Skip to main content

Approach of Secure Authentication System for Hybrid Cloud Service

  • Conference paper
Advances in Computer Science and its Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 279))

Abstract

Desire for cloud service is very increasing recently. But users are using cloud service actually very few. Because a private cloud service is very expensive and have a many restrict condition. On the other hand, public cloud service, if you can use it than you have to pay a usage fee when you needed external resources that have been published. However, public cloud service is a fear that the privacy of personal information or leaked, put to save the information that requires security. Therefore, the demand for hybrid cloud service has occurred. But, in order to provide a hybrid cloud service, is often difficult to be applied as an authentication system that was used in the cloud service existing. Therefore, I would like to propose a secure authentication system for the hybrid cloud service in this paper. We will secure authentication system for the hybrid cloud service that is provided security, availability, applicability. Our proposed system has a very good capability in suggested condition.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kim, T.H., Kim, I.H., Min, C.W., Yeom, Y.I.: Security Technical Trend of Cloud Computing. Computer Science Managine 30(1), 30–38 (2012)

    Google Scholar 

  2. Jansen, W., Grance, T.: Tuidelines on Security and Privacy in Public Cloud Computing (2011)

    Google Scholar 

  3. Mannan, M., Kim, B.H., Ganjali, A., Lie, D.: Unicorn: Two-factor Attestation for data Security. In: Proc. Of the 18th ACM conference on Computer and Communications Security (2011)

    Google Scholar 

  4. Bang, Y.H., Jeong, S.J., Hwang, S.M.: Security Requirement Development Tools of Mobile Cloud System. Information and Communications Magazine 28(10), 19–29 (2011)

    Google Scholar 

  5. Hubbard, D., Sutton, M.: Top Threats to Cloud Computing V1.0. Cloud Security Alliance (March 2010)

    Google Scholar 

  6. Liao, I.-E., Lee, C.C., Hwang, M.S.: A password authentication scheme over insecure networks. J. Comput. System Sci. 72(4), 727–740 (2006)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jin-Mook Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, JM., Moon, JK. (2014). Approach of Secure Authentication System for Hybrid Cloud Service. In: Jeong, H., S. Obaidat, M., Yen, N., Park, J. (eds) Advances in Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 279. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41674-3_77

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41674-3_77

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41673-6

  • Online ISBN: 978-3-642-41674-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics