A Light-weight Authentication Scheme Based on Message Digest and Location for Mobile Cloud Computing

被引:0
|
作者
Dey, Saurabh [1 ]
Sampalli, Srinivas [1 ]
Ye, Qiang [2 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS B3H 3J5, Canada
[2] Univ PEI, Dept Comp Sci, Charlottetown, PE, Canada
关键词
Mobile Cloud Computing; Authentication; Message Digest; Privacy; Symmetric key; Location Vector;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The security of data transmission is of paramount importance to mobile cloud computing. For security purposes, the data transmission in mobile cloud computing typically requires a mutually-authenticated environment for mobile devices and cloud servers. SSH (secure shell) could be used to satisfy the requirement. However, it makes the authentication process computationally expensive for mobile devices because it involves public key cryptosystem and mobile devices are relatively restricted in terms of computation capacity. This places the onus of establishing and maintaining secure communication sessions on the resourceful cloud servers. We propose a novel mutual authentication scheme, "Message Digest and Location based Authentication (MDLA)", which involves symmetric key operations. In addition to computational simplicity, MDLA achieves integrity through message digest, and ensures the unpredictability of keys using location vector and timestamp.
引用
收藏
页数:2
相关论文
共 50 条
  • [41] A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
    Tsai, Jia-Lun
    Lo, Nai-Wei
    IEEE SYSTEMS JOURNAL, 2015, 9 (03): : 805 - 815
  • [42] New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing
    Munivel, E.
    Kannammal, A.
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [43] An ID-Based User Authentication Scheme for Cloud Computing
    Yang, Jen-Ho
    Lin, Pei-Yu
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 98 - 101
  • [44] ID-Based User Authentication Scheme for Cloud Computing
    Ping-Liang Chen
    Jen-Ho Yang
    Ching-I Lin
    Journal of Electronic Science and Technology, 2013, (02) : 221 - 224
  • [45] A User Authentication Scheme Based on Trusted Platform for Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
  • [46] Dyanimc Key based Authentication Scheme for Vehicular Cloud Computing
    Sharma, Manish Kumar
    Bali, Rasmeet S.
    Kaur, Arvinder
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1059 - 1064
  • [47] ID-Based User Authentication Scheme for Cloud Computing
    PingLiang Chen
    JenHo Yang
    ChingI Lin
    JournalofElectronicScienceandTechnology, 2013, 11 (02) : 221 - 224
  • [48] ASMCC+: A Secure Authentication Scheme for Mobile Cloud Computing Environment Based on Zero Trust Architecture
    Hossain, Md Jakir
    Seid, Abegaz Mohammed
    Abishu, Hayla Nahom
    Dharejo, Fayaz Ali
    Jhaveri, Rutvij H.
    Erbad, Aiman
    Alathbah, Moath
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (03) : 6236 - 6249
  • [49] Light-Weight and Privacy-Preserving Authentication Protocol for Mobile Payments in the Context of IoT
    Chen, Yanan
    Xu, Weixiang
    Peng, Li
    Zhang, Hao
    IEEE ACCESS, 2019, 7 : 15210 - 15221
  • [50] Efficient light-weight private auditing scheme for cloud-based wireless body area networks
    Zhang, Xiaojun
    Zhou, Ziyu
    Zhang, Jingwei
    Xu, Chunxiang
    Zhang, Xinpeng
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2020, 12 (02) : 139 - 153