CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Securing Data with Authentication in Mobile Cloud Environment: Methods, Models and Issues

by A. Cecil Donald, L. Arockiam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 94 - Number 1
Year of Publication: 2014
Authors: A. Cecil Donald, L. Arockiam
10.5120/16309-5537

A. Cecil Donald, L. Arockiam . Securing Data with Authentication in Mobile Cloud Environment: Methods, Models and Issues. International Journal of Computer Applications. 94, 1 ( May 2014), 25-29. DOI=10.5120/16309-5537

@article{ 10.5120/16309-5537,
author = { A. Cecil Donald, L. Arockiam },
title = { Securing Data with Authentication in Mobile Cloud Environment: Methods, Models and Issues },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 94 },
number = { 1 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 25-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume94/number1/16309-5537/ },
doi = { 10.5120/16309-5537 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:16:27.471853+05:30
%A A. Cecil Donald
%A L. Arockiam
%T Securing Data with Authentication in Mobile Cloud Environment: Methods, Models and Issues
%J International Journal of Computer Applications
%@ 0975-8887
%V 94
%N 1
%P 25-29
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Cloud Computing (MCC) is an emerging technology for mobile services gives new horizon to the IT industry and traditional Internet computing paradigm. It integrates the advantages of the cloud computing and the mobile communication environment. It also carries necessary issues related to Network Latency, Limited bandwidth, Availability, Heterogeneity, Privacy and Security, Computing Offloading and Data Access. But security is the main obstacles that obstruct cloud from being widely adopted. These concerns are originated from the public clouds as it holds the sensitive data in which the data owner hesitates to trust. It is so important to segregate assets logically and physically from one another which acts as a key to deploy security policies that address authentication and authorization issues. This paper discusses various security issues related to authentication and Identity Management and the way it works.

References
  1. L. Cheung and C. Newport, "Provably secure ciphertext policy abe", In Proceedings of the 14th ACM conference on Computer and communications security, ACM, 2007, pp 456–465.
  2. D. H. Bae, "A Study on the Revision of the 'Personal Information Protection Act' and its Related Acts", Research of IT and Law, vol. 6, (2012) February, pp. 1-261
  3. http://www. logicworks. net/blog/2013/09/whos-cloud-13-2013/?utm_source=IL&utm_medium=Social&utm_campaign=WhosWho9. 13. 2013#%21
  4. http://gcn. com/Articles/2013/Cloud_BYOD_enterprise_ authentication. aspx?Page=3#
  5. M'Raihi D, Bellare M, Hoornaert F, Naccache D, Ranen O (2005) HOTP: an HMAC-based one-time password algorithm. Internet Engineering Task Force, RFC 4226, 2005.
  6. Soeung-Kon Victor Ko, Jung- Hoon Le and Sung Woo Kim, "Mobile Cloud Computing Security Considerations", April 30, 2012.
  7. Hong T. Dinh, DusitNiyato, Ping Wang and Chonho Lee," A Survey of Mobile Cloud Computing: Architecture, Applications and Approaches", http://onlinelibrary. wiley. com
  8. http://cloudsecurity. techtarget. com/tip/Password-based-authentication-A-weak-link-in-cloud-authentication
  9. Dan Griffin and Tom Jones, "Designing a Cloud Based Mobile Application for Compliance", In Proc. of security TechCenter, October, 2013.
  10. Reza Rahimi, Jian Ren, Chi Harold Liu, Athanasios V. Vasilakos, NaliniVenkatasubramanian, "Mobile Cloud Computing: A Survey, State of Art and Future Directions", Proceedings of Mobile Network Applicatons, Springer, 2013, DOI 10. 1007/s11036-013-0477-4.
  11. Xiao, W. Gong, Mobility can help: protect user identity with dynamic credential, in: Proc. 11th Int. Conference on Mobile Data Management, MDM '10, Missouri, USA, May 2010.
  12. Donald, A. Cecil, S. Arul Oli, and L. Arockiam. "Mobile Cloud Security Issues and Challenges: A Perspective. " International Journal of Electronics and Information Technology (IJEIT), ISSN (2013): 2277-3754.
  13. JiSoo Park, Ki Jung Yi and Jong Hyuk Park, "SSP-MCloud: A Study on Security Service Protocol for Smartphone Centric Mobile Cloud Computing", Journal of IT Convergence and Services, Springer 2012, DOI: 10. 1007/978-94-007-2598-0_18, pp. 165-172.
  14. Chunhua Chen, Chris J. Mitchell and Shaohua Tang, "Ubiquitous One-Time Password Service Using the Generic Authentication Architecture", International Journal of Mobile Networking Applications, Springer, 2013, pp. 738-747.
  15. http://www. h-online. com/security/news/item/Three critical-vulnerabilities-in-Kerberos-network-authentication-732601. html.
  16. C. Wang, S. Yu, K. Ren, and W. Lou, "Achieving secure, scalable and ?ne-grained data access control in cloud computing", In Proc. of INFOCOM, IEEE, 2011, pp. 534–54.
  17. Richard Chow, Markus Jakobsson, Yuan Niu, Elaine Shi, Yuan Niu, Zhexuan Song,"Authentication in the Clouds: A Framework and its Application to Mobile Users",CCSW'10, ACM, 2010, 978-1-4503-0089-6/10/10, pp. 1-6.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Cloud Computing (MCC) Security Identity Access Control Authentication