On-Demand Self-Service

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 6319464 Experts worldwide ranked by ideXlab platform

Ashok Kumar Das - One of the best experts on this subject based on the ideXlab platform.

  • robust anonymous mutual authentication scheme for n times ubiquitous mobile cloud computing services
    IEEE Internet of Things Journal, 2017
    Co-Authors: Prosanta Gope, Ashok Kumar Das
    Abstract:

    In recent years, mobile computing has gained a huge popularity among mobile users (MUs). It basically combines the mobile devices with the cloud computing. By the means of On-Demand Self-Service and extendibility, it can offer the infrastructures, platform, entertainments, and software services in a cloud to MUs through the mobile network. However, offering secure access to these services by preserving the privacy of the MU is indeed a challenge for any mobile cloud service provider. In this paper, we aim to propose a new robust anonymous mutual authentication scheme for mobile cloud environment. Through this scheme, both the MU and the service cloud need to prove their legitimacy, and it eventually helps the legitimate mobile cloud user to enjoy n times all the ubiquitous services in a secure and efficient way, where the value of n may differ based on the principal he/she has paid for. The security of the proposed scheme is thoroughly analyzed using both formal as well as informal security analysis. Furthermore, functionality and performance comparisons using the testbed simulation among the proposed scheme and other existing relevant schemes reveal that the proposed scheme outperforms other existing schemes.

Prosanta Gope - One of the best experts on this subject based on the ideXlab platform.

  • robust anonymous mutual authentication scheme for n times ubiquitous mobile cloud computing services
    IEEE Internet of Things Journal, 2017
    Co-Authors: Prosanta Gope, Ashok Kumar Das
    Abstract:

    In recent years, mobile computing has gained a huge popularity among mobile users (MUs). It basically combines the mobile devices with the cloud computing. By the means of On-Demand Self-Service and extendibility, it can offer the infrastructures, platform, entertainments, and software services in a cloud to MUs through the mobile network. However, offering secure access to these services by preserving the privacy of the MU is indeed a challenge for any mobile cloud service provider. In this paper, we aim to propose a new robust anonymous mutual authentication scheme for mobile cloud environment. Through this scheme, both the MU and the service cloud need to prove their legitimacy, and it eventually helps the legitimate mobile cloud user to enjoy n times all the ubiquitous services in a secure and efficient way, where the value of n may differ based on the principal he/she has paid for. The security of the proposed scheme is thoroughly analyzed using both formal as well as informal security analysis. Furthermore, functionality and performance comparisons using the testbed simulation among the proposed scheme and other existing relevant schemes reveal that the proposed scheme outperforms other existing schemes.

Keliang Zhou - One of the best experts on this subject based on the ideXlab platform.

  • Security and privacy in mobile cloud computing
    2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), 2013
    Co-Authors: Hui Suo, Zhuohua Liu, Jiafu Wan, Keliang Zhou
    Abstract:

    With the development of cloud computing and mobility, mobile cloud computing has emerged and become a focus of research. By the means of On-Demand Self-Service and extendibility, it can offer the infrastructure, platform, and software services in a cloud to mobile users through the mobile network. Security and privacy are the key issues for mobile cloud computing applications, and still face some enormous challenges. In order to facilitate this emerging domain, we firstly in brief review the advantages and system model of mobile cloud computing, and then pay attention to the security and privacy in the mobile cloud computing. By deeply analyzing the security and privacy issues from three aspects: mobile terminal, mobile network and cloud, we give the current security and privacy approaches.

Hui Suo - One of the best experts on this subject based on the ideXlab platform.

  • Security and privacy in mobile cloud computing
    2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), 2013
    Co-Authors: Hui Suo, Zhuohua Liu, Jiafu Wan, Keliang Zhou
    Abstract:

    With the development of cloud computing and mobility, mobile cloud computing has emerged and become a focus of research. By the means of On-Demand Self-Service and extendibility, it can offer the infrastructure, platform, and software services in a cloud to mobile users through the mobile network. Security and privacy are the key issues for mobile cloud computing applications, and still face some enormous challenges. In order to facilitate this emerging domain, we firstly in brief review the advantages and system model of mobile cloud computing, and then pay attention to the security and privacy in the mobile cloud computing. By deeply analyzing the security and privacy issues from three aspects: mobile terminal, mobile network and cloud, we give the current security and privacy approaches.

Zhuohua Liu - One of the best experts on this subject based on the ideXlab platform.

  • Security and privacy in mobile cloud computing
    2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), 2013
    Co-Authors: Hui Suo, Zhuohua Liu, Jiafu Wan, Keliang Zhou
    Abstract:

    With the development of cloud computing and mobility, mobile cloud computing has emerged and become a focus of research. By the means of On-Demand Self-Service and extendibility, it can offer the infrastructure, platform, and software services in a cloud to mobile users through the mobile network. Security and privacy are the key issues for mobile cloud computing applications, and still face some enormous challenges. In order to facilitate this emerging domain, we firstly in brief review the advantages and system model of mobile cloud computing, and then pay attention to the security and privacy in the mobile cloud computing. By deeply analyzing the security and privacy issues from three aspects: mobile terminal, mobile network and cloud, we give the current security and privacy approaches.