Mobile Cloud Computing Authentication: Methods and Techniques with Capabilities, Limitations

Authors

  • Shinde MA Dept. of Computer Science & Information Technology Rajarshi Shahu Mahavidyalaya, Latur (Autonomous) Maharashtra, India
  • Ramesh JS Dept. of Computer Science & Information Technology Rajarshi Shahu Mahavidyalaya, Latur (Autonomous) Maharashtra, India

DOI:

https://doi.org/10.26438/ijcse/v6i12.547552

Keywords:

cloud computing, mobile cloud computing, authentication techniques

Abstract

Today the capabilities of mobile devices have improved real world user friendly applications, storage and feature support. The storage capacity can tremendously be increased with the use of cloud computing. Cloud computing is a flexible, cost effective and proven delivery platform for providing services. Mobile cloud computing means the availability of cloud computing services in a mobile environment. There are various authentication techniques being used like password, log off system, Biometric techniques. This process serves as a protection against different sorts of attacks where the goal is to confirm the identity of a user and the user requests services from cloud servers. Multiple authentication technologies have been put forward so far that confirm user identity before giving the permit to access resources. Authentication in cloud was fully explained in this paper together with the existing methods and the factors with its limitations.

References

[1] Yogesh patel, Nidhi sethi, “Enhancing Security in Cloud Computing using Multilevel Authentication”,International Journal of Electrical and Electronics & computer Science Engineering, Vol. 1, Issue 1, February 2014, ISSN: 2348-2273, pp. 320-325.

[2] DeeptiSahu, Shipra Sharma, VandanaDubey, AlpikaTripathi” Cloud Computing in Mobile Applications”InternationalJournal of Scientific and Research Publications, Volume 2,Issue 8, August 2012.

[3] Wikipedia, http://en.wikipedia.org/wiki/MCC_stored data.

[4] Her Tyan Yeh, Bing chang chen, Yi-cong wu, “Mobile user Authentication System in Cloud Environment”,International Journal of Security and Communication Networks, November 2012, pp. 74-79.

[5] Indrajit Das, Riya Das, “Mobile Security (OTP) by Cloud Computing”, International Journal of Innovations in Engineering and Technology (IJIET), Vol. 2, Issue 4, August 2013, ISSN: 2319-1058, pp. 114-118.

[6] Mahnoush Babau Zadeh, Majit Bhaktiari, Mohol Aizaini Maar, “Keystroke Dynamic Authentication in Mobile Cloud Computing”, International Journal of Computer Applications, Vol. 90, No.1, March 2014, ISSN: 0975-8887, pp. 35-39.

[7] Jin mookkim, Jeong-Kyung moon, “Secure Authentication System for Hybrid Cloud service in Mobile Communication Environments”, International Journal of Distributed Sensor Networks, Vol. 2, July 2014, pp. 62-66.

[8] Davit Hakobyan, “Authentication and Authorization Systems in Cloud Environments, International Journal of Information and Communication Technology, Vol. 4, Issue 5, October 2012, pp. 165-169.

[9] Richard Chaw, Markus Jakobsson, Ryusuke Arasuoka, “Authentication in the Clouds: A Framework and its Application to Mobile Users”, CCSW, ACM, October 2012, pp. 352-358.

[10] R. Gokaj, M. Ali Aydin, R, Selami Z bey, “Mobile Cloud Authentication and Secure Communication”, In Proc. of International Conference on Information Security and Cryptology, September 2013, pp. 42-45.

[11] Google books accessed via,http://books.google.com (2016)

[12] R. W. Lucky, “Cloud computing”, IEEE Journal of Spectrum, Vol. 46, No. 5, May 2009, pages 27-45.

[13] cloud computing, www.wikipedia.com.

[14]http://www.crn.com/news/cloud/231900862/box-net-one-ups-apple-icloud-with-50-gb-free-cloud-storage.htm

Downloads

Published

2018-12-31
CITATION
DOI: 10.26438/ijcse/v6i12.547552
Published: 2018-12-31

How to Cite

[1]
M. A. Shinde and J. S. Ramesh, “Mobile Cloud Computing Authentication: Methods and Techniques with Capabilities, Limitations”, Int. J. Comp. Sci. Eng., vol. 6, no. 12, pp. 547–552, Dec. 2018.

Issue

Section

Research Article