DOI QR코드

DOI QR Code

User Authentication Technology Using Multi-Blocks in the Cloud Computing Environment

  • Received : 2020.10.12
  • Accepted : 2020.11.03
  • Published : 2020.11.30

Abstract

Cloud computing technology provides economic and efficient system operation and management features to deal with rapidly changing IT technologies. However, this is less used in institutes and companies due to low security of cloud computing service. It is recognized that storing and managing important information, which is confidential in external systems is vulnerable to security threats. In order to enhance security of this cloud computing service, this paper suggests a system and user authentication reinforcement model. The suggested technology guarantees integrity of user authentication information and provides users with convenience by creating blocks for each cloud service and connecting service blocks with chains. The block chain user authentication model offers integrity assurance technology of block chains and system access convenience for SSO users. Even when a server providing cloud computing is invaded, this prevents chained invasions not to affect other systems.

클라우드 컴퓨팅 기술은 급변하는 IT 기술의 경제적이고 효율적인 시스템 운영 및 관리 기능을 제공한다. 하지만, 기관 및 기업에서는 클라우드 컴퓨팅 서비스의 보안성 때문에 활용성이 떨어지고 있다. 외부 시스템에 대외비에 속하는 중요정보를 보관하여 관리하는 것은 보안에 취약하다고 인식되어 있기 때문이다. 이러한 클라우드 컴퓨팅 서비스에 대한 보안성을 강화하기 위해 본 논문에서는 시스템 및 사용자 인증 강화 모델을 연구하였다. 제안 기술은 사용자 인증 정보를 클라우드 서비스별로 블록을 생성하여 서비스 블록을 체인으로 연결하여 정보의 무결성을 보증하고 사용자에게는 편의성을 제공한다. 블록 체인 사용자 인증 모델은 블록 체인의 무결성 보증 기술과 SSO 사용자의 시스템 접근 편의성을 제공한다. 클라우드 컴퓨팅을 제공하는 서버에 침해가 발생하더라도 다른 시스템에 영향이 없도록 연쇄 침해를 방지한다.

Keywords

References

  1. Jae-Young Moon, Cloud Computing Trend and Future Directions, The Korea Contents Association Review, Vol. 17, No. 1, pp. 23-26, Mar. 2019.
  2. Un SungKyong, Cloud Computing Security Technology Trend, Korea Institute Of Information Security And Cryptology, Vol. 20, No. 20, pp.27-31, April. 2010. DOI:10.9708/jksci.2015.20.7.049
  3. Min-Hee Cho, Eun-Gyeom Jang, Yong-Rak Choi, User Authentication Technology using Multiple SSO in the Cloud Computing Environment, Journal of the Korea Society of Computer and Information, Vol 21 No. 4, pp. 31-38, April. 2016. DOI:10.9708/jksci.2016.21.4.031
  4. Eun-Gyeom Jang, A Enhanced Security Model for Cloud Computing in SSO Environment, Journal of the Korea Society of Computer and Information. Vol. 22, No. 8, pp. 55-61, Aug. 2017. DOI:10.9708/jksci.2017.22.08.055
  5. Ye-Ryoung Suh, Sung-Hwan Park, Dong-Jun Choi, Jae-Woo Lee, Blockchain security issues and the latest robust blockchain technology, Communications of the Korean Institute of Information Scientists and Engineers, Vol. 38, No. 7, pp. 14-18, July. 2020.
  6. HAN Ho Hyeorn, Authentication for Blockchain Service Communications of the Korean Institute of Information Scientists and Engineers Vol. 38 No. 7, pp. 19-24, July. 2020.
  7. Jinho Yoo, A study on Applying Privacy by Design in Blockchain Services, Communications of the Korean Institute of Information Scientists and Engineers, Vol. 38, No. 7, pp. 32-39, July. 2020.
  8. Ju Min Cha, Jeong Gyu Kim, Yong Yook Kim, Moo Hyun Lim, Woosaeng Kim, Blockchain-Based Pet Trade Service DApp, Journal of Information Technology Applications & Management, Vol. 26, No. 6, pp.79-87, Dec. 2019. DOI:10.21219/jitam.2019.26.6.079
  9. Baek, YeongTae, Min Youn A, A study on DID self-sovereign identity for digital content management, Proceedings of the Korean Society of Computer Information Conference. Vol. 28, No. 2, pp 395-396, July. 2020

Cited by

  1. A Method of Generating Theme, Background and Signal Music Usage Monitoring Information Based on Blockchain vol.26, pp.2, 2021, https://doi.org/10.9708/jksci.2021.26.02.045
  2. Digital Content Certification and Management Technology Based on Blockchain Technology vol.26, pp.11, 2020, https://doi.org/10.9708/jksci.2021.26.11.121