Authentication Scheme using Unique Identification method with Homomorphic Encryption in Mobile Cloud Computing

被引:0
|
作者
Chean, Lim Tsu [1 ]
Ponnusamy, Vasaki [1 ]
Fati, Suliman Mohamed [2 ]
机构
[1] Univ Tunku Abdul Rahman UTAR, Fac Informat & Commun Technol, Kampar, Malaysia
[2] Inti Inti Int Univ, Fac Informat Technol Math & Sci, Nilai 71800, Negeri Sembilan, Malaysia
关键词
Mobile Cloud Computing security; Homomorphic encryption/authentication method; Homomorphic signature; Identity Management; Authentication Framework; Post Quantum Cryptography;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The purpose of this project is to design and implement a framework that employs unique authentication method that relies on third party identification which is required to accurately identify and authenticate legitimate user in order to reduce the risk of disclosing confidential data to unauthorized party in Mobile Cloud Computing, MCC. Cloud computing is a service provided for user to store and process their data online instead of local device. Mobile Cloud computing which is an extension of the cloud computing service allows user to remotely access their data and services that are being uploaded to the cloud beforehand in any place and any time as long as they have internet connection in their personal mobile device. Throughout the period of the mobile cloud computing era, the security has always been a concern and post as a formidable challenge even for experienced security specialist. Moreover, encryption method such as RSA and Diffie Hellman cryptosystem proven to be useless against the attacks launched by quantum computer. Hence, Homomorphic Signature scheme is introduced along with the Identity Management (IDM) server into the mobile cloud computing in order to address this issue by applying implicit authentication method to differentiate between the genuine and non-genuine user which allows system to authenticate the clients accurately. The details of the framework will be further explained later in this paper, where the user will be authenticated with IDM as medium and no password is used throughout the authentication process, allowing the client to be safely authenticated at the end of the process.
引用
收藏
页码:195 / 200
页数:6
相关论文
共 50 条
  • [21] Secure Voting in the Cloud using Homomorphic Encryption and Mobile Agents
    Will, Mark A.
    Nicholson, Brandon
    Tiehuis, Marc
    Ko, Ryan K. L.
    [J]. 2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING RESEARCH AND INNOVATION (ICCCRI), 2015, : 173 - 184
  • [22] A Secure Image Retrieval Method Based on Homomorphic Encryption for Cloud Computing
    Zhang, Yan
    Zhuo, Li
    Peng, Yuanfan
    Zhang, Jing
    [J]. 2014 19TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2014, : 269 - 274
  • [23] Homomorphic Encryption for Data Security in Cloud Computing
    Chauhan, Kamal Kumar
    Sanger, Amit K. S.
    Verma, Ajai
    [J]. 2015 14TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2015), 2015, : 206 - 209
  • [24] Towards Practical Homomorphic Encryption in Cloud Computing
    Bouti, Adil
    Keller, Joerg
    [J]. 2015 IEEE 4TH SYMPOSIUM ON NETWORK CLOUD COMPUTING AND APPLICATIONS - NCCA 2015, 2015, : 67 - 74
  • [25] FULLY HOMOMORPHIC ENCRYPTION APPLICATION IN CLOUD COMPUTING
    Chen, Baohua
    Zhao, Na
    [J]. 2014 11TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2014, : 471 - 474
  • [26] A SECURE AUTHENTICATION SCHEME FOR MOBILE CLOUD COMPUTING AGAINST CCA
    Hossain, Md Jakir
    Xu, Chunxiang
    Li, Chuang
    [J]. 2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2020, : 266 - 270
  • [27] Searchable Encryption Scheme on the Cloud Via Fully Homomorphic Encryption
    Liu, Jian
    Han, Jing-Li
    Wang, Zhao-Li
    [J]. PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 108 - 111
  • [28] Enhanced Homomorphic Encryption Scheme with PSO for Encryption of Cloud Data
    Khan, Saif Ali
    Aggarwal, R. K.
    Kulkarni, Shashidhar
    [J]. 2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 395 - 400
  • [29] Security Analysis of Homomorphic Encryption Scheme for Cloud Computing: Known-Plaintext Attack
    Babenko, Mikhail
    Chervyakov, Nikolay
    Radchenko, Gleb
    Tchernykh, Andrei
    Navaux, Philippe O. A.
    Kucherov, Nikolay
    Deryabin, Maxim
    Svyatkin, Viktor
    [J]. PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2018, : 270 - 274
  • [30] Multi-user Fully Homomorphic Encryption Scheme Based on Policy for Cloud Computing
    Li, Taoshen
    Liu, Qing
    Huang, Ruwei
    [J]. WEB INFORMATION SYSTEMS AND APPLICATIONS (WISA 2021), 2021, 12999 : 274 - 286