2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC) 2014
DOI: 10.1109/pccc.2014.7017041
|View full text |Cite
|
Sign up to set email alerts
|

A light-weight authentication scheme based on message digest and location for mobile cloud computing

Abstract: The security of data transmission is of paramount importance to mobile cloud computing. For security purposes, the data transmission in mobile cloud computing typically requires a mutually-authenticated environment for mobile devices and cloud servers. SSH (secure shell) could be used to satisfy the requirement. However, it makes the authentication process computationally expensive for mobile devices because it involves public key cryptosystem and mobile devices are relatively restricted in terms of computatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 6 publications
(4 reference statements)
0
6
0
Order By: Relevance
“…There are many works found in the literature for user authentication, one of the studies by [17], introduces a security system for cloud user validation modeling where it incorporates a mutual authentication schema in between the cloud servers and mobile devices to restrict the unauthorized access so that they achieve the purpose of preserving the user data confidentiality within cloud ecosystem. In contrast, this model includes only one 1-layer of authentication using a symmetric key based on the user's location as an attribute towards the security policy.…”
Section: Review Of Literaturementioning
confidence: 99%
See 1 more Smart Citation
“…There are many works found in the literature for user authentication, one of the studies by [17], introduces a security system for cloud user validation modeling where it incorporates a mutual authentication schema in between the cloud servers and mobile devices to restrict the unauthorized access so that they achieve the purpose of preserving the user data confidentiality within cloud ecosystem. In contrast, this model includes only one 1-layer of authentication using a symmetric key based on the user's location as an attribute towards the security policy.…”
Section: Review Of Literaturementioning
confidence: 99%
“…In contrast, one layer of the key may undergo a dictionary attack, and even though the key generation mechanism is strong and it will have the possibility of guessing the key. It leads to open a research domain to provide one more layer to authentication, which resists attackers from accessing the system [17]. Another approach by [18] introduces an authentication procedure based on a biometric fingerprint recognition system to strengthen the authentication process for the mobile cloud ecosystems.…”
Section: Review Of Literaturementioning
confidence: 99%
“…Each incoming connection request from a mobile client is received by master cloud that performs its verification by utilizing cognitive module. The adaptive module selects an appropriate inner cloud where mutual authentication is performed by authentication module through Message Digest and Location-based Authentication (MDLA) [12] technique in order to establish secure communication session between mobile client and cloud sever. It also lacks the parameter escalation inside MDLA.…”
Section: Related Workmentioning
confidence: 99%
“…The hashed client ID and password is supported with user's previous location ɸprev Eq (6). During the authentication phase the cloud server is responsible for providing the resources responsible for authentication to the cloud server Eq (7). The authentication request provides user an authentication key authkey which is generated using current timestamp and new current location ɸnew Eq (8).…”
Section: Mdla (Message Digest and Location-based Authentication)mentioning
confidence: 99%
“…The cloud server decrypts the message using the primary key to obtain the user's current new location and time stamp in generating the authentication key Eq (7). The basic architecture for MDLA which highlights all the three phases is shown below: Three different types of updates take place after authentication phase performed by the methodology to assure confidentiality and secure access.…”
Section: Mdla (Message Digest and Location-based Authentication)mentioning
confidence: 99%