2015
DOI: 10.1109/jsyst.2014.2322973
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

Abstract: In modern societies, the number of mobile users has dramatically risen in recent years. In this paper, an efficient authentication scheme for distributed mobile cloud computing services is proposed. The proposed scheme provides security and convenience for mobile users to access multiple mobile cloud computing services from multiple service providers using only a single private key. The security strength of the proposed scheme is based on bilinear pairing cryptosystem and dynamic nonce generation. In addition,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
198
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 256 publications
(203 citation statements)
references
References 29 publications
0
198
0
1
Order By: Relevance
“…Recently, Gope and Das [39] proposed an anonymous mutual authentication scheme for ubiquitous mobile cloud computing services, in which a legitimate mobile cloud user is allowed to enjoy n times all the ubiquitous services in a secure and efficient way, where the value of n may differ based on the principal he/she has paid for. In addition, Odelu et al [40] reviewed Tsai-Lo's scheme [41] and pointed out that their scheme does not provide the session-key security and strong user credentials' privacy. To remove the security weaknesses found in Tsai-Lo's scheme, Odelu et al designed a provably secure authentication scheme for distributed mobile cloud computing services.…”
Section: Issues In Recent Single Server Akap For Cloud Platformmentioning
confidence: 99%
“…Recently, Gope and Das [39] proposed an anonymous mutual authentication scheme for ubiquitous mobile cloud computing services, in which a legitimate mobile cloud user is allowed to enjoy n times all the ubiquitous services in a secure and efficient way, where the value of n may differ based on the principal he/she has paid for. In addition, Odelu et al [40] reviewed Tsai-Lo's scheme [41] and pointed out that their scheme does not provide the session-key security and strong user credentials' privacy. To remove the security weaknesses found in Tsai-Lo's scheme, Odelu et al designed a provably secure authentication scheme for distributed mobile cloud computing services.…”
Section: Issues In Recent Single Server Akap For Cloud Platformmentioning
confidence: 99%
“…Li et al (2013) also proposed an authentication scheme based on bilinear pairings [11]. Tsai-Lo and Lo proposed a new anonymous authentication scheme based on nonce and bilinear pairing [12], which supports mutual authentication, key exchange, user anonymity, and user untraceability. It is claimed that their scheme withstands all major security threats and meets general security requirements.…”
Section: Related Workmentioning
confidence: 99%
“…[33], RSA [34], bilinear pairing [35], identity based cryptography [36] are some of protocols used for secure authentication of users over cloud. Tsai and Lo [37] have recently presented an authentication scheme that makes use of bilinear pairing for secret exchanging of private keys, mutual authentication, and rendering untraceability. The outcome of the study has been compared with 5 existing studies to find that presented scheme is highly resilient against various forms of authentication threats.…”
Section: Authenticationmentioning
confidence: 99%