Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chaudhry, Shehzad Ashraf | - |
dc.contributor.author | Kim, I. Luk | - |
dc.contributor.author | Rho, Seungmin | - |
dc.contributor.author | Farash, Mohammad Sabzinejad | - |
dc.contributor.author | Shon, Taeshik | - |
dc.date.issued | 2019-01-16 | - |
dc.identifier.uri | https://dspace.ajou.ac.kr/dev/handle/2018.oak/29998 | - |
dc.description.abstract | Mobile cloud computing blend mobile and cloud computing together with the help of wireless communication technology to achieve benefits for the stakeholders. These stakeholders include mobile users, mobile service operators and cloud service providers. Assorted challenges are also there for the implementation of mobile cloud computing but security and privacy are the dominant concerns. In order to achieve security and privacy of the said system several attempts are taken up. As the underlying system is complex and more prone against security threats, therefore strong authentication and privacy preserving schemes are desired. Three factor biometrics based authentication schemes are considered more secure for such huge and complex systems. Moreover, computational intelligence is getting popular nowadays for designing more vigorous and reliable biometrics based authentication schemes. Very recently, Tsai and Lo proposed an identity based authentication scheme for distributed mobile cloud computing environments. They claimed to achieve single sign on authentication for multiple service providers. Furthermore, they emphasized the usefulness and security of their scheme. However, the analysis in this paper shows that Tsai and Lo’s scheme is insecure against server forgery attack. It is proved that any adversaries having knowledge of just public parameters can forge as a valid service provider. Then an improved scheme is proposed to mitigate the security weakness. The security of proposed scheme is instantiated under random oracle model as well as the protocol validation model of popular automated tool ProVerif. | - |
dc.language.iso | eng | - |
dc.publisher | Springer New York LLC | - |
dc.subject.mesh | Bilinear mapping | - |
dc.subject.mesh | Elliptic curve cryptography | - |
dc.subject.mesh | Identity-based | - |
dc.subject.mesh | Proverif | - |
dc.subject.mesh | Random Oracle model | - |
dc.title | An improved anonymous authentication scheme for distributed mobile cloud computing services | - |
dc.type | Article | - |
dc.citation.endPage | 1609 | - |
dc.citation.startPage | 1595 | - |
dc.citation.title | Cluster Computing | - |
dc.citation.volume | 22 | - |
dc.identifier.bibliographicCitation | Cluster Computing, Vol.22, pp.1595-1609 | - |
dc.identifier.doi | 10.1007/s10586-017-1088-9 | - |
dc.identifier.scopusid | 2-s2.0-85027977328 | - |
dc.identifier.url | http://www.kluweronline.com/issn/1386-7857 | - |
dc.subject.keyword | Bilinear mapping | - |
dc.subject.keyword | Bilinear mapping | - |
dc.subject.keyword | Elliptic curve cryptography | - |
dc.subject.keyword | Identity based authentication | - |
dc.subject.keyword | Mobile cloud computing | - |
dc.subject.keyword | ProVerif | - |
dc.subject.keyword | Random oracle model | - |
dc.description.isoa | false | - |
dc.subject.subarea | Software | - |
dc.subject.subarea | Computer Networks and Communications | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.