MOBILE CLOUD COMPUTING SERVICES AUTHENTICATION SCHEME
Because of the rapid growth of cloud computing and the expansion of mobile phone users in recent years, mobile cloud computing has attracted wide attention. In the mobile cloud, wireless computing networks are the basics of sharing data between mobile devices and cloud services. Since air is the com...
Saved in:
Published in | Iraqi Journal of Information & Communication Technology Vol. 5; no. 3; pp. 1 - 14 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
College of Information Engineering
30.12.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Because of the rapid growth of cloud computing and the expansion of mobile phone users in recent years, mobile cloud computing has attracted wide attention. In the mobile cloud, wireless computing networks are the basics of sharing data between mobile devices and cloud services. Since air is the communication medium, it must be properly protected; otherwise, it will be subject to a variety of security threats, for example, attacks from middle-man, identity tracking, etc... Furthermore, mobile devices are limited in storage, resources, and computing powers. Hence, designing an efficient and secure balance of authentication schemes is extremely important. First of all, a multi-factor authentication scheme based on biometric (fingerprint information), hash function, and fuzzy vault algorithm is presented in that paper. Secondly, the Validation and Analysis tool of AVISPA Security was approved. Thirdly, the security of the scheme proposed is compared to other related schemes. |
---|---|
AbstractList | Because of the rapid growth of cloud computing and the expansion of mobile phone users in recent years, mobile cloud computing has attracted wide attention. In the mobile cloud, wireless computing networks are the basics of sharing data between mobile devices and cloud services. Since air is the communication medium, it must be properly protected; otherwise, it will be subject to a variety of security threats, for example, attacks from middle-man, identity tracking, etc... Furthermore, mobile devices are limited in storage, resources, and computing powers. Hence, designing an efficient and secure balance of authentication schemes is extremely important. First of all, a multi-factor authentication scheme based on biometric (fingerprint information), hash function, and fuzzy vault algorithm is presented in that paper. Secondly, the Validation and Analysis tool of AVISPA Security was approved. Thirdly, the security of the scheme proposed is compared to other related schemes. |
Author | A. Abdulrahman, Safana F. Al-Gailani, M. |
Author_xml | – sequence: 1 givenname: Safana surname: A. Abdulrahman fullname: A. Abdulrahman, Safana – sequence: 2 givenname: M. surname: F. Al-Gailani fullname: F. Al-Gailani, M. |
BookMark | eNo9kE1Pg0AURSdGE2vt1jV_AHzz8ZhhWRFbElqMBeNuMgwzhqYWA9347yWt8W3uy83NWZw7cn3sj46QBwoRp4mSj92-s6cIIx4xoFdkxqRKQsljdj3904US1cctWYzjHgBYwgQgzghuyqe8yIK0KOvnIC03r3WVb1fBLnt7z9NsFyzrap1tqzxdVnm5DXbpOttk9-TGm8PoFn85J_VLVqXrsChX07IILRVIQ5cgcx6aOI4TYZj0XlhmUFguDWvROkEtgEJHpTdGAsSIdhoLhUxZ7_ic5Bdu25u9_h66LzP86N50-lz0w6c2w6mzB6cZtxRamni0IKxSjW2nQiGopGlaCRMrurDs0I_j4Pw_j4I-O9Rnhxo115ND_gsg3mDq |
ContentType | Journal Article |
DBID | AAYXX CITATION DOA |
DOI | 10.31987/ijict.5.3.201 |
DatabaseName | CrossRef DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
DeliveryMethod | fulltext_linktorsrc |
EISSN | 2789-7362 |
EndPage | 14 |
ExternalDocumentID | oai_doaj_org_article_23c10d19f5c04c88bcdc1085089bbd70 10_31987_ijict_5_3_201 |
GroupedDBID | AAYXX ALMA_UNASSIGNED_HOLDINGS CITATION GROUPED_DOAJ |
ID | FETCH-LOGICAL-c1451-e952ef0b66694a27ff4c2a54c37a2d5ce41c0085e17faa700655c66648528cfe3 |
IEDL.DBID | DOA |
ISSN | 2222-758X |
IngestDate | Wed Aug 27 01:20:13 EDT 2025 Tue Jul 01 00:53:04 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c1451-e952ef0b66694a27ff4c2a54c37a2d5ce41c0085e17faa700655c66648528cfe3 |
OpenAccessLink | https://doaj.org/article/23c10d19f5c04c88bcdc1085089bbd70 |
PageCount | 14 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_23c10d19f5c04c88bcdc1085089bbd70 crossref_primary_10_31987_ijict_5_3_201 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2022-12-30 |
PublicationDateYYYYMMDD | 2022-12-30 |
PublicationDate_xml | – month: 12 year: 2022 text: 2022-12-30 day: 30 |
PublicationDecade | 2020 |
PublicationTitle | Iraqi Journal of Information & Communication Technology |
PublicationYear | 2022 |
Publisher | College of Information Engineering |
Publisher_xml | – name: College of Information Engineering |
SSID | ssj0002924055 |
Score | 2.2061844 |
Snippet | Because of the rapid growth of cloud computing and the expansion of mobile phone users in recent years, mobile cloud computing has attracted wide attention. In... |
SourceID | doaj crossref |
SourceType | Open Website Index Database |
StartPage | 1 |
SubjectTerms | mobile cloud computing, authentication, biometrics, fuzzy vault |
Title | MOBILE CLOUD COMPUTING SERVICES AUTHENTICATION SCHEME |
URI | https://doaj.org/article/23c10d19f5c04c88bcdc1085089bbd70 |
Volume | 5 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELVQJxYEAkT5UgYkprSOP2JnpCGlRf1AtEHdLOdsS2UoCJX_j50EVCYW1siKnHfW3XvK-R1CNz7tGmexjp3MIGZCy1hancaE6IwLW-FE1w2ys3RUsscVX-2M-go9YY09cANcn1BIsEkyxwEzkLICA6FjHsusqoyo1bqveTtiKuRg4mUFrkee-vrnKSSXq8axkQaR3V-_rmHb4z0aert-VaQd4_66wgwP0UFLDaO7ZktHaM9ujhGfzgfjSRHlk3l5H-Xz6VO5HM8eokXx_DLOi0XkD9iomC3bC8HRIngcFCeoHBbLfBS3ow5iCKNyY5txYh2uvJjImCbCOQZEcwZUaGI4WJZAYEc2EU5rEYgDB7-YSU4kOEtPUWfztrFnKPIMIkkFUEcqysJ_PG2oNikIAyQl4Lro9vtz1XvjaKG8EqiBUTUwiiuqPDBdNAho_KwKTtT1Ax8f1cZH_RWf8_94yQXaJ-HaQTBYxJeos_34tFeeDGyr6zruXy7pq10 |
linkProvider | Directory of Open Access Journals |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=MOBILE+CLOUD+COMPUTING+SERVICES+AUTHENTICATION+SCHEME&rft.jtitle=Iraqi+Journal+of+Information+%26+Communication+Technology&rft.au=A.+Abdulrahman%2C+Safana&rft.au=F.+Al-Gailani%2C+M.&rft.date=2022-12-30&rft.issn=2222-758X&rft.eissn=2789-7362&rft.volume=5&rft.issue=3&rft.spage=1&rft.epage=14&rft_id=info:doi/10.31987%2Fijict.5.3.201&rft.externalDBID=n%2Fa&rft.externalDocID=10_31987_ijict_5_3_201 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2222-758X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2222-758X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2222-758X&client=summon |