Abstract
As Cloud Computing has been spreading widely, users and service providers enables to use resource or service cheaply and easily without owning all the resource needed. However, Cloud Computing has some security issues such as virtualization technology security, massive distributed processing technology, service availability, massive traffic handling, application security, access control, and authentication and password. User authentication among them requires a high-quranteed security. Hence, this paper would like to discuss technologies of access contol and user authentication briefly and look at the problems inside.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lee, T.: Features of Cloud Computing and Offered Service State by Individual Vender. Broadcasting and Communication Policy 22, 18–22 (2000)
http://www.gartner.com/technology/symposium/2009/sym19/about.jsp
Lee, J., Choi, D.: New trend of IT led by Cloud Computing. In: LG Economic Research Institute (2010)
Lee, H., Chung, M.: Context-Aware Security for Cloud Computing Environment. IEEK 47, 561–568 (2010)
Kim, J., Kim, H.: Cloud Computing Industry Trend and Introduction Effect. In: IT Insight, National IT Industry promotion Agency (2010)
Dikaiakos, M.D., et al.: Cloud Computing Distributed Internet Computing for IT and Scientific Research. IEEE Internet Computing, 10–13 (September/October 2009)
Harauz, J., et al.: Data Security in the World of Cloud Computing. IEEE Security & Privacy, 61–64 (2009)
Lee, J.: Cloud Compting, Changes IT Industry Paradigm. LG Business Insight, 40–46 (2009)
Kim, H., Park, C.: Cloud Computing and Personal Authentication Service. KIISC 20, 11–19 (2010)
Armbust, M., et al.: Above the Clouds: A Berkeley View of Cloud Computing. In: Technical Report (2009), http://www.eeec.berkeley.edu/Pubs/TechRpts/2009/EEEC-2009-28.html
Un, S., et al.: Cloud Computing Security Technology. ETRI 24(4), 79–88 (2009)
Beritino, E., et al.: Privacy-preserving Digital Identity Management for Cloud Computing. Bulletin of the Technical Committee on Data Engineering 31(1) (January 2009)
Gartner Says Cloud Computing Will Be As Influential As E-business (2008), http://www.gartner.com/it/page.jsp?id=707508
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chang, H., Choi, E. (2011). User Authentication in Cloud Computing. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Ubiquitous Computing and Multimedia Applications. UCMA 2011. Communications in Computer and Information Science, vol 151. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20998-7_42
Download citation
DOI: https://doi.org/10.1007/978-3-642-20998-7_42
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20997-0
Online ISBN: 978-3-642-20998-7
eBook Packages: Computer ScienceComputer Science (R0)