Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing

被引:66
|
作者
Yang, Xu [1 ,2 ]
Huang, Xinyi [1 ,2 ]
Liu, Joseph K. [3 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
[3] Monash Univ, Fac Informat Technol, Clayton, Vic 3800, Australia
基金
中国国家自然科学基金;
关键词
Mobile Cloud Computing; Handover authentication; Security; Efficiency; User anonymity; Untraceability; WIRELESS COMMUNICATIONS; ACCESS NETWORKS; SECURE; WIMAX; PROTOCOL; SCHEME;
D O I
10.1016/j.future.2015.09.028
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Various wireless communication technologies have been generated and deployed on account of mass requirements. These enable cloud computing with integration with mobility and Mobile Cloud Computing (MCC) becomes the trend of future generation computing paradigm. In this paper, we address a challenging issue of MCC technology security and privacy of the handover process. We propose a new design of handoff authentication for heterogeneous mobile cloud networks, which provides user anonymity and untraceability. Compared with previous protocols, our proposed mechanism achieves comprehensive features of universality, robust security and efficiency. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:190 / 195
页数:6
相关论文
共 50 条
  • [1] An Enhanced Secure Authentication Scheme with User Anonymity in Mobile Cloud Computing
    Madhusudhan, R.
    Suvidha, K. S.
    [J]. 2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 17 - 22
  • [2] Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems
    Park, CS
    [J]. COMPUTER NETWORKS, 2004, 44 (02) : 267 - 273
  • [3] Efficient Mobile User Authentication Service with Privacy Preservation and User Untraceability
    Braeken, An
    Touhafi, Abdellah
    [J]. PROCEEDINGS OF 2020 5TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND ARTIFICIAL INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS (CLOUDTECH'20), 2020, : 39 - 46
  • [4] A novel wireless authentication protocol preserving user anonymity and untraceability
    Wei, Yongzhuang
    Qiu, Hongbing
    [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 575 - +
  • [5] An Efficient Authentication Protocol with User Anonymity for Mobile Networks
    Li, Huixian
    Yang, Yafang
    Pang, Liaojun
    [J]. 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1842 - 1847
  • [6] User Authentication using Profiling in Mobile Cloud Computing
    Jeong, Hoon
    Choi, Euiin
    [J]. AASRI CONFERENCE ON POWER AND ENERGY SYSTEMS, 2012, 2 : 262 - 267
  • [7] FogHA: An efficient handover authentication for mobile devices in fog computing
    Guo, Yimin
    Guo, Yajun
    [J]. COMPUTERS & SECURITY, 2021, 108
  • [8] Prediction-based secured handover authentication for mobile cloud computing
    Walid I. Khedr
    Khalid M. Hosny
    Marwa M. Khashaba
    Fathy A. Amer
    [J]. Wireless Networks, 2020, 26 : 4657 - 4675
  • [9] Prediction-based secured handover authentication for mobile cloud computing
    Khedr, Walid, I
    Hosny, Khalid M.
    Khashaba, Marwa M.
    Amer, Fathy A.
    [J]. WIRELESS NETWORKS, 2020, 26 (06) : 4657 - 4675
  • [10] An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Chen, Hang
    Shen, Wei
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019