.doi.org/10.9708/jksci.2020.25.11.139

User Authentication Technology Using Multi-Blocks in the Cloud Computing Environment  

Jang, Eun-Gyeom (Dept. of Internet Communication, Jangan University)
Abstract
Cloud computing technology provides economic and efficient system operation and management features to deal with rapidly changing IT technologies. However, this is less used in institutes and companies due to low security of cloud computing service. It is recognized that storing and managing important information, which is confidential in external systems is vulnerable to security threats. In order to enhance security of this cloud computing service, this paper suggests a system and user authentication reinforcement model. The suggested technology guarantees integrity of user authentication information and provides users with convenience by creating blocks for each cloud service and connecting service blocks with chains. The block chain user authentication model offers integrity assurance technology of block chains and system access convenience for SSO users. Even when a server providing cloud computing is invaded, this prevents chained invasions not to affect other systems.
Keywords
Cloud Computing; SSO; Block Chain; User Authentication; Integrity;
Citations & Related Records
Times Cited By KSCI : 9  (Citation Analysis)
연도 인용수 순위
1 Jae-Young Moon, Cloud Computing Trend and Future Directions, The Korea Contents Association Review, Vol. 17, No. 1, pp. 23-26, Mar. 2019.
2 Un SungKyong, Cloud Computing Security Technology Trend, Korea Institute Of Information Security And Cryptology, Vol. 20, No. 20, pp.27-31, April. 2010. DOI:10.9708/jksci.2015.20.7.049   DOI
3 Min-Hee Cho, Eun-Gyeom Jang, Yong-Rak Choi, User Authentication Technology using Multiple SSO in the Cloud Computing Environment, Journal of the Korea Society of Computer and Information, Vol 21 No. 4, pp. 31-38, April. 2016. DOI:10.9708/jksci.2016.21.4.031   DOI
4 Ye-Ryoung Suh, Sung-Hwan Park, Dong-Jun Choi, Jae-Woo Lee, Blockchain security issues and the latest robust blockchain technology, Communications of the Korean Institute of Information Scientists and Engineers, Vol. 38, No. 7, pp. 14-18, July. 2020.
5 HAN Ho Hyeorn, Authentication for Blockchain Service Communications of the Korean Institute of Information Scientists and Engineers Vol. 38 No. 7, pp. 19-24, July. 2020.
6 Eun-Gyeom Jang, A Enhanced Security Model for Cloud Computing in SSO Environment, Journal of the Korea Society of Computer and Information. Vol. 22, No. 8, pp. 55-61, Aug. 2017. DOI:10.9708/jksci.2017.22.08.055   DOI
7 Jinho Yoo, A study on Applying Privacy by Design in Blockchain Services, Communications of the Korean Institute of Information Scientists and Engineers, Vol. 38, No. 7, pp. 32-39, July. 2020.
8 Ju Min Cha, Jeong Gyu Kim, Yong Yook Kim, Moo Hyun Lim, Woosaeng Kim, Blockchain-Based Pet Trade Service DApp, Journal of Information Technology Applications & Management, Vol. 26, No. 6, pp.79-87, Dec. 2019. DOI:10.21219/jitam.2019.26.6.079   DOI
9 Baek, YeongTae, Min Youn A, A study on DID self-sovereign identity for digital content management, Proceedings of the Korean Society of Computer Information Conference. Vol. 28, No. 2, pp 395-396, July. 2020