DOI QR코드

DOI QR Code

A Enhanced Security Model for Cloud Computing in SSO Environment

  • Received : 2017.06.20
  • Accepted : 2017.08.01
  • Published : 2017.08.31

Abstract

Cloud computing is cost-effective in terms of system configuration and maintenance and does not require special IT skills for management. Also, cloud computing provides an access control setting where SSO is adopted to secure user convenience and availability. As the SSO user authentication structure of cloud computing is exposed to quite a few external security threats in wire/wireless network integrated service environment, researchers explore technologies drawing on distributed SSO agents. Yet, although the cloud computing access control using the distributed SSO agents enhances security, it impacts on the availability of services. That is, if any single agent responsible for providing the authentication information fails to offer normal services, the cloud computing services become unavailable. To rectify the environment compromising the availability of cloud computing services, and to protect resources, the current paper proposes a security policy that controls the authority to access the resources for cloud computing services by applying the authentication policy of user authentication agents. The proposed system with its policy of the authority to access the resources ensures seamless and secure cloud computing services for users.

Keywords

References

  1. Jeong-hoo Jeon, "A Study on the vulnerability of the Cloud computing security", Journal of the Korea Institute of Information Security & Cryptology, Vol. 23, No. 6, pp 1239-1246, December 2013. https://doi.org/10.13089/JKIISC.2013.23.6.1239
  2. Min-Hee Cho, Eun-Gyeom Jang, Yong-Rak Choi, "User Authentication Technology using Multiple SSO in the Cloud Computing Environment", Journal of the Korea Society of Computer and Information, Vol. 21, No. 4, pp.31-38, April 2016. https://doi.org/10.9708/JKSCI.2016.21.4.031
  3. Jeong-Su Park, Yu-Mi Bae, Sung-Jae Jung, "Journal of the Korea Institute of Information and Communication Engineering", Vol. 17, No. 5, pp. 1129-1137, May 2013. https://doi.org/10.6109/jkiice.2013.17.5.1129
  4. Yoon-Su Jeong, Sang-Ho Lee, "User Authentication Protocol through Distributed Process for Cloud Environment", Journal of the KIISC, Vol. 22, No 4, pp. 841-849, August 2012.
  5. DongHee Kim, JinTak Choi, "A Study on The Efficient Authentication Management Technique of SSO Foundation", Journal of Korea Institute of Information Technology, Vol. 4, No. 3, pp.55-63, June 2006.
  6. Hyun-Jin Kim, Im-Yeong Lee, "A Study on Security and Improved Single Sign-On Authentication System against Replay Attack", Journal of the Korea Institute of Information Security & Cryptology, Vol. 24, No. 5, October 2014.
  7. Eun-Gyeom Jang, "A Study on Access Control Through SSL VPN-Based Behavioral and Sequential Patterns", Journal of The Korea Society of Computer and Information, Vol. 18, No. 11, November 2013.
  8. Dae-Hee Seo, Im-Teong Lee, "A Study on Single-On Authentication Model Using Multi Agent", The Journal of The Korea Institute of Communication Sciences", Vol. 29, No. 7C, July 2004.