• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

¿µ¹® ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ¿µ¹® ³í¹®Áö > JICCE (Çѱ¹Á¤º¸Åë½ÅÇÐȸ)

JICCE (Çѱ¹Á¤º¸Åë½ÅÇÐȸ)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) Two Factor Authentication for Cloud Computing
¿µ¹®Á¦¸ñ(English Title) Two Factor Authentication for Cloud Computing
ÀúÀÚ(Author) Shirly Lee   Ivy Ong   HyoTaek Lim   HoonJae Lee  
¿ø¹®¼ö·Ïó(Citation) VOL 08 NO. 04 PP. 0427 ~ 0432 (2010. 08)
Çѱ۳»¿ë
(Korean Abstract)
¿µ¹®³»¿ë
(English Abstract)
The fast-emerging of cloud computing technology today has sufficiently benefited its wide range of users from individuals to large organizations. It carries an attractive characteristic by renting myriad virtual storages, computing resources and platform for users to manipulate their data or utilize the processing resources conveniently over Internet without the need to know the exact underlying infrastructure which is resided remotely at cloud servers. However due to the loss of direct control over the systems/applications, users are concerned about the risks of cloud services if it is truly secured. In the literature, there are cases where attackers masquerade as cloud users, illegally access to their accounts, by stealing the static login password or breaking the poor authentication gate. In this paper, we propose a two-factor authentication framework to enforce cloud services¡¯ authentication process, which are Public Key Infrastructure (PKI) authentication and mobile out-of-band (OOB) authentication. We discuss the framework¡¯s security analysis in later session and conclude that it is robust to phishing and replay attacks, prohibiting fraud users from accessing to the cloud services.
Å°¿öµå(Keyword) Cloud Computing   Mobile OOB Authentication   PKI Authentication   Stream Cipher   Two-Factor Authentication  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå