Escolar Documentos
Profissional Documentos
Cultura Documentos
1. Introduction
2. Related work
3. Proposed model
3.1 TERMINOLOGY
Table 1. Terminology
composition explanation
Someone who uses cloud
User computing services using UCIDP
and controls the UCIDP
Manages authentication
Figure 5. The service process of the proposed model
User-Centric ID
information and personal
Provider (UCIDP) information between users and Step 1: user selects UCIDP in the UCIDP list and creates an
cloud service providers ID
Certificate Authority Authorizes the UCIDP Step 2: user requests cloud computing services
Unique information for user Step 3: cloud service provider asks user for an ID and PW
Personal ID authentication Step 4: user transmits ID and PW to cloud service provider
information such as social security number, Step 5: cloud service provider requests personal information
PIN for the service
Required information from user for Step 6: user confirms and transmits required information
Authentication ID
cloud service provider such as an
Information Step 7: cloud service provider offers service
id or password
Additional information for cloud
Common ID
services such as address, age, e-
information
mail, or phone number
48 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 8, August 2010
(a) Issuance of ID
(b) Federated ID
and control personal ID information, authentication ID [6] H.K.Oh,S.H.Jin,”The Security Limitations of SSO in
information, and common ID information. Furthermore, the OpenID”, Advanced Communication Technology,
user has the authority to offer, alter, or discard his or her 2008. ICACT 2008. 10th International Conference on,
own ID information. pp.1608-1611, 2008
The comparison of the proposed model with other systems [7] Juniper Networks, "Identity Federation in a hybrid
is depicted in Table 2. cloud computing environment solution guide",
JuniperNetworks, pp.1-6. 2009
Table 2. Comparison with other system [8] Y.S Cho, S.H. Jin, “Practical use and investigation of
SAML 2.0 OpenID Card OASIS SAML(Security Assertion Markup Language)
UCIDP
[8] [6][9] Space v2.0”, korea multimedia society, Vol.10, No. 1, pp.59-
70, 2006.
User User [9] http://en.wikipedia.org/wiki/OpenID
Agreement Existing
Certification chooses chooses
between Model
Method the IDP the IDP
IDP and SP integration
and SP and SP Authors Profile
ID federation o x o o
Moonyoung Hwang was received the B.S.
ID information
x x o o degrees from Department of Information Security
offer Engineering, Soonchunhyang University, Asan,
Korea in 2008. Now he is a student of
Change of M.S.course in Department of Information
x x x o
ID information Security Engineering, Soonchunhyang
University, Korea.
SSO o o o o