Browse > Article
http://dx.doi.org/10.13089/JKIISC.2013.23.6.1131

An Authentication Scheme for Providing to User Service Transparency in Multicloud Environment  

Lee, Jaekyung (Department of Computer Science and Engineering, Hanyang University)
Son, Junggab (Department of Computer Science and Engineering, Hanyang University)
Kim, Hunmin (Department of Computer Science and Engineering, Hanyang University)
Oh, Heekuck (Department of Computer Science and Engineering, Hanyang University)
Abstract
Most of the single server model of cloud computing services have problems that are hard to solve, such as a service availability, insider attack, and vendor lock-in, etc. To solve these problems, the research about multicloud has emerged. Multicloud model can supplement previous cloud model's weakness and provides new services to user. In this paper, we focus on a user authentication problem in multicloud model and propose a scheme to resolve it. We define a cloud broker-based multicloud model. And we propose an authentication protocol that is applicable at presented model. The proposed scheme can provide service transparency to user and prevent an impersonation attack by service provider.
Keywords
cloud computing; multicloud; authentication; cloud broker;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 B. Rochwerger, D. Breitgand, A. Epstein, D. Hadas, I. Loy, K. Nagin, J. Tordsson, C. Ragusa, M. Villari, S. Clayman, E. Levy, A. Maraschini, P. Massonet, H. Munoz, and G. Tofetti, "Reservoir - When One Cloud Is Not Enough," IEEE Computer, Vol. 44, Issue 3, pp. 44-51, Mar. 2011.
2 S. Lee, I. Ong, H. T. Lim, and H. J. Lee, "Two Factor Authentication for Cloud Computing," Journal of Information and Communication Convergence Engineering, 8(4), pp. 427-432, Aug. 2010.   과학기술학회마을   DOI   ScienceOn
3 M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, "On Technical Security Issues in Cloud Computing," IEEE International Conference on Cloud Computing, pp. 109-116, Sept. 2009.
4 B. Satzger, W. Hummer, C. Inzinger, P. Leitner, and S. Dustdar, "Winds of Change: From Vendor Lock-In to the Meta Cloud," IEEE Internet Computing, Vol. 17, Issue 1, pp. 69-73, Jan.-Feb. 2013.   DOI   ScienceOn
5 S. Subashini and V. Kavitha, "A Survey on Security Issues in Service Delivery Models of Cloud Computing," Journal of network and Computer Applications, Vol. 34, Issue 1, pp. 1-11, Jan. 2011.   DOI   ScienceOn
6 J. S. Babu, K. Kishore, and K. E. N. Kumar, "Migration from Single-Cloud to Multi-Cloud Computing," International Journal of Engineering Research & Technology (IJERT), Vol. 2, Issue 4, pp. 1218-1225, Apr. 2013.
7 S. Sundararajan, H. Narayanan, V. Pavithran, K. Vorungati, and K. Achuthan, "Preventing Insider Attacks in the Cloud," Advances in Computing and Communications, Springer Berlin Heidelberg, Vol. 190, pp. 488-500, 2011.
8 M. A. AlZain, E. Pardede, B. Soh, and J. A. Thom, "Cloud Computing Security: From Single to Multi-Clouds," 45th Hawaii International Conference on System Sciences (HICSS), pp. 5490-5499, Jan. 2012.
9 B. Zwateendorfer and A. Tauber, "Secure Cross-Cloud Single Sign-On (SSO) using eIDs," International Conference for Internet Technology and Secured Transactions, pp. 150-155, Dec. 2012.
10 F. Liu, J. Tong, J. Mao, R. Bohn, J. Messina, L. Badger and D. Leaf, "NIST Cloud Computing Reference Architecture," NIST Special Publication 500 (2011): 292.
11 B. P. Rimal, E. M. Choi, and L. Lan, "A Taxonomy and Survey of Cloud Computing Systems," International Joint Conference on INC, IMS and IDC, pp. 44-51, Aug. 2009.
12 M. Jensen, J. Schwenk, J. M. Bohli, N. Gruschka, and L. L. Iacono, "Security Prospects through Cloud Computing by Adopting Multiple Clouds," IEEE International Conference on Cloud Computing (CLOUD), pp. 565-572, July. 2011.
13 P. Murukutla, and K. C. Shet, "Single Sign On For Cloud," International Conference on Compupting Sciences (ICCS), pp. 176-179, Sept. 2012.
14 M. Kretzschmar and S. Hanigk, "Security Management Interoperability Challenges for Collaboration Clouds," 4th International DMTF Academic Alliance Workshop on Systems and Virtualization Management (SVM), pp. 43-49, Oct. 2010.
15 M. Hojabri and K. V. Rao, "Innovation in Cloud computing: Implementation of Kerberos version5 in Cloud Computing in Order to Enhance the Security Issues," International Conference on Information Communication and Embedded Systems (ICICES), pp. 452-456, Feb. 2013.
16 P. Urien, E. Marie, and C. Kiennert, "An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards," International Conference on Digital Telecommunications (ICDT), pp. 22-27, June. 2010.