2016
DOI: 10.1016/j.jnca.2015.10.005
|View full text |Cite
|
Sign up to set email alerts
|

Authentication in mobile cloud computing: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
66
0
1

Year Published

2016
2016
2019
2019

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 137 publications
(68 citation statements)
references
References 127 publications
1
66
0
1
Order By: Relevance
“…Sharaf et al [19] proposed (in 2016) an object authentication system in order to exploit device-specific data, known as fingerprints, to authenticate the objects associated with the IoT. In 2016, Alizadeh et al [20] presented a comprehensive survey of authentication schemes of mobile cloud computing (MCC) to explain MCC authentication and differentiate it with that of cloud computing schemes. However, in this paper we performed the cryptanalysis of A.K.Das [17] scheme and found that it is susceptible to stolen smart card attack.…”
Section: Related Workmentioning
confidence: 99%
“…Sharaf et al [19] proposed (in 2016) an object authentication system in order to exploit device-specific data, known as fingerprints, to authenticate the objects associated with the IoT. In 2016, Alizadeh et al [20] presented a comprehensive survey of authentication schemes of mobile cloud computing (MCC) to explain MCC authentication and differentiate it with that of cloud computing schemes. However, in this paper we performed the cryptanalysis of A.K.Das [17] scheme and found that it is susceptible to stolen smart card attack.…”
Section: Related Workmentioning
confidence: 99%
“…Authentication is used to protect the user against privacy and security issues [48]. It is used to prevent unauthorized access of the user.…”
Section: User Authentication In MCCmentioning
confidence: 99%
“…Some of the threats commonly occurred in mobile devices are denial of service, loss of device, malfunction of device etc. [48]. The authentication in MCC varies in following scenarios when compared with cloud computing: 1) resource limitations, 2) sensors, 3) high mobility, 4) network heterogeneity.…”
Section: User Authentication In MCCmentioning
confidence: 99%
“…If any adversary tries to exploit the mobile cloud servers, then an adversary is recognized as an illegitimate user, and as a result, it is not permitted by the role manager. Therefore, the SSA helped to identify the probability of the malicious mobile device, whereas the contending approaches either deploy no proper secure authentication or apply fragile authentication mechanisms that can only secure the traditional networks but are not appropriate for mobile cloud computing [37,38].…”
Section: Malicious Detection Probabilitymentioning
confidence: 99%