2022
DOI: 10.1155/2022/9995023
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Security of Mobile Cloud Computing by Trust- and Role-Based Access Control

Abstract: The tremendous development in mobile technology attracts users’ attention. Thus, the users are shifting from traditional computational devices to smartphones and tablets, and because of that, mobile devices have anticipated most of the global IP traffic. However, mobile device’s resource-constrained behaviour cannot handle the heavy computational load. Mobile cloud computing (MCC) mitigates resource-constrained issues by enabling computing resources with minimal effort. However, providing security in MCC is an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 26 publications
0
6
0
Order By: Relevance
“…Se-Ra Oh et al [12] introduced an interoperable access control framework that is based on OAuth 2.0 and roles, enabling client-specific domains in heterogeneous IoT platforms to utilize the IAT for access and permitting authenticating roles to enter the proposed framework and subsequently access valuable resources in the domains. Abdul et al [13] designed an access control mechanism based on RBAC and calculated the trust level based on the user's uncertain behaviour. This mechanism mitigates malicious operations caused by authenticated users.…”
Section: Related Workmentioning
confidence: 99%
“…Se-Ra Oh et al [12] introduced an interoperable access control framework that is based on OAuth 2.0 and roles, enabling client-specific domains in heterogeneous IoT platforms to utilize the IAT for access and permitting authenticating roles to enter the proposed framework and subsequently access valuable resources in the domains. Abdul et al [13] designed an access control mechanism based on RBAC and calculated the trust level based on the user's uncertain behaviour. This mechanism mitigates malicious operations caused by authenticated users.…”
Section: Related Workmentioning
confidence: 99%
“…The selection of an appropriate carrier medium is paramount in steganography. The ubiquity, transparency, and accessibility of cloud computing position it as an optimal candidate for this role [8].…”
Section: Introductionmentioning
confidence: 99%
“…The selection of an appropriate carrier medium is paramount in steganography. The ubiquity, transparency, and accessibility of cloud computing position it as an optimal candidate for this role [ 5]. Cloud computing, a cornerstone of distributed computing, provides access to versatile computational resources, boasting advantages such as cost-efficiency, enhanced data accessibility, and accelerated computational speeds [7][8][9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%
“…In our example, the length of array 𝑂[𝑁] is 20 from 16 length of key 𝐾 = 5 . Column length is computed by substituting the values of array length, and key length in equation(5), and obtained depth of the column is 4.Insert the first four files of the array 𝑂[𝑁] into the column of the key labeled 1, next four files of the array 𝑂[𝑁] are inserted into the column of the key labeled 2, and so on, as shown in the table. 8.…”
mentioning
confidence: 99%