Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33093
A Secure Mobile OTP Authentication Scheme for User Mobility Cloud VDI Environment
Authors: Jong-won Lee
Abstract:
Since Cloud environment has appeared as the most powerful keyword in the computing industry, the growth in VDI (Virtual Desktop Infrastructure) became remarkable in domestic market. In recent years, with the trend that mobile devices such as smartphones and pads spread so rapidly, the strengths of VDI that allows people to access and perform business on the move along with companies' office needs expedite more rapid spread of VDI. In this paper, mobile OTP (One-Time Password) authentication method is proposed to secure mobile device portability through rapid and secure authentication using mobile devices such as mobile phones or pads, which does not require additional purchase or possession of OTP tokens of users. To facilitate diverse and wide use of Services in the future, service should be continuous and stable, and above all, security should be considered the most important to meet advanced portability and user accessibility, the strengths of VDI.Keywords: Cloud, VDI, OTP, Mobility
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1059917
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2047References:
[1] Seung-Ah Lee, Gi-Hwan Cho, "A Secure User Authentication Scheme for Public Cloud Environment," Korea Information Processing Society (Published Conference Proceedings style) vol. 18, no. 1, pp. 909-912, May. 2011
[2] Mun-Hwan Park, "The need for enhanced user authentication in the cloud VDI environment," IDG Tech Focus, pp. 10-11, Jan. 2012.
[3] Myung-Jun Kim, "Korea's Cloud Computing Strategy," IT21 Global Conference, 2009
[4] Hyun-Seong Kim, Choon-Sik Park, "Cloud computing and the personal authentication service,"Journal of the Information Security, vol. 20, no. 2, Apr. 2010.
[5] Jeong-Kyung Moon, Jin-Mook Kim and Hwang-Rae Kim, "An Efficient user authentication protocol for cloud computing environments," Journal of the Korea Academia-Industrial cooperation Society, vol. 12, no. 5, pp. 2353~2359, May. 2011.
[6] Ki-Young Kim, "The Study on the authentication system based on One-time password," Journal of the Information Security, vol. 17 no. 3, Jun. 2007.
[7] Financial Security Agency, "Financial information security week,"2006.