메뉴 건너뛰기
Library Notice
Institutional Access
If you certify, you can access the articles for free.
Check out your institutions.
ex)Hankuk University, Nuri Motors
Log in Register Help KOR
Subject

User Authentication Technology using Multiple SSO in the Cloud Computing Environment
Recommendations
Search
Questions

클라우드 컴퓨팅 환경에서 다중 SSO를 활용한 사용자 인증 기술

논문 기본 정보

Type
Academic journal
Author
Min-Hee Cho (Daejeon University) Eun-Gyeom Jang (Jangan University) Yong-Rak Choi (Daejeon University)
Journal
The Korean Society Of Computer And Information Journal of the Korea Society of Computer and Information Vol.21 No.4 KCI Accredited Journals
Published
2016.4
Pages
31 - 38 (8page)

Usage

cover
📌
Topic
📖
Background
🔬
Method
🏆
Result
User Authentication Technology using Multiple SSO in the Cloud Computing Environment
Ask AI
Recommendations
Search
Questions

Abstract· Keywords

Report Errors
The interface between servers and clients and system management in the cloud computing environment is different from the existing computing environment. The technology for information protection. Management and user authentication has become an important issue. For providing a more convenient service to users, SSO technology is applied to this cloud computing service. In the SSO service environment, system access using a single key facilitates access to several servers at the same time. This SSO authentication service technology is vulnerable to security of several systems, once the key is exposed.
In this paper, we propose a technology to solve problems, which might be caused by single key authentication in SSO-based cloud computing access. This is a distributed agent authentication technology using a multiple SSO agent to reinforce user authentication using a single key in the SSO service environment. For user authentication reinforcement, phased access is applied and trackable log information is used when there is a security problem in system to provide a safe cloud computing service.

Contents

Abstract
I. Introduction
II. Literature Review
III. Safe Cloud Computer Authentication Reinforcement Technique
IV. Performance Test and Analysis
V. Conclusion
REFERENCES

References (12)

Add References

Recommendations

It is an article recommended by DBpia according to the article similarity. Check out the related articles!

Related Authors

Frequently Viewed Together

Recently viewed articles

Comments(0)

0

Write first comments.

UCI(KEPA) : I410-ECN-0101-2016-325-002841402