Please use this identifier to cite or link to this item:
https://idr.l2.nitk.ac.in/jspui/handle/123456789/15110
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Madhusudhan R. | |
dc.contributor.author | Suvidha K.S. | |
dc.date.accessioned | 2021-05-05T10:16:27Z | - |
dc.date.available | 2021-05-05T10:16:27Z | - |
dc.date.issued | 2019 | |
dc.identifier.citation | Proceedings - 2019 8th IEEE International Conference on Cloud Computing in Emerging Markets, CCEM 2019 , Vol. , , p. 80 - 85 | en_US |
dc.identifier.uri | https://doi.org/10.1109/CCEM48484.2019.00017 | |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/15110 | - |
dc.description.abstract | Integration of mobile networks with cloud computing platform led to development of mobile cloud computing. Since the communication between mobile devices and the cloud computing occur over wireless medium, securing the network becomes paramount. With the thorough literature survey, we found that many two factor authentication schemes proposed so far to preserve user anonymity are vulnerable to various security attacks, they also had shortcomes to achieve security goals. To overcome the issues related to the two factor authentication schemes in mobile cloud computing, a new scheme is proposed. Furthermore, we have simulated the proposed scheme using widely accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool. With the simulated result of the proposed scheme, we show that the proposed scheme is secure against active and passive security attacks. Additionally, the proposed scheme is compared with Gope and Hwang's scheme and other related schemes in terms of computational cost and communication overhead. The proposed scheme is efficient, robust and suitable for practical implementation. © 2019 IEEE. | en_US |
dc.title | An Efficient Two Factor Authentication Scheme Providing Secure Communication in Mobile Cloud Computing | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.