AN IMPROVED PORT KNOCKING AUTHENTICATION FRAMEWORK FOR MOBILE CLOUD COMPUTING

被引:3
|
作者
Shiraz, Muhammad [1 ]
Boroumand, Laleh [2 ]
Gani, Abdullah [2 ]
Khan, Suleman [3 ]
机构
[1] Fed Urdu Univ Arts Sci & Technol, Dept Comp Sci, Islamabad, Pakistan
[2] Univ Malaya, Ctr Mobile Cloud Comp Res C4MCCR, Dept Comp Syst & Technol, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
[3] Northumbria Univ, Dept Comp & Informat Sci, Newcastle Upon Tyne NE1 8ST, Tyne & Wear, England
关键词
Mobile Cloud Computing (MCC); Authentication; Port Knocking; Security; dynamic port-knocking;
D O I
10.22452/mjcs.vol32no4.2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The latest developments in mobile cloud computing (MCC) have changed user's priorities for computing. However, the change towards MCC brings new challenges to cloud service providers and administrators. Authentication is one among the challenges categorized in the classification of security issues for MCC. Port knocking authentication method eliminates user's collaboration during the authentication process. Thus, such technique has the potential to be applied on the MCC environment which can ensure reliable communication. However, current port knocking authentication techniques lack of addressing the issue of knock-sequence length. It is challenging to deploy appropriate length sequence for port knocking authentication for the reason that shorter length knock-sequence degrades security, whereas, deploying longer length sequence involves performance issues in terms of time and buffer management. This paper proposes a dynamic length port knocking authentication framework which addresses the issue of security degradation and optimizes performance in terms of time up and buffer managment. We employ MikroTik RouterOS for the evaluation of the proposed technique. Analysis of the results shows that dynamic length port knocking authentication technique improves performance in terms of time up to 23% and buffer management up to 28% by reducing the imposed load. Furthermore, by deploying dynamic length (DL) and pool of length (PoL), the proposed method reveals high security, which decreases the probability of hacking knock-sequence near to zero for a number of parallel authentication requests. Hence, dynamic length port knocking authentication technique provides an optimal solution for reliable communication in MCC.
引用
收藏
页码:269 / 283
页数:15
相关论文
共 50 条
  • [1] Towards port-knocking authentication methods for mobile cloud computing
    Khan, Suleman
    Shiraz, Muhammad
    Boroumand, Laleh
    Gani, Abdullah
    Khan, Muhammad Khurram
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 97 : 66 - 78
  • [2] Improved port knocking with strong authentication
    deGraaf, R
    Aycock, J
    Jacobson, M
    [J]. 21st Annual Computer Security Applications Conference, Proceedings, 2005, : 409 - 418
  • [3] An improved authentication protocol for distributed mobile cloud computing services
    Jannati, Hoda
    Bahrak, Behnam
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2017, 19 : 59 - 67
  • [4] An improved anonymous authentication scheme for distributed mobile cloud computing services
    Shehzad Ashraf Chaudhry
    I Luk Kim
    Seungmin Rho
    Mohammad Sabzinejad Farash
    Taeshik Shon
    [J]. Cluster Computing, 2019, 22 : 1595 - 1609
  • [5] An improved anonymous authentication scheme for distributed mobile cloud computing services
    Chaudhry, Shehzad Ashraf
    Kim, I. Luk
    Rho, Seungmin
    Farash, Mohammad Sabzinejad
    Shon, Taeshik
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1595 - 1609
  • [6] Strong Authentication for Mobile Cloud Computing
    Ahmed-Nacer, Anis
    Ahmed-Nacer, Mehdi
    [J]. 2016 13TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES FOR DISTRIBUTED SYSTEMS (NOTERE), 2016,
  • [7] Authentication in mobile cloud computing: A survey
    Alizadeh, Mojtaba
    Abolfazli, Saeid
    Zamani, Mazdak
    Baharun, Sabariah
    Sakurai, Kouichi
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 : 59 - 80
  • [8] Attacks on port knocking authentication mechanism
    Manzanares, AI
    Márquez, JT
    Estevez-Tapiador, JM
    Castro, JCH
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, VOL 4, PROCEEDINGS, 2005, 3483 : 1292 - 1300
  • [9] A Survey of Authentication Methods in Mobile Cloud Computing
    Reshmi, G.
    Rakshmy, C. S.
    [J]. 2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 58 - 63
  • [10] Deep authentication model in Mobile Cloud Computing
    Zeroual, Abdelhakim
    Amroune, Mohamed
    Derdour, Makhlouf
    Meraoumia, Abdallah
    Bentahar, Atef
    [J]. 2018 3RD INTERNATIONAL CONFERENCE ON PATTERN ANALYSIS AND INTELLIGENT SYSTEMS (PAIS), 2018, : 277 - 280