Secure Identity Management In Mobile Cloud Computing

被引:0
|
作者
Suguna, M. [1 ]
Shalinie, S. Mercy [1 ]
Anusia, R. [1 ]
Deepti, S. [1 ]
机构
[1] Thiagarajar Coll Engn, Dept Comp Sci & Engn, Madurai, Tamil Nadu, India
来源
2017 INTERNATIONAL CONFERENCE ON NEXTGEN ELECTRONIC TECHNOLOGIES: SILICON TO SOFTWARE (ICNETS2) | 2017年
关键词
MCC; IDM; CIDM; Identity theft; SIDM; Identity privacy; ZKP;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile cloud computing (MCC) is a platform that allows mobile users to offload the computationally rigorous and storage demanding tasks on available cloud resources using wireless access. The major concern with MCC is the privacy of data. Mobile users give confidential information through the network, that if not safeguarded may lead to security issues. Identity Management (IDM) is the management of user identities, their authentication, and authorization in the cloud environment. The existing Consolidated Identity Management (CIDM) overcomes the network traffic interception in the traditional IDM but is prone to Identity theft in case of Identity Management Server (IDMS) compromise. This work is focused on the development of a Secure Identity Management (SIDM) that alleviates the attacks in the CIDM by using techniques that strengthens the authentication process and identity privacy. A secure IDM is developed using two-step authentication process which involves Zero Knowledge Proof (ZKP) and token verification. The proposed SIDM model reduces the consequences of Identity server compromise attack. There is a marginal increase in the communication overhead of SIDM compared to that of CIDM but it can be compromised to realize the benefits of identity privacy. The analysis of the experimental results shows that there is an overall increase of thirty percent in communication overhead when compared to CIDM.
引用
收藏
页码:42 / 45
页数:4
相关论文
共 50 条
  • [21] Development of a Secure Mobile Cloud Computing Model for Universities Services
    Elfurgani, Zuhra B. M.
    Bin Abdullah, Ismail
    ADVANCED SCIENCE LETTERS, 2016, 22 (08) : 1948 - 1951
  • [22] A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
    Li, Ruixuan
    Shen, Chenglin
    He, Heng
    Gu, Xiwu
    Xu, Zhiyong
    Xu, Cheng-Zhong
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (02) : 344 - 357
  • [23] Guest editorial: Secure cloud computing for mobile health services
    Haider Abbas
    Sana Ullah
    Sudip Misra
    Yuh-Shyan Chen
    Peer-to-Peer Networking and Applications, 2016, 9 : 809 - 811
  • [24] A provable and secure mobile user authentication scheme for mobile cloud computing services
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Shafiq, Muhammad
    Usman, Muhammad
    Asif, Muhammad
    Ghani, Anwar
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (14)
  • [25] Guest editorial: Secure cloud computing for mobile health services
    Abbas, Haider
    Ullah, Sana
    Misra, Sudip
    Chen, Yuh-Shyan
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (05) : 809 - 811
  • [26] SSOP: Secure Storage Outsourcing Protocols in Mobile Cloud Computing
    Liu, Xiao
    Jiang, Rui
    Kong, Huafeng
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 678 - 683
  • [27] A Distributed Mobile Cloud Computing Model for Secure Big Data
    Sung, Soonhwa
    Youn, Cheong
    Kong, Eunbae
    Ryou, Jaecheol
    2016 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2016, : 312 - 316
  • [28] A SECURE AUTHENTICATION SCHEME FOR MOBILE CLOUD COMPUTING AGAINST CCA
    Hossain, Md Jakir
    Xu, Chunxiang
    Li, Chuang
    2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2020, : 266 - 270
  • [29] Efficient and secure encrypted image search in mobile cloud computing
    Qin Zou
    Jianfeng Wang
    Jun Ye
    Jian Shen
    Xiaofeng Chen
    Soft Computing, 2017, 21 : 2959 - 2969
  • [30] Adaptive and Secure Application Partitioning for Offloading in Mobile Cloud Computing
    Dhanya, N. M.
    Kousalya, G.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 45 - 53