A Secure Authentication Scheme for MobiCloud

被引:0
|
作者
Donald, A. Cecil [1 ]
Arockiam, L. [1 ]
机构
[1] St Josephs Coll Autonomous, Comp Sci, Tiruchirappalli, Tamil Nadu, India
关键词
Authentication; Security; Mobile Cloud Computing (MCC); Mobile Cloud Authenticator (MCA); Unified Cloud Authenticator (UCA);
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Cloud Computing (MCC) is cloud computing in which at least some of the devices like mobiles, PDA etc., are involved. This paper drives over several authentication techniques and methods for MCC. An analysis of the existing works are carried out. This Paper also analyses the attacks and Issues that occur during authentication in the mobile cloud environment. A framework called the Mobile Cloud Authenticator (MCA) is proposed for authenticating the mobile users in the mobile cloud environment. The overall framework of MCA consists of three major entities namely, Cloud users, Mobile network and Cloud. There is a system called Unified Cloud Authenticator (UCA) which is placed in between the mobile network and Cloud Service Provider (CSP). It authenticates both users and CSP. The UCA contains Authentication Server (AS), hashing machine, connection manager, user manager and service manager. The operational procedure of UCA has three phases namely registration phase, authentication phase and verification phase. This paper explains the overall framework of MCA and the functions of UCA in detail.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Highly Secure Authentication Scheme
    Narhar, Ushir Kishori
    Joshi, Ram B.
    [J]. 1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 270 - 274
  • [2] A Secure Authentication Scheme for Bluetooth Connection
    Diallo, A. S.
    Wajdi, A.
    Olanrewaju, R. F.
    Sado, F.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE), 2014, : 60 - 63
  • [3] Secure Authentication and Management Scheme for RFID
    Seo, Dae-Hee
    Baek, Jang-Mi
    Cho, Dong-Sub
    [J]. Q2SWINET'08: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2008, : 106 - 110
  • [4] A Secure Remote User Authentication Scheme
    Park, Ji-Hye
    Yim, Seong Jun
    Chang, Jik Hyun
    [J]. THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 368 - 373
  • [5] A secure authentication scheme for RFID systems
    Dass, Prajnamaya
    Om, Hari
    [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 100 - 106
  • [6] A Novel Secure Authentication Scheme for VANETs
    Tiwari, Dinesh
    Bhushan, Mayank
    Yadav, Ankit
    Jain, Suman
    [J]. 2016 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2016, : 287 - 297
  • [7] A secure authentication scheme for Internet of Things
    Wang, King-Hang
    Chen, Chien-Ming
    Fang, Weicheng
    Wu, Tsu-Yang
    [J]. PERVASIVE AND MOBILE COMPUTING, 2017, 42 : 15 - 26
  • [8] Efficient and secure source authentication scheme for multicast user authentication
    Jeong, Yoon-su
    Lee, Sang-hyuk
    Shin, Seung-soo
    [J]. JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2013, 20 (10) : 2741 - 2746
  • [9] Efficient and secure source authentication scheme for multicast user authentication
    JEONG Yoon-su
    LEE Sang-hyuk
    SHIN Seung-soo
    [J]. Journal of Central South University, 2013, 20 (10) : 2741 - 2746
  • [10] A more Multifactor Secure Authentication Scheme based on graphical authentication
    Joshi, Ashish
    Kumar, Sonu
    Goudar, R. H.
    [J]. 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (ICACC), 2012, : 186 - 189