A Survey of Authentication Methods in Mobile Cloud Computing

被引:0
|
作者
Reshmi, G.
Rakshmy, C. S.
机构
来源
2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST) | 2015年
关键词
mobile cloud computing; security; authentication;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Cloud Computing (MCC) is an emerging technology which attempts to combine the storage and processing resources of cloud environment with the dynamicity and accessibility of mobile devices. Security, particularly authentication, is fast evolving as a focal area in mobile cloud computing research. This paper comprehensively surveys the various authentication mechanisms proposed so far for mobile cloud computing. We propose a novel classification system for existing authentication methods in MCC. Further, the pros and cons of the various methods are discussed. We present a comparative analysis and recommends future research in improving the surveyed implicit authentication by establishing cryptographic security of stored usage context and actions.
引用
收藏
页码:58 / 63
页数:6
相关论文
共 50 条
  • [1] Authentication in mobile cloud computing: A survey
    Alizadeh, Mojtaba
    Abolfazli, Saeid
    Zamani, Mazdak
    Baharun, Sabariah
    Sakurai, Kouichi
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 : 59 - 80
  • [2] A SURVEY ON MOBILE CLOUD COMPUTING: MOBILE COMPUTING
    Somula, Ramasubbareddy
    Sasikala, R.
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2018, 19 (04): : 309 - 337
  • [3] Strong Authentication for Mobile Cloud Computing
    Ahmed-Nacer, Anis
    Ahmed-Nacer, Mehdi
    2016 13TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES FOR DISTRIBUTED SYSTEMS (NOTERE), 2016,
  • [4] Towards port-knocking authentication methods for mobile cloud computing
    Khan, Suleman
    Shiraz, Muhammad
    Boroumand, Laleh
    Gani, Abdullah
    Khan, Muhammad Khurram
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 97 : 66 - 78
  • [5] A Survey of Mobile Cloud Computing
    Xiaopeng Fan 1
    2. Department of Computing
    3. Department of Land Surveying and Geo-informatics
    ZTE Communications, 2011, 9 (01) : 4 - 8
  • [6] Mobile cloud computing: A survey
    Fernando, Niroshinie
    Loke, Seng W.
    Rahayu, Wenny
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (01): : 84 - 106
  • [7] Deep authentication model in Mobile Cloud Computing
    Zeroual, Abdelhakim
    Amroune, Mohamed
    Derdour, Makhlouf
    Meraoumia, Abdallah
    Bentahar, Atef
    2018 3RD INTERNATIONAL CONFERENCE ON PATTERN ANALYSIS AND INTELLIGENT SYSTEMS (PAIS), 2018, : 277 - 280
  • [8] A survey on Biometric Based Authentication in cloud computing
    Padma, P.
    Srinivasan, S.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 1, 2016, : 275 - 279
  • [9] Keystroke Dynamics Authentication in Cloud Computing: A Survey
    Hassan, Basma Mohammed
    Fouad, Khaled Mohammed
    Hassan, Mahmoud Fathy
    INTERNATIONAL JOURNAL OF ENTERPRISE INFORMATION SYSTEMS, 2015, 11 (04) : 99 - 120
  • [10] Applications of Mobile Cloud Computing: A Survey
    Arun, C.
    Prabu, K.
    2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 1037 - 1041