An Authentication Scheme for Providing to User Service Transparency in Multicloud Environment

ABSTRACT Most of the single server model of cloud computing services hav e problems that are hard to solve, such as a service availability, insider attack, and vendor lock-in, etc. To solve these problems, the research about multicloud has emerged. Multicloud model can supplement previous cloud model‘s weakness and provides new services to user. In this paper, we focus on a user authentication problem in multicloud model and propos e a scheme to resolve it. We define a cloud broker-based multicloud model. And we propose an authentication protocol tha t is applicable at presented model. The proposed scheme can provide service transparency to user and prevent an impersonati on attack by service provider.Keywords: cloud computing, multicloud, authentication, cloud broker접수일(2013년 10월 1일), 게재확정일(2013년 11월 14일)* 본 연구는 미래창조과학부 및 정보통신산업진흥원의 대학 IT연구센터 지원사업의 연구결과로 수행되었음(NIPA-2013-H0301-13-1002)* 이 논문은 2013년도 정부(교육과학기술부)의 재원으로 한국연구재단의 지원을 받아 수행된 연구임(No. 2012-R1A2A2A01046986)* 이 논문은 2013년도 정부(교육과학기술부)의 재원으로 한국연구재단 기초연구사업의 지원을 받아 수행된 연구임(No. 2012-R1A1A2009152)†주저자, jklee85@hanyang.ac.kr‡교신저자, hkoh@hanyang.ac.kr(Corresponding author)

[1]  Schahram Dustdar,et al.  Winds of Change: From Vendor Lock-In to the Meta Cloud , 2013, IEEE Internet Computing.

[2]  Jörg Schwenk,et al.  On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.

[3]  J. Suresh Babu,et al.  Migration from Single-Cloud to Multi-Cloud Computing , 2013 .

[4]  James A. Thom,et al.  Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.

[5]  Bernd Zwattendorfer,et al.  Secure cross-cloud single sign-on (SSO) using eIDs , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[6]  Krishnashree Achuthan,et al.  Preventing Insider Attacks in the Cloud , 2011, ACC.

[7]  K. Venkat Rao,et al.  Innovation in cloud computing: Implementation of Kerberos version5in cloud computing in order to enhance the security issues , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).

[8]  Jin Tong,et al.  NIST Cloud Computing Reference Architecture , 2011, 2011 IEEE World Congress on Services.

[9]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[10]  Jörg Schwenk,et al.  Security Prospects through Cloud Computing by Adopting Multiple Clouds , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[11]  Pascal Urien,et al.  An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards , 2010, 2010 Fifth International Conference on Digital Telecommunications.

[12]  Benny Rochwerger,et al.  Reservoir - When One Cloud Is Not Enough , 2011, Computer.

[13]  Hyotaek Lim,et al.  Two Factor Authentication for Cloud Computing , 2010, J. Inform. and Commun. Convergence Engineering.