CFP last date
20 May 2024
Reseach Article

A Unified Cloud Authenticator for Mobile Cloud Computing Environment

Published on February 2015 by A. Cecil Donald, L. Arockiam
Advanced Computing and Communication Techniques for High Performance Applications
Foundation of Computer Science USA
ICACCTHPA2014 - Number 4
February 2015
Authors: A. Cecil Donald, L. Arockiam
0089df6a-4382-4725-84a4-146155ca4701

A. Cecil Donald, L. Arockiam . A Unified Cloud Authenticator for Mobile Cloud Computing Environment. Advanced Computing and Communication Techniques for High Performance Applications. ICACCTHPA2014, 4 (February 2015), 29-34.

@article{
author = { A. Cecil Donald, L. Arockiam },
title = { A Unified Cloud Authenticator for Mobile Cloud Computing Environment },
journal = { Advanced Computing and Communication Techniques for High Performance Applications },
issue_date = { February 2015 },
volume = { ICACCTHPA2014 },
number = { 4 },
month = { February },
year = { 2015 },
issn = 0975-8887,
pages = { 29-34 },
numpages = 6,
url = { /proceedings/icaccthpa2014/number4/19457-6046/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Advanced Computing and Communication Techniques for High Performance Applications
%A A. Cecil Donald
%A L. Arockiam
%T A Unified Cloud Authenticator for Mobile Cloud Computing Environment
%J Advanced Computing and Communication Techniques for High Performance Applications
%@ 0975-8887
%V ICACCTHPA2014
%N 4
%P 29-34
%D 2015
%I International Journal of Computer Applications
Abstract

Mobile cloud computing (MCC) is just cloud computing in which at least some of the devices like mobiles, PDA etc are involved. This paper drives over several authentication techniques and methods for mobile cloud computing. An analysis of the existing works are carried out. This Paper also analyses the attacks and Issues that occur during authentication in the mobile cloud environment. Security is the main issue that obstructs cloud from being widely adopted. A framework called the Mobile Cloud Authenticator (MCA) is proposed for authenticating the mobile users in the mobile cloud environment. The overall framework of MCA consists of three major entities namely, Cloud users, Mobile network and Cloud. There is a system called Unified Cloud Authenticator (UCA) which is placed in between the mobile network and Cloud Service Provider (CSP). It authenticates both users and CSP. The UCA contains Authentication Server (AS), hashing machine, connection manager, user manager and service manager. The operational procedure of UCA has three phases namely registration phase, authentication phase and verification phase. This paper explains the overall framework of MCA and the functions of UCA in detail.

References
  1. Ruay-Shiung Chang, Jerry Gao, Volker Gruhn, Jingsha He, George Roussos and Wei-Tek Tsai, "Mobile Cloud Computing Research – Issues, Challenges, and Needs", Seventh IEEE International Symposium on Service-Oriented System Engineering, IEEE, 2013, ISSN: 978-0-7695, pp. 442- 453.
  2. Richard K. Lomotey and Ralph Deters, "SaaS Authentication Middleware for Mobile Consumers of IaaS Cloud", Ninth World Congress on Services, IEEE, 2013, ISSN: 978-0-7695, pp. 448-455.
  3. Donald, A. Cecil, S. Arul Oli, and L. Arockiam. "Mobile Cloud Security Issues and Challenges: A Perspective. " International Journal of Electronics and Information Technology (IJEIT), ISSN (2013): 2277-3754.
  4. D. H. Bae, "A Study on the Revision of the 'Personal Information Protection Act' and its Related Acts", Research of IT and Law, vol. 6, 2012, pp. 1-261.
  5. Abid Shahzad and Mureed Hussain, "Security Issues and Challenges of Mobile Cloud Computing", International Journal of Grid and Distributed Computing (IJGDC), Vol. 6, No. 6, 2013, ISSN: 2005-4262, pp. 37-50.
  6. IehabALRassan and HananAlShaher, "Securing Mobile Cloud Using Finger Print Authentication", International Journal of Network Security & Its Applications (IJNSA), Vol. 5, No. 6, November 2013, pp. 41-53.
  7. S. Xiao, W. Gong, "Mobility can help: protect user identity with dynamic credential", In. Proc. of 11th Int. Conf. on Mobile Data Management, MDM '10, 2010.
  8. Yan Zhu, Di Ma, Dijiang Huang and Changjun Hu, "Enabling Secure Location-based Services in Mobile Cloud Computing", In: Proc. International Conference on Mobile Cloud Computing (MCC '13), ACM, August 2013, pp 27-32.
  9. Kai xi, tohari ahmad, fengling han and jiankun hu, "A fingerprint based bio-cryptographic security Protocol designed for client/server authentication in Mobile computing environment", Special issue paper Security and communication networks, Wiley Online Library, 2010.
  10. Thamba Meshach and K. S. Suresh Babu, "Secured and Efficient Authentication Scheme for Mobile Cloud", International Journal of Innovations in Engineering and Technology (IJIET), Vol. 2, Issue 1, February 2013, ISSN: 2319 – 1058, pp. 242-248.
  11. Majid Bakhtiari, Mahnoush Babaeizadeh and Mohd Aizaini Maarof, "Keystroke Dynamic Authentication in Mobile Cloud Computing", International Journal of Computer Applications (IJCA), Volume 90, No. 1, 2014, ISSN: 0975 – 8887, pp. 29-36.
  12. H. Dinesha and V. Agrawal, "Multi-level authentication technique for accessing cloud services," In Proc. of International Conference on Computing, Communication and Applications (ICCCA' 12), 2012, pp. 1-4.
  13. Abdul Nasir Khan, M. L. Mat Kiah, Sajjad A. Madani, Atta ur Rehman Khan, Mazhar Ali, "Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing", Journal of Super Computers, Springer, Vol. 66, June 2013, ISSN: 1687–1706, pp. 1687-1706.
  14. Reza Rahimi, Jian Ren, Chi Harold Liu, Athanasios V. Vasilakos and Nalini Venkatasubramanian, "Mobile Cloud Computing: A Survey, State of Art and Future Directions", In. Proceedings of Mobile Network Applicatons, Springer, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Cloud Mobile Cloud Authenticator (mca) Unified Cloud Authenticator (uca) Authentication