DOI QR코드

DOI QR Code

Design of User Integrated Authentication System in Heterogeneous Distributed Cloud Service Brokerage Environment

이종 분산 클라우드 서비스 브로커리지 환경에서의 사용자 통합 인증 시스템 설계

  • Lee, Daesung (Department of Computer Engineering, Catholic University of Pusan)
  • Received : 2016.11.01
  • Accepted : 2016.11.13
  • Published : 2016.11.30

Abstract

Currently, cloud systems are not interoperable due to low interoperability between cloud systems as operators build up cloud environments with their own way. For example, users of the Google cloud system can not use the Microsoft (Microsoft) cloud system unless they go through an additional log-in process. In order for Google cloud system's users to use MS cloud system services, they must log in to the MS cloud system again after logging out of Google cloud system. In order to solve these problems, Cloud Service Broker(CSB) technology has emerged to resolve the interoperability problem between cloud systems, but many researches and developments are still needed. In this paper, we design an integrated user authentication system, which is a fundamental problem of cloud user interoperability among CSB (Cloud Service Broker) technologies, which is emerging as a service intervention technology of heterogeneous distributed cloud environment.

현재 클라우드 시스템은 사업자가 각자의 방식으로 클라우드 환경을 구축함에 따라 클라우드 시스템 간 상호운용성이 떨어져 호환이 되지 않는다. 예를 들어 Google 클라우드를 사용하는 사용자는 별도의 추가적인 로그인하는 과정을 거치지 않으면 MS(마이크로소프트) 클라우드 시스템을 사용할 수 없다. Google 클라우드 사용자가 MS 클라우드 서비스를 이용하기 위해 Google 클라우드 시스템 로그아웃 이후 다시 MS 클라우드에 로그인 하는 과정을 거쳐야 한다. 이러한 문제를 해결하기 위해 CSB(Cloud Service Broker) 기술이 등장하여 클라우드 시스템간의 상호 호환 문제를 해결하고 있으나, 아직도 많은 연구와 개발이 필요한 실정이다. 본 연구에서는 이종 분산 클라우드 환경의 서비스 중재 기술로 등장하고 있는 CSB(Cloud Service Broker) 기술 중에서 클라우드 사용자의 상호운용성의 근본적인 해결 과제인 사용자 통합 인증 시스템을 설계한다.

Keywords

References

  1. L. Badger, T. Grance, R. P. Corner, J. Voas, "DRAFT Cloud Computing Synopsis and Recommendations," NIST Special Publication 800-146, May 2012.
  2. Focus Group On Cloud Computing, ITU-T, "Part1: Introduction to the cloud ecosystem: definitions, taxonomies, use cases, high level requirements," February. 2012. [Internet] Available: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.459.746&rep=rep1&type=pdf.
  3. R. N. Calheiros, R. Ranjan, A. Beloglazov, C. A. Rose, R. Buyya, "CloudSim: toolkit for modeling and simulation of cloud computing environment and evaluation of resource provisioning algorithms," Journal of Software: Practice and Experience, vol. 41, Issue 1, pp. 23-50, January 2011. https://doi.org/10.1002/spe.995
  4. D. C. Plummer, B. J. Lheureux, M. Cantara, T. Bova, Predicts 2012: Cloud Service Brokerage Will Bring New Benefits and Planning Challenges, Gartner [Internet], Available: https://www.gartner.com/doc/1855715/predicts-cloud-services-brokerage.
  5. F. Liu, J. Tong, J. Mao, R. B. Bohn, J. V. Messina, M. L. Badger, D. M. Leaf, "NIST Cloud Computing Reference Architecture," NIST Special Publication 500-292, September 2011.
  6. D. M. Smith, Hype Cycle for Cloud Computing 2013, Gartner[Internet], Available: https://www.gartner.com/doc/2573318/hype-cycle-cloud-computing-.
  7. D. C. Plummer, B. J. Lheureux, M. Cantara, T. Bova, D. Scott, Predicts 2013: Cloud Services Brokerage, Gartner [Internet], Available: https://www.gartner.com/doc/2281515/predicts-cloud-services-brokerage.
  8. E. Anderson, D. M. Smith, Hype Cycle for Cloud Services Brokerage 2015, Gartner [Internet], Available: https://www.gartner.com/doc/3106717/hype-cycle-cloud-computing-.
  9. J. Kim, D. Kang, N. Kim, J. Lee, S. Chung, "Cloud Service Broker Managing and Integrating Multiple Heterogeneous Clouds," in Communications of the Korean Institute of Information Scientists and Engineer, vol. 32, no. 2, pp. 52-58, February 2014. [Online]. Available: http://www.dbpia.co.kr/Journal/ArticleDetail/NODE02363047
  10. Y. Choi, J. Li, T. Jung, J. W. Hong, "Survey and Evaluation of Open Sources for Integrated Authentication Management System in Cloud Infrastructure," in Proceedings on The Korean Institute of Communications and Information Sciences, 2012.
  11. N. Klingenstein, SAML V2.0 Holder-of-Key Web Browser SSO profile (2008, September), OASIS[Internet]. Available: https://www.oasis-open.org/committees/download.php/29426/sstc-saml-holder-of-key-browser-sso-draft-07.pdf.

Cited by

  1. 위치정보 기반 식별정보제공자 탐색시스템의 개발 vol.21, pp.9, 2016, https://doi.org/10.6109/jkiice.2017.21.9.1777