Authentication Scheme using Unique Identification method with Homomorphic Encryption in Mobile Cloud Computing

被引:0
|
作者
Chean, Lim Tsu [1 ]
Ponnusamy, Vasaki [1 ]
Fati, Suliman Mohamed [2 ]
机构
[1] Univ Tunku Abdul Rahman UTAR, Fac Informat & Commun Technol, Kampar, Malaysia
[2] Inti Inti Int Univ, Fac Informat Technol Math & Sci, Nilai 71800, Negeri Sembilan, Malaysia
关键词
Mobile Cloud Computing security; Homomorphic encryption/authentication method; Homomorphic signature; Identity Management; Authentication Framework; Post Quantum Cryptography;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The purpose of this project is to design and implement a framework that employs unique authentication method that relies on third party identification which is required to accurately identify and authenticate legitimate user in order to reduce the risk of disclosing confidential data to unauthorized party in Mobile Cloud Computing, MCC. Cloud computing is a service provided for user to store and process their data online instead of local device. Mobile Cloud computing which is an extension of the cloud computing service allows user to remotely access their data and services that are being uploaded to the cloud beforehand in any place and any time as long as they have internet connection in their personal mobile device. Throughout the period of the mobile cloud computing era, the security has always been a concern and post as a formidable challenge even for experienced security specialist. Moreover, encryption method such as RSA and Diffie Hellman cryptosystem proven to be useless against the attacks launched by quantum computer. Hence, Homomorphic Signature scheme is introduced along with the Identity Management (IDM) server into the mobile cloud computing in order to address this issue by applying implicit authentication method to differentiate between the genuine and non-genuine user which allows system to authenticate the clients accurately. The details of the framework will be further explained later in this paper, where the user will be authenticated with IDM as medium and no password is used throughout the authentication process, allowing the client to be safely authenticated at the end of the process.
引用
收藏
页码:195 / 200
页数:6
相关论文
共 50 条
  • [1] A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing
    Baharon, Mohd Rizuan
    Shi, Qi
    Llewellyn-Jones, David
    [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 618 - 625
  • [2] Secure scheme on mobile multi cloud computing based on homomorphic encryption
    Zkik, Karim
    Orhanou, Ghizlane
    El Hajji, Said
    [J]. 2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [3] Homomorphic Cloud Computing Scheme Based on Hybrid Homomorphic Encryption
    Song, Xidan
    Wang, Yulin
    [J]. PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 2450 - 2453
  • [4] Homomorphic Encryption in Mobile Multi Cloud Computing
    Louk, Maya
    Lim, Hyotaek
    [J]. 2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 493 - 497
  • [5] Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing
    Ding, Yong
    Li, Xiumin
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 568 - 571
  • [6] A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security
    El-Yahyaoui, Ahmed
    Ech-Cherif El Kettani, Mohamed Dafir
    [J]. TECHNOLOGIES, 2019, 7 (01):
  • [7] A SIMPLE FULLY HOMOMORPHIC ENCRYPTION SCHEME AVAILABLE IN CLOUD COMPUTING
    Li, Jian
    Song, Danjie
    Chen, Sicong
    Lu, Xiaofeng
    [J]. 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 214 - 217
  • [8] New Fully Homomorphic Encryption Scheme Based On Multistage Partial Homomorphic Encryption Applied In Cloud Computing
    Mahmood, Zainab Hikmat
    Ibrahem, Mahmood Khalel
    [J]. 2018 1ST ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION AND SCIENCES (AICIS 2018), 2018, : 182 - 186
  • [9] Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing
    HUANG Qin-long
    MA Zhao-feng
    YANG Yi-xian
    FU Jing-yi
    NIU Xin-xin
    [J]. The Journal of China Universities of Posts and Telecommunications, 2013, 20 (06) : 88 - 95
  • [10] Challenges of Using Homomorphic Encryption to Secure Cloud Computing
    El Makkaoui, Khalid
    Ezzati, Abdellah
    Beni Hssane, Abderrahim
    [J]. 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 343 - 349