Privacy Aware Authentication Scheme for Distributed Mobile Cloud Computing

نویسندگان

  • Boyang Wang
  • X. F. Qiu
  • J. W. Liu
  • P. C. Zhao
چکیده

As mobile users generally access different types of mobile cloud computing services from a variety of service providers, it is extremely tedious for users to register different user accounts on each service provider and maintain corresponding private keys or passwords for authentication usage. In this paper, I propose a encryption method call Attribute encryption method. Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of required resources, but the data is outsourced or stored to some cloud servers, and various privacy concerns emerge from it. This paper focuses on data privacy, anonymity, access control. Attribute based encryption technique attached attributes along with the data and only attributes are encrypted the data is kept as it is. Attribute based encryption technique increased the security, performance and reduce the time of proposed system. Keywords— Authentication scheme, Attribute Based Encryption, Anonymity, mobile cloud computing services. I. Int roduct ion Combination of cloud computing, mobile computing and wireless networks is called as Mobile Cloud Computing (MCC) to bring rich computational resources for mobile users, network operators, as well as cloud computing providers. The goal behind the use of MCC is to enable execution of rich mobile applications on a plethora of mobile devices, with a rich user experience. The impact of mobile cloud computing [8]–[9] is very important research field in mobile-oriented world, providing new supplements, consumption, and delivery models for IT services. MCC gives the better business opportunities for mobile network operators as well as cloud providers. More comprehensively, MCC can be defined as ”a rich mobile computing technology that leverages untied elastic resources of varied clouds and network technologies toward unrestricted functionality, storage, and mobility to serve a multitude of mobile devices anywhere, anytime through the channel of Ethernet or Internet regardless of heterogeneous environments and platforms based on the pay-as-you-use principle. However, there are three concerns to be resolved along with the authentication scheme . First of all, in this scheme computing efficiency is seriously considered, since mobile devices have only relatively limited computing capability in comparison with laptop computers. Second, sufficient security strength should be supported; since all messages are transmitted via an insecure WLAN or telecommunication networks, an adversary can easily obtain, interrupt, or modify transmitting messages before they reach the desired recipient. In addition, privacy protection on user accounts is a rising issue as identity masquerade and identity tracing have become common attacks in wireless mobile environments. As mobile users generally access [1] Traditional single sign-on (SSO) schemes [1]–[12] such as Passport and OpenID are one possible solution for key management issue. In such systems, users can access multiple mobile cloud computing services using only one secret key or password. However, most of SSO systems require a trusted third party to participate in each user authentication session. OpenID is an example of a decentralized SSO mechanism, which has been widely adopted by many Internet service providers such as Yahoo and Google, with over 50 000 websites currently using OpenID as their authentication scheme. OpenID involves three roles: users, relying partners (RP) or service providers (SP), and identity providers (IdP). In OpenID, an IdP can be also an SP and vice versa. II. Material and Methodology

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

An Efficient Authentication Scheme for Mobile Cloud Computing Services

The explosive growth of mobile users has been increasing in the past few years. In this paper, an efficient authentication scheme for distributed mobile cloud computing is proposed. This proposed scheme enables the users to access multiple service providers with a single private key. Instead of opting traditional public key cryptosystem like RSA, the proposed scheme uses bilinear pairing techni...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016