2014
DOI: 10.1002/dac.2694
|View full text |Cite
|
Sign up to set email alerts
|

An efficient authentication system of smart device using multi factors in mobile cloud service architecture

Abstract: SummaryMobile cloud computing environments have overcome the performance limitation of mobile devices and provide use environments not restricted by places. However, user information protection mechanisms are required because of both the security vulnerability of mobile devices and the security vulnerability of cloud computing. In this paper, a multifactor mobile device authentication system is proposed to provide safety, efficiency, and user convenience for mobile device use in cloud service architectures. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
28
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 29 publications
(28 citation statements)
references
References 15 publications
0
28
0
Order By: Relevance
“…In the MCC paradigm, mobile devices can improve their limitations (eg, battery life, computation and storage capacity), and enrich their capabilities by transferring computation‐intensive tasks of mobile devices to powerful cloud server(s), which is referred to as offloading . Because offloading all parts of an application to cloud server(s) may not always be beneficial because of some runtime parameters such as the varying nature of network condition and cloud server' availability, there is therefore a lot of ongoing researches to find solutions to select appropriate part(s) of applications for offloading to achieve lower energy consumption and/or higher performance gain …”
Section: Introductionmentioning
confidence: 99%
“…In the MCC paradigm, mobile devices can improve their limitations (eg, battery life, computation and storage capacity), and enrich their capabilities by transferring computation‐intensive tasks of mobile devices to powerful cloud server(s), which is referred to as offloading . Because offloading all parts of an application to cloud server(s) may not always be beneficial because of some runtime parameters such as the varying nature of network condition and cloud server' availability, there is therefore a lot of ongoing researches to find solutions to select appropriate part(s) of applications for offloading to achieve lower energy consumption and/or higher performance gain …”
Section: Introductionmentioning
confidence: 99%
“…Nowadays, there are many cloud service providers offering cloud computing services, where the user outsources calculation or storage to the cloud [1][2][3][4][5]. Reputation systems [6][7][8] are designed for evaluating trustworthiness of the users based on their feedback about each other.…”
Section: Introductionmentioning
confidence: 99%
“…Multi-factor Authentication (MFA) [4] is commonly used in the current cloud services to authenticate users. In addition to the use of username and password, additional authentication factors such as biometrics, voice and face recognition are used to further ascertain the authenticity of the user.…”
Section: Related Workmentioning
confidence: 99%