Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing

نویسندگان

  • Xu Yang
  • Xinyi Huang
  • Joseph K. Liu
چکیده

Various wireless communication technologies have been generated and deployed on account of mass requirements. These enable cloud computing with integration with mobility and Mobile Cloud Computing (MCC) becomes the trend of future generation computing paradigm. In this paper, we address a challenging issue of MCC technology security and privacy of the handover process. We propose a new design of handoff authentication for heterogeneous mobile cloud networks, which provides user anonymity and untraceability. Compared with previous protocols, our proposed mechanism achieves comprehensive features of universality, robust security and efficiency.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

An Efficient Authentication Protocol Supporting Privacy in Mobile Computing Environments

The anticipated increase in mobility and popular use of the mobile services will require more technologies for authenticating mobile hosts and protecting their privacy. However, the issues such as privacy and confidentiality in mobile computing environments and the resource restriction of mobile hosts have not been given enough consideration. In this paper, we present an authentication protocol...

متن کامل

Homomorphic Handover Authentication Technique for Mobile Cloud Computing

Mobile Cloud Computing has brought the IT industry to a new level by providing an innovative technique with the help of which one can access anything, anytime from anywhere. It is an industry buzz word since 2009 and a relatively new concept that combines cloud computing, mobile computing and wireless networking. This technology has uplifted the usability experience of mobile users. Over the pa...

متن کامل

Cryptanalysis of Park's Authentication Protocol in Wireless Mobile Communication Systems

In 2004, C. Park proposed an authentication protocol to provide user anonymity and untraceability in wireless mobile communication systems. The real user identities are hidden and randomized by means of error-correcting codes. In this work, it is shown that Park’s protocol does not provide anonymity and untraceability. More precisely, the users real identities can be obtained easily by an eaves...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Future Generation Comp. Syst.

دوره 62  شماره 

صفحات  -

تاریخ انتشار 2016