Browse > Article
http://dx.doi.org/10.5762/KAIS.2011.12.5.2353

An efficient user authentication protocol for cloud computing environments  

Moon, Jeong-Kyung (Division of Information Communication, KongJu University)
Kim, Jin-Mook (Division of Information Technology Education, SunMoon University)
Kim, Hwang-Rae (Division of Information Communication, KongJu University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.12, no.5, 2011 , pp. 2353-2359 More about this Journal
Abstract
The request of Green-IT technology and recommend of computer hardware resource are increasing explosively. So, necessity of Cloud computing is increasing rapidly. Berkeley Univ. announced teens constituent that threat Cloud computing in 2009 and problem for user authentication should be solved as is urgentest among them. So, We wish to propose effective user authentication protocol in Cloud computing environment. Secure safety for user quotation through Kerberos's ticket issue that is existent representative user authentication techniques, and defined authentication procedure of two steps that flow user authentication and service authentication through PKI's. Is uncomplicated structurally more than efficiency for certification protocol and examination result about safety, existent PKI that propose and simplify achievement procedure and system configuration more than Kerberos and reduced response time.
Keywords
Authentication; Certification; Cloud computing; Kerberos algorithm; PKI;
Citations & Related Records
연도 인용수 순위
  • Reference
1 http://mbn.mk.co.kr/tv/programVodList.php?programCode=474, 클라우드 컴퓨팅, 제2의 디지털 혁명 오나, 서울여대 박춘식
2 Dave Thomas, "Enabling Application Agility-Software as a Service, Cloud Computing and Dynamic Languages," journal of Object Technology, Vol. 7, No.4, May-June 2008.
3 세일즈포스닷컴. "Salesforce 마케팅," http://sales-force.com
4 KIPA, "SaaS 대표주자, Salesforce.com의 성장세 분석," 2007. 11.
5 정보통신동향분석 제24권 제4호 2009. 8. 클라우드 컴퓨팅 기술 동향 민옥기 외.
6 George Lawton, :Developing Software Online with Platform-as-a-Service Technology," Computer, June 2008.
7 Amazon, "Amazon Web Service: Overview of Security Process," http://aws.amazon.com, white paper, Sep. 2008.
8 Michael Armbrust 외 10인, "Above the Clouds: A Berkley View of Cloud Computing," http://radlab.cs.berkeley.edu, Feb. 2009.
9 "Amazon Elastic Compute Cloud(Amazon EC2)," http://aws.amazon.com/ec2
10 "Amazon Simple Storage Service(Amazon S3)," http://aws.amazon.com/s3
11 http://www.digieco.co.kr/KTFront/report/report_focus_view.action?gubun2=k&board_seq=4116&board_id=focusD&reply_group=4091&spare=k&temp_etc1=2010&temp_etc2=07 모바일 클라우드 서비스 국내외 정책 추진 현황, 이정아, 2010. 10.
12 Joel Kirch, "Virtual Machine Security Guidelines", The Center for Internet Security, September 2007.
13 Joel Kirch, "Virtual Machine Security Guidelines", The Center for Internet Security, September 2007.
14 은성경 외3, 전자통신동향분석 제24권 제4호 2009. 8.