Secure Identity Management In Mobile Cloud Computing

被引:0
|
作者
Suguna, M. [1 ]
Shalinie, S. Mercy [1 ]
Anusia, R. [1 ]
Deepti, S. [1 ]
机构
[1] Thiagarajar Coll Engn, Dept Comp Sci & Engn, Madurai, Tamil Nadu, India
关键词
MCC; IDM; CIDM; Identity theft; SIDM; Identity privacy; ZKP;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile cloud computing (MCC) is a platform that allows mobile users to offload the computationally rigorous and storage demanding tasks on available cloud resources using wireless access. The major concern with MCC is the privacy of data. Mobile users give confidential information through the network, that if not safeguarded may lead to security issues. Identity Management (IDM) is the management of user identities, their authentication, and authorization in the cloud environment. The existing Consolidated Identity Management (CIDM) overcomes the network traffic interception in the traditional IDM but is prone to Identity theft in case of Identity Management Server (IDMS) compromise. This work is focused on the development of a Secure Identity Management (SIDM) that alleviates the attacks in the CIDM by using techniques that strengthens the authentication process and identity privacy. A secure IDM is developed using two-step authentication process which involves Zero Knowledge Proof (ZKP) and token verification. The proposed SIDM model reduces the consequences of Identity server compromise attack. There is a marginal increase in the communication overhead of SIDM compared to that of CIDM but it can be compromised to realize the benefits of identity privacy. The analysis of the experimental results shows that there is an overall increase of thirty percent in communication overhead when compared to CIDM.
引用
收藏
页码:42 / 45
页数:4
相关论文
共 50 条
  • [41] MRM: mobile resource management scheme on mobile cloud computing
    Yi, Gangman
    Heo, Yoon-A
    Byun, Hwirim
    Jeong, Young-Sik
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1245 - 1257
  • [42] MRM: mobile resource management scheme on mobile cloud computing
    Gangman Yi
    Yoon-A Heo
    Hwirim Byun
    Young-Sik Jeong
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1245 - 1257
  • [43] Secure Key Management Based Mobile Authentication in Cloud
    Priya, S. Shanmuga
    Yuvaraj, D.
    Murthy, T. Satyanarayana
    Chooralil, Varghese S.
    Krishnan, S. Navaneetha
    Banumathy, P.
    SundaraVadivel, P.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (03): : 887 - 896
  • [44] Secure and Privacy-Aware Mobile Identity Management
    Martinelli, Fabio
    ERCIM NEWS, 2013, (93): : 46 - 46
  • [45] Secure identity management in mobile networks, applications and services
    Guo, Y
    5th World Wireless Congress, Proceedings, 2004, : 663 - 668
  • [46] Secure scheme on mobile multi cloud computing based on homomorphic encryption
    Zkik, Karim
    Orhanou, Ghizlane
    El Hajji, Said
    2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [47] An efficient and secure data sharing scheme for mobile devices in cloud computing
    Xiuqing Lu
    Zhenkuan Pan
    Hequn Xian
    Journal of Cloud Computing, 9
  • [48] Towards Efficient and Secure Access Control System for Mobile Cloud Computing
    Tu Shanshan
    Huang Yongfeng
    CHINA COMMUNICATIONS, 2015, 12 (12) : 43 - 52
  • [49] A Secure and Lightweight Data Access Control Scheme for Mobile Cloud Computing
    Jin, Yu
    Tian, Chuan
    He, Heng
    Wang, Fan
    PROCEEDINGS 2015 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING BDCLOUD 2015, 2015, : 172 - 179
  • [50] Highly Secure Mobile Devices Assisted with Trusted Cloud Computing Environments
    Oh, Doohwan
    Kim, Ilkyu
    Kim, Keunsoo
    Lee, Sang-Min
    Ro, Won Woo
    ETRI JOURNAL, 2015, 37 (02) : 348 - 358