Advertisement

Authentication Platform for Provisioning in Cloud Computing

  • Hyokyung Chang
  • Changbok Jang
  • Hyosik Ahn
  • Euiin Choi
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 206)

Abstract

Spreading of Cloud Computing draws users to ask for service provide that is more improved, faster, and securer. So, there come security issues in Cloud Computing continuously and there have been a lot of studies on authentication and accee control. Provisioning is a technology related to the process and action that prepare knowledge and resources and supply what needed in advance to find the opitimum among them. Provisioning is one of the technologies to make Cloud Computing more efficiently. This paper proposes an authentication for provisioing in Cloud Computing.

Keywords

Authentication Provisioning RBAC Cloud Computing 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ferraiolo, D.F., Kuhn, D.R.: Role-Based Access Controls. In: 15th Computer Security Conference, pp. 554–563 (1992)Google Scholar
  2. 2.
    Wikipedia, the free encyclopedia, http://en.wikipedia.org/wiki/OSGi
  3. 3.
    Beritino, E., et al.: Privacy-preserving Digital Identity Management for Cloud Computing. Bulletin of the Technical Committee on Data Engineering 31(1) (January 2009)Google Scholar
  4. 4.
    Lee, H., Chung, M.: Context-Aware Security for Cloud Computing Environment. In: IEEK, vol. 47, pp. 561–568 (2010)Google Scholar
  5. 5.
    Lee, C., Hong, W.: Chang. H.: A Study on Authentication Technique based on OSGi Service Platform. In: KIISE, vol. 49(5), pp. 387–395 (October 2009)Google Scholar
  6. 6.
    Chang, H., Choi, E.: User Authentication in Cloud Computing. CCIS, vol. 120, pp. 338–342 (2011)Google Scholar
  7. 7.
    Chow, R., Golle, P., Jakobsson, M., Masuoka, R., Molina, J., Shi, E., Staddon, J.: Cloud Computing: Outsourcing Computation without Outsourcing Control, Palo Alto Research Center (2009)Google Scholar
  8. 8.
    Kambatla, K., Pathak, A., Pucha, H.: Towards optimizing Hadoop Provisioning in the Cloud. In: HotCloud 2009 Proceedings (2009)Google Scholar
  9. 9.
    Wikipedia, the free encyclopedia, http://en.wikipedia.org/wiki/RBAC
  10. 10.
    Kim, H., Park, C.: Cloud Computing and Personal Authentication Service. In: KIISC, vol. 20, pp. 11–19 (2010)Google Scholar
  11. 11.
    OSGi Alliance, OSGi Service Platform Core Specification, Released 4, Version 4.1 (April 2007)Google Scholar
  12. 12.
    Un, S., et al.: Cloud Computing Security Technology. In: ETRI, vol. 24(4), pp. 79–88 (2009)Google Scholar
  13. 13.
    Phillips, C.E.: Security Assurance for a Resource-Based RBAC/DAC/MAC Security Model. University of Connecticut (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Hyokyung Chang
    • 1
  • Changbok Jang
    • 1
  • Hyosik Ahn
    • 1
  • Euiin Choi
    • 1
  1. 1.Dept. of Computer EngineeringHannam UniversityDaejeonKorea

Personalised recommendations