A Light-weight Authentication Scheme Based on Message Digest and Location for Mobile Cloud Computing

被引:0
|
作者
Dey, Saurabh [1 ]
Sampalli, Srinivas [1 ]
Ye, Qiang [2 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS B3H 3J5, Canada
[2] Univ PEI, Dept Comp Sci, Charlottetown, PE, Canada
关键词
Mobile Cloud Computing; Authentication; Message Digest; Privacy; Symmetric key; Location Vector;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The security of data transmission is of paramount importance to mobile cloud computing. For security purposes, the data transmission in mobile cloud computing typically requires a mutually-authenticated environment for mobile devices and cloud servers. SSH (secure shell) could be used to satisfy the requirement. However, it makes the authentication process computationally expensive for mobile devices because it involves public key cryptosystem and mobile devices are relatively restricted in terms of computation capacity. This places the onus of establishing and maintaining secure communication sessions on the resourceful cloud servers. We propose a novel mutual authentication scheme, "Message Digest and Location based Authentication (MDLA)", which involves symmetric key operations. In addition to computational simplicity, MDLA achieves integrity through message digest, and ensures the unpredictability of keys using location vector and timestamp.
引用
收藏
页数:2
相关论文
共 50 条
  • [21] A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services
    Yu, Linsheng
    He, Mingxing
    Liang, Hongbin
    Xiong, Ling
    Liu, Yang
    SENSORS, 2023, 23 (03)
  • [22] Finite state transducer based light-weight cryptosystem for data confidentiality in cloud computing
    Kodada, Basappa B.
    D'Mello, Demian Antony
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2022, 13 (06) : 577 - 588
  • [23] A Secure Light-Weight Public Auditing Scheme in Cloud Computing with Potentially Malicious Third Party Auditor
    Wu, Yilun
    Lin, Xinye
    Lu, Xicheng
    Su, Jinshu
    Chen, Peixin
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (10) : 2638 - 2642
  • [24] Robust Scheme to Protect Authentication Code of Message/Image Documents in Cloud Computing
    Abduljabbar, Zaid Ameen
    Jin, Hai
    Yassin, Ali A.
    Hussien, Zaid Alaa
    Hussain, Mohammed Abdulridha
    Abbdal, Salah H.
    Zou, Deqing
    2016 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016,
  • [25] An improved anonymous authentication scheme for distributed mobile cloud computing services
    Shehzad Ashraf Chaudhry
    I Luk Kim
    Seungmin Rho
    Mohammad Sabzinejad Farash
    Taeshik Shon
    Cluster Computing, 2019, 22 : 1595 - 1609
  • [26] An Enhanced Secure Authentication Scheme with User Anonymity in Mobile Cloud Computing
    Madhusudhan, R.
    Suvidha, K. S.
    2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 17 - 22
  • [27] An Identity-Based Authentication Scheme in Cloud Computing
    Zhang, Zhi-Hua
    Jiang Xue-Feng
    Li, Jian-Jun
    Jiang, Wei
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 984 - 986
  • [28] An improved anonymous authentication scheme for distributed mobile cloud computing services
    Chaudhry, Shehzad Ashraf
    Kim, I. Luk
    Rho, Seungmin
    Farash, Mohammad Sabzinejad
    Shon, Taeshik
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1595 - 1609
  • [29] A Light-weight Authentication Scheme in the Internet of Things using the Enhanced Bloom Filter
    Huo, Xiaoyan
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (01) : 494 - 501
  • [30] Trusted Computing Based Mobile DRM Authentication Scheme
    Yang, Zhen
    Fan, Kefeng
    Lai, Yingxu
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 7 - +