An Authentication Scheme for Providing to User Service Transparency in Multicloud Environment |
Lee, Jaekyung
(Department of Computer Science and Engineering, Hanyang University)
Son, Junggab (Department of Computer Science and Engineering, Hanyang University) Kim, Hunmin (Department of Computer Science and Engineering, Hanyang University) Oh, Heekuck (Department of Computer Science and Engineering, Hanyang University) |
1 | B. Rochwerger, D. Breitgand, A. Epstein, D. Hadas, I. Loy, K. Nagin, J. Tordsson, C. Ragusa, M. Villari, S. Clayman, E. Levy, A. Maraschini, P. Massonet, H. Munoz, and G. Tofetti, "Reservoir - When One Cloud Is Not Enough," IEEE Computer, Vol. 44, Issue 3, pp. 44-51, Mar. 2011. |
2 | S. Lee, I. Ong, H. T. Lim, and H. J. Lee, "Two Factor Authentication for Cloud Computing," Journal of Information and Communication Convergence Engineering, 8(4), pp. 427-432, Aug. 2010. 과학기술학회마을 DOI ScienceOn |
3 | M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, "On Technical Security Issues in Cloud Computing," IEEE International Conference on Cloud Computing, pp. 109-116, Sept. 2009. |
4 | B. Satzger, W. Hummer, C. Inzinger, P. Leitner, and S. Dustdar, "Winds of Change: From Vendor Lock-In to the Meta Cloud," IEEE Internet Computing, Vol. 17, Issue 1, pp. 69-73, Jan.-Feb. 2013. DOI ScienceOn |
5 | S. Subashini and V. Kavitha, "A Survey on Security Issues in Service Delivery Models of Cloud Computing," Journal of network and Computer Applications, Vol. 34, Issue 1, pp. 1-11, Jan. 2011. DOI ScienceOn |
6 | J. S. Babu, K. Kishore, and K. E. N. Kumar, "Migration from Single-Cloud to Multi-Cloud Computing," International Journal of Engineering Research & Technology (IJERT), Vol. 2, Issue 4, pp. 1218-1225, Apr. 2013. |
7 | S. Sundararajan, H. Narayanan, V. Pavithran, K. Vorungati, and K. Achuthan, "Preventing Insider Attacks in the Cloud," Advances in Computing and Communications, Springer Berlin Heidelberg, Vol. 190, pp. 488-500, 2011. |
8 | M. A. AlZain, E. Pardede, B. Soh, and J. A. Thom, "Cloud Computing Security: From Single to Multi-Clouds," 45th Hawaii International Conference on System Sciences (HICSS), pp. 5490-5499, Jan. 2012. |
9 | B. Zwateendorfer and A. Tauber, "Secure Cross-Cloud Single Sign-On (SSO) using eIDs," International Conference for Internet Technology and Secured Transactions, pp. 150-155, Dec. 2012. |
10 | F. Liu, J. Tong, J. Mao, R. Bohn, J. Messina, L. Badger and D. Leaf, "NIST Cloud Computing Reference Architecture," NIST Special Publication 500 (2011): 292. |
11 | B. P. Rimal, E. M. Choi, and L. Lan, "A Taxonomy and Survey of Cloud Computing Systems," International Joint Conference on INC, IMS and IDC, pp. 44-51, Aug. 2009. |
12 | M. Jensen, J. Schwenk, J. M. Bohli, N. Gruschka, and L. L. Iacono, "Security Prospects through Cloud Computing by Adopting Multiple Clouds," IEEE International Conference on Cloud Computing (CLOUD), pp. 565-572, July. 2011. |
13 | P. Murukutla, and K. C. Shet, "Single Sign On For Cloud," International Conference on Compupting Sciences (ICCS), pp. 176-179, Sept. 2012. |
14 | M. Kretzschmar and S. Hanigk, "Security Management Interoperability Challenges for Collaboration Clouds," 4th International DMTF Academic Alliance Workshop on Systems and Virtualization Management (SVM), pp. 43-49, Oct. 2010. |
15 | M. Hojabri and K. V. Rao, "Innovation in Cloud computing: Implementation of Kerberos version5 in Cloud Computing in Order to Enhance the Security Issues," International Conference on Information Communication and Embedded Systems (ICICES), pp. 452-456, Feb. 2013. |
16 | P. Urien, E. Marie, and C. Kiennert, "An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards," International Conference on Digital Telecommunications (ICDT), pp. 22-27, June. 2010. |