User Authentication using Profiling in Mobile Cloud Computing

被引:8
|
作者
Jeong, Hoon [1 ]
Choi, Euiin [1 ]
机构
[1] Hannam Univ, Dept Comp Engn, Taejon, South Korea
关键词
Mobile Cloud Computing; Profiling; Security; Access Control; User Authentication;
D O I
10.1016/j.aasri.2012.09.044
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
As Cloud Computing has been spreading widely, users and service providers enables to use resource or service cheaply and easily without owning all the resource needed. However, cloud computing, virtualization technology, large distributed processing technologies, service availability, high-traffic processing will occur due to various problems. In recent years, among many of these problems in application security, access control, authentication, and password and a lot of it has been studied. User authentication in a mobile environment, especially the more important to them and high level of security certification is required. In this paper, in a mobile environment for high level security authentication using profiling techniques for access control and user authentication is proposed. (C) 2012 Published by Elsevier B.V. Selection and/or peer review under responsibility of American Applied Science Research Institute
引用
收藏
页码:262 / 267
页数:6
相关论文
共 50 条
  • [1] User Profiling for Energy Optimisation in Mobile Cloud Computing
    Benkhelifa, Elhadj
    Welsh, Thomas
    Tawalbeh, Loai
    Jararweh, Yaser
    Basalamah, Anas
    [J]. 6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 : 1159 - 1165
  • [2] User Authentication in Cloud Computing
    Chang, Hyokyung
    Choi, Euiin
    [J]. UBIQUITOUS COMPUTING AND MULTIMEDIA APPLICATIONS, PT II, 2011, 151 : 338 - 342
  • [3] A provable and secure mobile user authentication scheme for mobile cloud computing services
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Shafiq, Muhammad
    Usman, Muhammad
    Asif, Muhammad
    Ghani, Anwar
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (14)
  • [4] Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing
    Yang, Xu
    Huang, Xinyi
    Liu, Joseph K.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 190 - 195
  • [5] An Enhanced Secure Authentication Scheme with User Anonymity in Mobile Cloud Computing
    Madhusudhan, R.
    Suvidha, K. S.
    [J]. 2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 17 - 22
  • [6] Secure User Authentication in Cloud Computing
    Javaid, Zeeshan
    Ijaz, Imran
    [J]. PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013), 2013,
  • [7] User authentication in mobile computing environment
    Takubo, A
    Ishikawa, M
    Watanabe, T
    Soga, M
    Mizuno, T
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1997, E80A (07) : 1288 - 1298
  • [8] Strong Authentication for Mobile Cloud Computing
    Ahmed-Nacer, Anis
    Ahmed-Nacer, Mehdi
    [J]. 2016 13TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES FOR DISTRIBUTED SYSTEMS (NOTERE), 2016,
  • [9] Authentication in mobile cloud computing: A survey
    Alizadeh, Mojtaba
    Abolfazli, Saeid
    Zamani, Mazdak
    Baharun, Sabariah
    Sakurai, Kouichi
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 : 59 - 80
  • [10] Securing Mobile Cloud Computing using Biometric Authentication (SMCBA)
    Rassan, Iehab A. L.
    AlShaher, Hanan
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 1, 2014, : 157 - 161