Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing

被引:66
|
作者
Yang, Xu [1 ,2 ]
Huang, Xinyi [1 ,2 ]
Liu, Joseph K. [3 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
[3] Monash Univ, Fac Informat Technol, Clayton, Vic 3800, Australia
基金
中国国家自然科学基金;
关键词
Mobile Cloud Computing; Handover authentication; Security; Efficiency; User anonymity; Untraceability; WIRELESS COMMUNICATIONS; ACCESS NETWORKS; SECURE; WIMAX; PROTOCOL; SCHEME;
D O I
10.1016/j.future.2015.09.028
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Various wireless communication technologies have been generated and deployed on account of mass requirements. These enable cloud computing with integration with mobility and Mobile Cloud Computing (MCC) becomes the trend of future generation computing paradigm. In this paper, we address a challenging issue of MCC technology security and privacy of the handover process. We propose a new design of handoff authentication for heterogeneous mobile cloud networks, which provides user anonymity and untraceability. Compared with previous protocols, our proposed mechanism achieves comprehensive features of universality, robust security and efficiency. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:190 / 195
页数:6
相关论文
共 50 条
  • [31] Efficient Authentication Schemes for Handover in Mobile WiMAX
    Sun, Hung-Min
    Chang, Shih-Ying
    Lin, Yue-Hsun
    Chiou, Shin-Yan
    [J]. ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 235 - +
  • [32] Strong Authentication for Mobile Cloud Computing
    Ahmed-Nacer, Anis
    Ahmed-Nacer, Mehdi
    [J]. 2016 13TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES FOR DISTRIBUTED SYSTEMS (NOTERE), 2016,
  • [33] Authentication in mobile cloud computing: A survey
    Alizadeh, Mojtaba
    Abolfazli, Saeid
    Zamani, Mazdak
    Baharun, Sabariah
    Sakurai, Kouichi
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 : 59 - 80
  • [34] An Efficient Remote User Authentication Scheme with Strong Anonymity
    Liu, Yanfei
    Zhao, Ziming
    Li, Hui
    Luo, Qun
    Yang, Yixian
    [J]. PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON CYBERWORLDS, 2008, : 180 - 185
  • [35] An Energy Efficient Remote User Authentication Scheme Preserving User Anonymity
    Bapana, Surekha
    Narayana, K. Lakshmi
    Vorugunti, Chandra Sekhar
    [J]. 2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 1296 - 1301
  • [36] An Improvement of User Authentication Framework for Cloud Computing
    Mun, Jongho
    Kim, Jiye
    Won, Dongho
    [J]. JOURNAL OF COMPUTERS, 2016, 11 (06) : 446 - 454
  • [37] Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
    He, Debiao
    Kumar, Neeraj
    Khan, Muhammad Khurram
    Wang, Lina
    Shen, Jian
    [J]. IEEE SYSTEMS JOURNAL, 2018, 12 (02): : 1621 - 1631
  • [38] Efficient Hierarchical Multi-Server Authentication Protocol for Mobile Cloud Computing
    Kou, Jiangheng
    He, Mingxing
    Xiong, Ling
    Ge, Zihang
    Xie, Guangmin
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (01): : 297 - 312
  • [39] Secure Authentication Protocol for Efficient Computational Offloading Service in the Mobile Cloud Computing
    Munivel, E.
    Kannammal, A.
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (02): : 457 - 467
  • [40] Mobile user authentication system in cloud environment
    Yeh, Her-Tyan
    Chen, Bing-Chang
    Wu, Yi-Cong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (09) : 1161 - 1168