SuSSo: Seamless and ubiquitous single sign-on for cloud service continuity across devices

The great variety of consumer electronic devices with support of wireless communications combined with the emerging Cloud Computing paradigm is paving the way to real anytime/anywhere computing. In this context, many services, such as music or video streaming, are delivered to the clients using Cloud-based providers. However, service continuity when moving across different terminals is still a major challenge. This paper proposes SuSSo, a novel middleware architecture that allows sessions initiated from one device to be seamlessly transferred to a second one, as might be desirable in the enjoyment of long running media.

[1]  D. Recordon,et al.  The OAuth 2.0 Authorization Protocol: Bearer Tokens draft-ietf-oauth-v2-bearer-10 , 2012 .

[2]  Janno von Stülpnagel,et al.  Automatic context detection of a mobile user , 2010, 2010 International Conference on Wireless Information Networks and Systems (WINSYS).

[3]  Marc Barisch Design and Evaluation of an Architecture for Ubiquitous User Authentication Based on Identity Management Systems , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[4]  Alan O. Freier,et al.  Internet Engineering Task Force (ietf) the Secure Sockets Layer (ssl) Protocol Version 3.0 , 2022 .

[5]  Andrés Marín López,et al.  FamTV: An architecture for presence-aware personalized television , 2011, IEEE Transactions on Consumer Electronics.

[6]  Christopher Soghoian An End to Privacy Theater: Exposing and Discouraging Corporate Disclosure of User Data to the Government , 2010 .

[7]  Feng Hao,et al.  Password Authenticated Key Exchange by Juggling , 2008, Security Protocols Workshop.

[8]  Masanobu Abe,et al.  A life log collector integrated with a remote-controller for enabling user centric services , 2009, IEEE Transactions on Consumer Electronics.

[9]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[10]  Jeff Hodges,et al.  Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V2. 0 , 2001 .

[11]  Neco Ventura,et al.  A SIP-based web client for HTTP session mobility and multimedia services , 2010, Comput. Commun..

[12]  Chien-Chao Tseng,et al.  Stateful session handoff for mobile WWW , 2006, Inf. Sci..

[13]  Feng Hao,et al.  How to Sync with Alice , 2011, Security Protocols Workshop.

[14]  Ji-Young Kwak Ubiquitous Services System Based on SIP , 2007, IEEE Transactions on Consumer Electronics.

[15]  Feng Hao,et al.  J-PAKE: Authenticated Key Exchange without PKI , 2010, Trans. Comput. Sci..

[16]  Min-Xiou Chen,et al.  Session mobility of SIP over multiple devices , 2008 .

[17]  Andrés Marín López,et al.  A Trust-based Middleware for Providing Security to Ad-Hoc Peer-to-Peer Applications , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[18]  Maja Pantic,et al.  Social signal processing: Survey of an emerging domain , 2009, Image Vis. Comput..

[19]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..

[20]  Ian S. Burnett,et al.  Application level session hand-off management in a ubiquitous multimedia environment , 2004, e-Business and Telecommunication Networks.

[21]  S. Martin,et al.  Using context prediction for self-management in ubiquitous computing environments , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..