Browse > Article
http://dx.doi.org/10.7840/kics.2012.37C.11.1027

A Study of Security Authentication for Cloud Computing Based on Smart Phone  

Jeong, Yoon-Su (목원대학교 정보통신공학과)
Kim, Yong-Tae (한남대학교 멀티미디어학부)
Abstract
Recently, the smart phone including web and mobile service based on the reliability and extendability of cloud computing is receiving huge attention. However, most of current cloud services provide just an application service for synchronizing data between mobile entity and server. Business model developed by communication companies have problems with interoperability. This paper proposes a new service security authentication model to efficiently manage smart phone users using different business models between smartphones and to keep the reliability and extendability of cloud computing. Proposed model authenticates for smart phone users to stay with in the unified communication with smart phone user's identity and access control to effectively use the current cloud computing system.
Keywords
Cloud Computing; Smart Phone; Security Structure;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Zissis, and D. Lekkas, "Addressing cloud computing security issues", Future Generation Computer Systems, vol. 28(3), 2012
2 W. Jansen, and T. Grance, "Guidelines on Security and Privacy in Public Cloud Computing", 2011.
3 M. Mannan, B. H. Kim, A. Ganjali, and D. Lie, "Unicorn: Two-factor Attestation for data Security", Proc. of the 18th ACM conference on Computer and Communications Security. 2011
4 F. Zhang, J. Chen, H. Chen, and B. Zang, "CloudVisor: Retrofitting Protection of Virtual Machines in Multitenant Cloud with Nested Virtualization", Proc. of 23rd ACM Symposium on Operating Systems Principles. 2011
5 K. C. Lee, S and Y. Lee, "Mobile Cloud Standard Trend and strategy", Information and Commnunications Magazine, Vol. 28, No. 10, pp. 44-49. 2011.
6 Y. H. Bang, S. J. Jeong, S. M. Hwang, "Security Requirement Development Tools of Mobile Cloud System", Information and Commnunications Magazine, Vol. 28, No. 10, pp. 19-29. 2011.
7 I. Y. Jeong, C. Y. Lee, J. Y. Kim, H. K. Kim and Y. C. Jeong,, "Context Awareness Dynamic Authentication and Authorization Management Service in Mobile Cloud Multi-tenancy Environment", Information Security Magazine, Vol 21, No. 8, pp. 14-22. 2011.
8 ABIresearch, "Mobile Cloud Computing". 2009
9 Security for Access to Device APIs from the Web - W3C Workshop, http://www.w3.org/2008/security -ws/.
10 T. H. Kim, I. H. Kim, C. W. Min and Y. I. Yeom, "Security Technical Trend of Cloud Computing", Computer Science Managine 30(1), pp. 30-38, Jan. 2012.