Please use this identifier to cite or link to this item:
https://idr.l4.nitk.ac.in/jspui/handle/123456789/7292
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Madhusudhan, R. | |
dc.contributor.author | Suvidha, K.S. | |
dc.date.accessioned | 2020-03-30T09:58:47Z | - |
dc.date.available | 2020-03-30T09:58:47Z | - |
dc.date.issued | 2018 | |
dc.identifier.citation | 2017 International Conference on Public Key Infrastructure and its Applications, PKIA 2017 - Proceedings, 2018, Vol.2018-January, , pp.17-22 | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/7292 | - |
dc.description.abstract | With the rapid growth and development in cloud computing and mobility, mobile cloud computing has emerged and becomes the trend of future generation computing paradigm. Cloud offers infrastructure, platform and software services to mobile users through mobile network. The key issues in mobile cloud computing are security and privacy. While analysing security and privacy issues in mobile cloud computing, three aspects should be considered they are: mobile terminal, mobile network and the cloud. To address the key issues in mobile cloud computing, we proposed an authentication scheme which will provide security to the messages exchanged between mobile user and the cloud server. Lee at al. have proposed authentication scheme for roaming service in global mobility networks in 2016. In this paper we have reviewed Lee et al.'s scheme and proved that their scheme is vulnerable to replay attack, man in the middle attack and impersonation attack. Moreover their scheme fails to preserve user anonymity, provides no local password verification and could not achieve perfect forward secrecy. Hence an enhanced secure authentication scheme with user anonymity in mobile cloud computing is proposed. Furthermore, the security analysis of the proposed scheme is also presented in this paper. � 2017 IEEE. | en_US |
dc.title | An enhanced secure authentication scheme with user anonymity in mobile cloud computing | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.