An efficient authentication system of smart device using multi factors in mobile cloud service architecture

被引:28
作者
Jeong, Young-Sik [1 ]
Park, Ji Soo [2 ]
Park, Jong Hyuk [2 ]
机构
[1] Dongguk Univ, Dept Multimedia Engn, Seoul, South Korea
[2] Seoul Natl Univ Sci & Technol, Dept Comp Sci & Engn, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
smart device authentication; smart device security; mobile cloud computing security; security and authentication scheme; access point algorithm;
D O I
10.1002/dac.2694
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile cloud computing environments have overcome the performance limitation of mobile devices and provide use environments not restricted by places. However, user information protection mechanisms are required because of both the security vulnerability of mobile devices and the security vulnerability of cloud computing. In this paper, a multifactor mobile device authentication system is proposed to provide safety, efficiency, and user convenience for mobile device use in cloud service architectures. This system improves security by reinforcing the user authentication required before using cloud computing services. Furthermore, to reinforce user convenience, the system proposed increases the strength of authentication keys by establishing multiple factors for authentication. For efficient entries in mobile device use environments, this system combines mobile device identification number entries, basic ID/password type authentication methods, and the authentication of diverse user bio-information. This system also enhances authentication efficiency by processing the authentication factors of a user's authentication attempt in a lump instead of one by one in the cloud computing service environment. These authentication factors can be continuously added, and this authentication system provides authentication efficiency even when authentication factors are added. The main contribution is to improve high security level by through authentication of mobile devices with multifactors simultaneously and to use the mobile cloud service architecture for its efficient processing with respect to execution time of it. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:659 / 674
页数:16
相关论文
共 18 条
[1]  
Alvisi L, 2010, USENIX S OP SYST DES
[2]  
[Anonymous], P 13 INT C ARCH SUPP
[3]  
[Anonymous], P SECURECOMM
[4]  
[Anonymous], J CONVERGENCE
[5]   Indoor Link Quality Comparison of IEEE 802.11a Channels in a Multi-radio Mesh Network Testbed [J].
Bandaranayake, Asitha U. ;
Pandit, Vaibhav ;
Agrawal, Dharma P. .
JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2012, 8 (01) :1-20
[6]  
Chow R., 2010, P ACM CLOUD COMP SEC
[7]   Strong roaming authentication technique for wireless and mobile networks [J].
He, Daojing ;
Chen, Chun ;
Chan, Sammy ;
Bu, Jiajun .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2013, 26 (08) :1028-1037
[8]  
Huang D., 2010, P 5 IEEE INT S SERV
[9]   Secured flooding time synchronization protocol with moderator [J].
Huang, Ding-Jie ;
Teng, Wei-Chung ;
Yang, Kai-Ting .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2013, 26 (09) :1092-1115
[10]   Towards secure mobile cloud computing: A survey [J].
Khan, Abdul Nasir ;
Kiah, M. L. Mat ;
Khan, Samee U. ;
Madani, Sajjad A. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (05) :1278-1299