A Review on Mutual Authentication and Location Privacy in Mobile Cloud Computing

Authors

  • Rana K Department of Computer Science and Engineering, RITS, Bhopal, India
  • Yadav H Department of Computer Science and Engineering, RITS, Bhopal, India
  • Agrawal C Department of Computer Science and Engineering, RITS, Bhopal, India

DOI:

https://doi.org/10.26438/ijcse/v7i11.130134

Keywords:

Mobile Cloud Computing, Cloud Servers, Security, Smart Cards, Networking

Abstract

In this paper we have explained about the mobile computing features, limitations which are necessarily should know to us for the future enhancements over the services which are provided by the Cloud Servers (CS). A mobile computing is basically a combination of the cloud computing and the mobile devices whose combination provides us the services over cloud which includes: data storage, data security. Also in this paper our aim is to provide a robust anonymous mutual authentication schemes to provide the effective and the secure data access services to its users. The scheme which used will be helpful to replay attackers and will support creation, modification, to read the information which is put away in the cloud servers. This paper likewise addresses client renouncement. Besides, our verification and access control plot is decentralized and hearty, not at all like different access control plans intended for mists which are incorporated. The correspondence, calculation, and capacity overheads are practically identical to incorporated approaches.

References

[1] M. S. Hwang and L. H. Li, another remote client validation plot utilizing shrewd cards, IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 28–30, 2000.

[2] H. Flores and S. N. Srirama, "Versatile cloud middleware," JournalofSystemsandSoftware, http://dx.doi.org/10.1016/j.jss.2013.09.012.

[3] Bellovin S. M. what`s more, Merritt M. 1992. Encoded key trade Password-based conventions secure against word reference assaults. In Research in Security and Privacy. pp. 72-84.

[4] National Institute of Standard and Technology. The NIST meaning of distributed computing 2011. Accessible http//www.nist.gov/itl/cloud/transfer/cloud-def-v15.pdf>.

[5] H. T. Dinh, C. Lee, D. Niyato, and P.Wang,A review of versatile distributed computing design, applications, and approaches, Wireless interchanges and Mobile Computing, vol. 13, no. 18, pp. 1587–1611, 2013.

[6] Prosanta Gope and Ashok Kumar Das, IEEE Member, Robust Anonymous Mutual Authentication Scheme for n-times Ubiquitous Mobile Cloud Computing Services.

[7] Wong, C. K., Gouda, M., and Lam, S. S. (2000). Secure gathering interchanges utilizing key diagrams. IEEE/ACM exchanges on systems administration, 8(1), 16-30.

[8] Chen, J., and Ma, H. (2014, June). Productive decentralized attributebased get to control for distributed storage with client repudiation. In 2014 IEEE International Conference on Communications (ICC) (pp. 3782-3787). IEEE.

[9] Binbusayyis, An., and Zhang, N. (2015, June). Decentralized attributebased encryption plot with versatile renouncement for sharing information out in the open cloud servers. In Cloud Technologies and Applications (CloudTech), 2015 International Conference on (pp. 1-8). IEEE.

[10] Ganeshkumar, M., and Chow, S. S. (2009, November). Improving protection and security in multi-authority quality based encryption. In Proceedings of the sixteenth ACM meeting on Computer and correspondences security (pp. 121-130). ACM.

[11] Ruj, S., Stojmenovic, M., and Nayak, A. (2014). Decentralized access control with unknown validation of information put away in mists. IEEE exchanges on parallel and appropriated frameworks, 25(2), 384-394.

[12] Bharathy, S. D., and Ramesh, T. (2014). Verifying Data Stored in Clouds Using Privacy Preserving Authenticated Access Control. Proc. IJCSMC, 3(4), 1069-1074.

[13] Vijayalakshmi, An., and Arunapriya, R. (2014). Confirmation of information stockpiling utilizing decentralized access control in mists. Diary of Global Research in Computer Science, 5(9).

[14] Maharajanavar, S. Unknown Authentication of Decentralized Access Control of Data Stored in Cloud. Universal Journal on Recent and Innovation Trends in Computing and Communication ISSN, 2321-8169.

[15] Rescorla E. 1999. Diffie-Hellman key understanding technique.

[16] Leung, Chi-Hong, and Yuen-Yan Chan. "Versatile learning: another worldview in electronic learning." In Advanced learning innovations, 2003. Procedures. The third IEEE global gathering on, pp. 76-80. IEEE, 2003.

[17] Zhao, Weiqing, Yafei Sun, and Lijuan Dai. "Improving PC premise educating through portable correspondence and distributed computing innovation." In Advanced Computer Theory and Engineering (ICACTE), 2010 third International Conference on, vol. 1, pp. V1-452. IEEE, 2010.

[18] Yin, C., David, B. furthermore, Chalon, R., 2009, August. Utilize your portable processing gadgets to learn-Contextual versatile learning framework structure and contextual analyses. In Computer Science and Information Technology, 2009. ICCSIT 2009. second IEEE International Conference on (pp. 440-444). IEEE.

[19] K. Gai, M. Qiu, H. Zhao, L. Tao, and Z. Zong, "Dynamic energyaware cloudlet-based portable distributed computing model for green registering," Journal of Network and Computer Applications, vol. 59, 2016, pp.46-54, doi: http://dx.doi.org/10.1016/j.jnca.2015.05.016.

[20] A. Machen, S. Wang, K. K. Leung, B. J. Ko, and T. Salonidis, "Live Service Migration in Mobile Edge Clouds," IEEE Wireless Communications. Aug. 2017, on the web.

Downloads

Published

2019-11-30
CITATION
DOI: 10.26438/ijcse/v7i11.130134
Published: 2019-11-30

How to Cite

[1]
K. Rana, H. Yadav, and C. Agrawal, “A Review on Mutual Authentication and Location Privacy in Mobile Cloud Computing”, Int. J. Comp. Sci. Eng., vol. 7, no. 11, pp. 130–134, Nov. 2019.