Skip to main content

Approach of Tracing Prevention System Using OAuth for Printing Services in Mobile Device

  • Conference paper
Computer Applications for Graphics, Grid Computing, and Industrial Environment (CGAG 2012, GDC 2012, IESH 2012)

Abstract

The smart phone user is increasing very sharply. Smart phone user passes over 30 million people at 2012 in domestic. And Social Network Service user is expecting to come in about one billion people in worldwide. And smart phone used at most Android operation system. This has advantage that can offer freedom to move and convenience to user. But, most smart phone has various kind controversial points to security. Specially, we are interested about authentication and user position tracing problem among various kind security problems that occurrence is possible in smart phone using environment. And we want to suggest solving these problems. Therefore, we wish to propose that can check certification and position chase problem using OAuth to happen in smart phone expected position chase problem system. To example, we presented case that make use of printer that is shared in the nearest position with own because user uses smart phone. In case, we thought that our proposal system can solve tracing problem and various additional security problems such as confidentiality, integrity, and access control etc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A Berkeley View of Cloud Computing. Technical Report (February 2009)

    Google Scholar 

  2. Shabeeb, H., Jeyanthi, N., Iyengar, N.C.S.N.: A Study on Security Threats in Cloud. International Journal of Cloud Computing and Services Science (IJ-CLOSER) 1(3), 84–88 (2012)

    Google Scholar 

  3. Joha, A., Janessen, M.: Design Choices Underlying the Software as a Service (SaaS) Business Model from the User Perspective: Exploring the Fourth Wave of Outsourcing. Journal of Universal Computer Science 18(11) (2012)

    Google Scholar 

  4. Lawton, G.: Developing Software Online with Platform-as-a-Service Technology. Computer (June 2008)

    Google Scholar 

  5. Amazon: Amazon Web Service: Overview of Security Process, white paper (September 2008), http://aws.amazon.com

  6. Moon, J.-K., Kim, J.-M., Kim, H.-R.: A Secure Authentication Protocol for Cloud Services. JAITC 1(2) (2011) (manuscript)

    Google Scholar 

  7. Kazai, G., Kamps, J., Koolen, M., Milic-Frayling, N.: Crowdsourcing for Book Search Evaluation: Impact of HIT Design on Comparative System Ranking. In: SIGIR 2011, July 24-28 (2011)

    Google Scholar 

  8. Jacobs, P.S.: Text-Based Intelligent Systems: Current Research and Practice in Information Extraction and Retrieval (1992), acl.ldc.upenn.edu

  9. Mostarda, M., Palmisano, D., Zani, F., Tripodi, S.: Towards an OpenID-based solution to the Social Network Interoperability Problem. In: W3C Workshop on the Future (2009), w3.org

  10. http://openid.net/

  11. Paul, R.: Compromising Twitter’s OAuth security system (2010), immagic.com

  12. Al-Sinani, H.S.: Browser Extension-based Interoperation between OAuth and Information Card-based Systems (2011), pure.rhul.ac.uk

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, JM., Moon, JK., Hong, BH. (2012). Approach of Tracing Prevention System Using OAuth for Printing Services in Mobile Device. In: Kim, Th., Cho, Hs., Gervasi, O., Yau, S.S. (eds) Computer Applications for Graphics, Grid Computing, and Industrial Environment. CGAG GDC IESH 2012 2012 2012. Communications in Computer and Information Science, vol 351. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35600-1_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35600-1_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35599-8

  • Online ISBN: 978-3-642-35600-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics