Authentication Scheme using Unique Identification method with Homomorphic Encryption in Mobile Cloud Computing

被引:0
|
作者
Chean, Lim Tsu [1 ]
Ponnusamy, Vasaki [1 ]
Fati, Suliman Mohamed [2 ]
机构
[1] Univ Tunku Abdul Rahman UTAR, Fac Informat & Commun Technol, Kampar, Malaysia
[2] Inti Inti Int Univ, Fac Informat Technol Math & Sci, Nilai 71800, Negeri Sembilan, Malaysia
关键词
Mobile Cloud Computing security; Homomorphic encryption/authentication method; Homomorphic signature; Identity Management; Authentication Framework; Post Quantum Cryptography;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The purpose of this project is to design and implement a framework that employs unique authentication method that relies on third party identification which is required to accurately identify and authenticate legitimate user in order to reduce the risk of disclosing confidential data to unauthorized party in Mobile Cloud Computing, MCC. Cloud computing is a service provided for user to store and process their data online instead of local device. Mobile Cloud computing which is an extension of the cloud computing service allows user to remotely access their data and services that are being uploaded to the cloud beforehand in any place and any time as long as they have internet connection in their personal mobile device. Throughout the period of the mobile cloud computing era, the security has always been a concern and post as a formidable challenge even for experienced security specialist. Moreover, encryption method such as RSA and Diffie Hellman cryptosystem proven to be useless against the attacks launched by quantum computer. Hence, Homomorphic Signature scheme is introduced along with the Identity Management (IDM) server into the mobile cloud computing in order to address this issue by applying implicit authentication method to differentiate between the genuine and non-genuine user which allows system to authenticate the clients accurately. The details of the framework will be further explained later in this paper, where the user will be authenticated with IDM as medium and no password is used throughout the authentication process, allowing the client to be safely authenticated at the end of the process.
引用
收藏
页码:195 / 200
页数:6
相关论文
共 50 条
  • [31] Security Analysis of Homomorphic Encryption Scheme for Cloud Computing: Known-Plaintext Attack
    Babenko, Mikhail
    Chervyakov, Nikolay
    Radchenko, Gleb
    Tchernykh, Andrei
    Navaux, Philippe O. A.
    Kucherov, Nikolay
    Deryabin, Maxim
    Svyatkin, Viktor
    [J]. PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2018, : 270 - 274
  • [32] Multi-user Fully Homomorphic Encryption Scheme Based on Policy for Cloud Computing
    Li, Taoshen
    Liu, Qing
    Huang, Ruwei
    [J]. WEB INFORMATION SYSTEMS AND APPLICATIONS (WISA 2021), 2021, 12999 : 274 - 286
  • [33] Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing
    Hong, Ming-quan
    Zhao, Wen-bo
    Wang, Peng-yu
    [J]. 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 152 - 157
  • [34] A provable and secure mobile user authentication scheme for mobile cloud computing services
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Shafiq, Muhammad
    Usman, Muhammad
    Asif, Muhammad
    Ghani, Anwar
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (14)
  • [35] Fully Homomorphic Encryption with AES in Cloud Computing Security
    Alkady, Yasmin
    Farouk, Fifi
    Rizk, Rawya
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2018, 2019, 845 : 370 - 382
  • [36] Empirical Analysis of the Impact of Homomorphic Encryption on Cloud Computing
    Rout, Chinmayee
    Sethi, Srinivas
    Sahoo, Ramesh Kumar
    Badajena, J. Chandrakanta
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS, ICISA 2022, 2023, 959 : 107 - 120
  • [37] Secure cloud computing based on threshold homomorphic encryption
    Varnovskiy, N. P.
    Martishin, S. A.
    Khrapchenko, M. V.
    Shokurov, A. V.
    [J]. PROGRAMMING AND COMPUTER SOFTWARE, 2015, 41 (04) : 215 - 218
  • [38] Secure cloud computing based on threshold homomorphic encryption
    N. P. Varnovskiy
    S. A. Martishin
    M. V. Khrapchenko
    A. V. Shokurov
    [J]. Programming and Computer Software, 2015, 41 : 215 - 218
  • [39] Making cloud computing more secure: Homomorphic encryption
    Naone, Erica
    [J]. Technology Review, 2011, 114 (03) : 50 - 51
  • [40] An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing
    Shrivastava, Pranav
    Alam, Bashir
    Alam, Mansaf
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (10): : 13675 - 13691