Authentication Techniques for Mobile Cloud Computing and validates its Effectiveness

Conference: Recent Trends in Information Processing, Computing, Electrical and Electronics
Author(s): Rupali Tekade, Kiran Agrawal, Shishir K. Shandilya Year: 2017
Grenze ID: 02.IPCEE.2017.1.36 Page: 229-232

Abstract

Mobile Cloud Computing (MCC) consists wireless network, mobile device and cloud computing. In MCC the\ncomputation /storage resources of mobile device could capitalize using cloud server from different location via\ncommunication network. This untrusted communication network causes security and Authentication risk. Which needed a\neffective and powerful technique to overcome security breach problem. The objective of this paper is to study existing\nauthentication techniques for establish the secure communication session between mobile devices and cloud server. And\nstudy of a security protocol analyzer called scyther which validates the effectiveness of the authentication scheme. Scyther\nanalyzes a set of patterns and multi- protocol; it indicates the capability to protect from different security attacks such as manin-\nthe-middle, replay attacks, etc.

<< BACK

IPCEE - 2017