2023
DOI: 10.3390/s23031264
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services

Abstract: Authentication and authorization constitute the essential security component, access control, for preventing unauthorized access to cloud services in mobile cloud computing (MCC) environments. Traditional centralized access control models relying on third party trust face a critical challenge due to a high trust cost and single point of failure. Blockchain can achieve the distributed trust for access control designs in a mutual untrustworthy scenario, but it also leads to expensive storage overhead. Considerin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 47 publications
0
1
0
Order By: Relevance
“…A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services [12].The paper introduces an innovative blockchain-based authentication and authorization scheme tailored for Mobile Cloud Computing (MCC) hierarchical services, presenting advantages such as a streamlined single user registration process and adaptable updates. However, an in-depth analysis reveals certain drawbacks that warrant attention.…”
Section: Breaking Mobile Notification-based Authentication Withmentioning
confidence: 99%
“…A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services [12].The paper introduces an innovative blockchain-based authentication and authorization scheme tailored for Mobile Cloud Computing (MCC) hierarchical services, presenting advantages such as a streamlined single user registration process and adaptable updates. However, an in-depth analysis reveals certain drawbacks that warrant attention.…”
Section: Breaking Mobile Notification-based Authentication Withmentioning
confidence: 99%