MOBILE CLOUD COMPUTING SERVICES AUTHENTICATION SCHEME

Because of the rapid growth of cloud computing and the expansion of mobile phone users in recent years, mobile cloud computing has attracted wide attention. In the mobile cloud, wireless computing networks are the basics of sharing data between mobile devices and cloud services. Since air is the com...

Full description

Saved in:
Bibliographic Details
Published inIraqi Journal of Information & Communication Technology Vol. 5; no. 3; pp. 1 - 14
Main Authors A. Abdulrahman, Safana, F. Al-Gailani, M.
Format Journal Article
LanguageEnglish
Published College of Information Engineering 30.12.2022
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Because of the rapid growth of cloud computing and the expansion of mobile phone users in recent years, mobile cloud computing has attracted wide attention. In the mobile cloud, wireless computing networks are the basics of sharing data between mobile devices and cloud services. Since air is the communication medium, it must be properly protected; otherwise, it will be subject to a variety of security threats, for example, attacks from middle-man, identity tracking, etc... Furthermore, mobile devices are limited in storage, resources, and computing powers. Hence, designing an efficient and secure balance of authentication schemes is extremely important. First of all, a multi-factor authentication scheme based on biometric (fingerprint information), hash function, and fuzzy vault algorithm is presented in that paper. Secondly, the Validation and Analysis tool of AVISPA Security was approved. Thirdly, the security of the scheme proposed is compared to other related schemes.  
AbstractList Because of the rapid growth of cloud computing and the expansion of mobile phone users in recent years, mobile cloud computing has attracted wide attention. In the mobile cloud, wireless computing networks are the basics of sharing data between mobile devices and cloud services. Since air is the communication medium, it must be properly protected; otherwise, it will be subject to a variety of security threats, for example, attacks from middle-man, identity tracking, etc... Furthermore, mobile devices are limited in storage, resources, and computing powers. Hence, designing an efficient and secure balance of authentication schemes is extremely important. First of all, a multi-factor authentication scheme based on biometric (fingerprint information), hash function, and fuzzy vault algorithm is presented in that paper. Secondly, the Validation and Analysis tool of AVISPA Security was approved. Thirdly, the security of the scheme proposed is compared to other related schemes.  
Author A. Abdulrahman, Safana
F. Al-Gailani, M.
Author_xml – sequence: 1
  givenname: Safana
  surname: A. Abdulrahman
  fullname: A. Abdulrahman, Safana
– sequence: 2
  givenname: M.
  surname: F. Al-Gailani
  fullname: F. Al-Gailani, M.
BookMark eNo9kE1Pg0AURSdGE2vt1jV_AHzz8ZhhWRFbElqMBeNuMgwzhqYWA9347yWt8W3uy83NWZw7cn3sj46QBwoRp4mSj92-s6cIIx4xoFdkxqRKQsljdj3904US1cctWYzjHgBYwgQgzghuyqe8yIK0KOvnIC03r3WVb1fBLnt7z9NsFyzrap1tqzxdVnm5DXbpOttk9-TGm8PoFn85J_VLVqXrsChX07IILRVIQ5cgcx6aOI4TYZj0XlhmUFguDWvROkEtgEJHpTdGAsSIdhoLhUxZ7_ic5Bdu25u9_h66LzP86N50-lz0w6c2w6mzB6cZtxRamni0IKxSjW2nQiGopGlaCRMrurDs0I_j4Pw_j4I-O9Rnhxo115ND_gsg3mDq
ContentType Journal Article
DBID AAYXX
CITATION
DOA
DOI 10.31987/ijict.5.3.201
DatabaseName CrossRef
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList
CrossRef
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
EISSN 2789-7362
EndPage 14
ExternalDocumentID oai_doaj_org_article_23c10d19f5c04c88bcdc1085089bbd70
10_31987_ijict_5_3_201
GroupedDBID AAYXX
ALMA_UNASSIGNED_HOLDINGS
CITATION
GROUPED_DOAJ
ID FETCH-LOGICAL-c1451-e952ef0b66694a27ff4c2a54c37a2d5ce41c0085e17faa700655c66648528cfe3
IEDL.DBID DOA
ISSN 2222-758X
IngestDate Wed Aug 27 01:20:13 EDT 2025
Tue Jul 01 00:53:04 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c1451-e952ef0b66694a27ff4c2a54c37a2d5ce41c0085e17faa700655c66648528cfe3
OpenAccessLink https://doaj.org/article/23c10d19f5c04c88bcdc1085089bbd70
PageCount 14
ParticipantIDs doaj_primary_oai_doaj_org_article_23c10d19f5c04c88bcdc1085089bbd70
crossref_primary_10_31987_ijict_5_3_201
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-12-30
PublicationDateYYYYMMDD 2022-12-30
PublicationDate_xml – month: 12
  year: 2022
  text: 2022-12-30
  day: 30
PublicationDecade 2020
PublicationTitle Iraqi Journal of Information & Communication Technology
PublicationYear 2022
Publisher College of Information Engineering
Publisher_xml – name: College of Information Engineering
SSID ssj0002924055
Score 2.2061844
Snippet Because of the rapid growth of cloud computing and the expansion of mobile phone users in recent years, mobile cloud computing has attracted wide attention. In...
SourceID doaj
crossref
SourceType Open Website
Index Database
StartPage 1
SubjectTerms mobile cloud computing, authentication, biometrics, fuzzy vault
Title MOBILE CLOUD COMPUTING SERVICES AUTHENTICATION SCHEME
URI https://doaj.org/article/23c10d19f5c04c88bcdc1085089bbd70
Volume 5
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELVQJxYEAkT5UgYkprSOP2JnpCGlRf1AtEHdLOdsS2UoCJX_j50EVCYW1siKnHfW3XvK-R1CNz7tGmexjp3MIGZCy1hancaE6IwLW-FE1w2ys3RUsscVX-2M-go9YY09cANcn1BIsEkyxwEzkLICA6FjHsusqoyo1bqveTtiKuRg4mUFrkee-vrnKSSXq8axkQaR3V-_rmHb4z0aert-VaQd4_66wgwP0UFLDaO7ZktHaM9ujhGfzgfjSRHlk3l5H-Xz6VO5HM8eokXx_DLOi0XkD9iomC3bC8HRIngcFCeoHBbLfBS3ow5iCKNyY5txYh2uvJjImCbCOQZEcwZUaGI4WJZAYEc2EU5rEYgDB7-YSU4kOEtPUWfztrFnKPIMIkkFUEcqysJ_PG2oNikIAyQl4Lro9vtz1XvjaKG8EqiBUTUwiiuqPDBdNAho_KwKTtT1Ax8f1cZH_RWf8_94yQXaJ-HaQTBYxJeos_34tFeeDGyr6zruXy7pq10
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=MOBILE+CLOUD+COMPUTING+SERVICES+AUTHENTICATION+SCHEME&rft.jtitle=Iraqi+Journal+of+Information+%26+Communication+Technology&rft.au=A.+Abdulrahman%2C+Safana&rft.au=F.+Al-Gailani%2C+M.&rft.date=2022-12-30&rft.issn=2222-758X&rft.eissn=2789-7362&rft.volume=5&rft.issue=3&rft.spage=1&rft.epage=14&rft_id=info:doi/10.31987%2Fijict.5.3.201&rft.externalDBID=n%2Fa&rft.externalDocID=10_31987_ijict_5_3_201
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2222-758X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2222-758X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2222-758X&client=summon