Browse > Article
http://dx.doi.org/10.17662/ksdim.2014.10.3.181

A Design of Interdependent Multi Session Authentication Scheme for Secure Cloud Service  

Song, Jun Ho (숭실대학교 컴퓨터학과)
Choi, Do Hyun (숭실대학교 컴퓨터학과)
Park, Jung Oh (동양미래대학교)
Publication Information
Journal of Korea Society of Digital Industry and Information Management / v.10, no.3, 2014 , pp. 181-196 More about this Journal
Abstract
Cloud computer technology currently provides diverse services based on a comprehensive environment ranging from hardware to solution, network and service. While the target of services has been extended from institutions and corporations to personal infrastructure and issues were made about security problems involved with protection of private information, measures on additional security demands for such service characteristics are insufficient. This paper proposes a multi-session authentication technique based on the characteristics of SaaS (Software as a Service) among cloud services. With no reliable authentication authority, the proposed technique reinforced communication sessions by performing key agreement protocol safe against key exposure and multi-channel session authentication, providing high efficiency of performance through key renewal using optimzied key table. Each formed sessions have resistance against deprivation of individual confirmation and service authority. Suggested confirmation technique that uses these features is expected to provide safe computing service in clouding environment.
Keywords
Cloud Service; Personal Cloud; SaaS; Mutual Authentication;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Gartner, "Forecast Overview: Public Cloud Services, Worldwide, 2011-2016," 2013.
2 Young-Won Kang, "Recent Trends of Cloud Computing Services," NET Term, 2012.
3 Daryl C. Plummer, Thomas J. Bittman, Tom Austin, David W. Cearley, David Mitchell Smith. "Cloud Computing: Defining and Describing an Emerging Phenomenon," Gartner Research, 2008.
4 IDC, "Worldwide and Regional Public IT Cloud Services 2013-2017 Forecast," 2013.
5 Eui-Nam Heo, "Personal Cloud Security Technology and Privacy," Telecommunications Technology Association, TTA Journal Vol. 139, 2012.
6 Hwan-Seok Yang, "A Study on Improvement Stabilty of Cloud Service using Atack Information Colection," Korea Society of Digital Industry & Information Management, Vol. 9, No. 2, 2013.
7 Jeong-Mo Yang, "A Study on Improving the Reliabilty of Cloud Computing," Korea Society of Digital Industry & Information Management, Vol8 No. 4, 2012.
8 Chul-Soo Im, "Cloud Computing Security Technology," Korea Institude of Information Security & Cryptology, Vol. 19, No. 3, pp. 12-15, 2009.
9 Ae-ra Kwon, "Changes in the IT ecosystem and countermeasures according to the diffusion Cloud Services," Korea Information Technology Service Industry Association.
10 Hyun-Young Yoon, "Cloud Services Trends and Issues," Korea Communication Agency, 2011.
11 CSA, "The Notorious Nine: Cloud Computing Top Threats in 2013," Cloud Security Alliance, 2013.
12 Kwang-Seok Kim, "Domestic and foreign market and policy trends in cloud computing," National IT Industry Promotion Agency, 2013.
13 IBM, "Defining a framework for cloud adoption," IBM Global Technology Services, Thought Leadership White Paper, 2010.
14 Ki-Chul Kim, "A Security Evaluation Criteria for Korean Cloud Computing Service," Korea Institute Of Information Security And Cryptology, Vol. 23, No. 2, 2013, pp. 3-17.   DOI   ScienceOn
15 Kab-Seung Ko, "A Study on Security-Enhanced Cloud Service E&C(Evaluation and Certification Scheme," Journal of Security Engineering, Vol. 9, No. 6, 2012.
16 Daryl C. Plummer, Thomas J. Bittman, Tom Austin, David W. Cearley, David Mitchell Smith, "Cloud Computing: Defining and Describing an Emerging Phenomenon," Gartner Research, 2008