A Study of Security Authentication for Cloud Computing Based on Smart Phone 


Vol. 37,  No. 11, pp. 1027-1035, Nov.  2012


PDF
  Abstract

Recently, the smart phone including web and mobile service based on the reliability and extendability of cloud computing is receiving huge attention. However, most of current cloud services provide just an application service for synchronizing data between mobile entity and server. Business model developed by communication companies have problems with interoperability. This paper proposes a new service security authentication model to efficiently manage smart phone users using different business models between smartphones and to keep the reliability and extendability of cloud computing. Proposed model authenticates for smart phone users to stay with in the unified communication with smart phone user’s identity and access control to effectively use the current cloud computing system.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

Y. Jeong and Y. Kim, "A Study of Security Authentication for Cloud Computing Based on Smart Phone," The Journal of Korean Institute of Communications and Information Sciences, vol. 37, no. 11, pp. 1027-1035, 2012. DOI: .

[ACM Style]

Yoon-Su Jeong and Yong-Tae Kim. 2012. A Study of Security Authentication for Cloud Computing Based on Smart Phone. The Journal of Korean Institute of Communications and Information Sciences, 37, 11, (2012), 1027-1035. DOI: .

[KICS Style]

Yoon-Su Jeong and Yong-Tae Kim, "A Study of Security Authentication for Cloud Computing Based on Smart Phone," The Journal of Korean Institute of Communications and Information Sciences, vol. 37, no. 11, pp. 1027-1035, 11. 2012.