Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing

The purpose of this project is to design and implement a framework that employs unique authentication method that relies on third party identification which is required to accurately identify and authenticate legitimate user in order to reduce the risk of disclosing confidential data to unauthorized...

Full description

Saved in:
Bibliographic Details
Main Authors: Lim, Tsu Chean, Ponnusamy, Vasaki, Sulaiman, Mohamed Fati
Format: Article
Language:English
Published: 2018
Subjects:
Online Access:http://eprints.intimal.edu.my/1183/1/water-10-00998%20%281%29.pdf
http://eprints.intimal.edu.my/1183/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-inti-eprints.1183
record_format eprints
spelling my-inti-eprints.11832018-10-18T09:50:05Z http://eprints.intimal.edu.my/1183/ Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing Lim, Tsu Chean Ponnusamy, Vasaki Sulaiman, Mohamed Fati QA75 Electronic computers. Computer science The purpose of this project is to design and implement a framework that employs unique authentication method that relies on third party identification which is required to accurately identify and authenticate legitimate user in order to reduce the risk of disclosing confidential data to unauthorized party in Mobile Cloud Computing, MCC. Cloud computing is a service provided for user to store and process their data online instead of local device. Mobile Cloud computing which is an extension of the cloud computing service allows user to remotely access their data and services that are being uploaded to the cloud beforehand in any place and any time as long as they have internet connection in their personal mobile device. Throughout the period of the mobile cloud computing era, the security has always been a concern and post as a formidable challenge even for experienced security specialist. Moreover, encryption method such as RSA and Diffie Hellman cryptosystem proven to be useless against the attacks launched by quantum computer. Hence, Homomorphic Signature scheme is introduced along with the Identity Management (IDM) server into the mobile cloud computing in order to address this issue by applying implicit authentication method to differentiate between the genuine and non-genuine user which allows system to authenticate the clients accurately. The details of the framework will be further explained later in this paper, where the user will be authenticated with IDM as medium and no password is used throughout the authentication process, allowing the client to be safely authenticated at the end of the process. 2018-04-28 Article PeerReviewed text en http://eprints.intimal.edu.my/1183/1/water-10-00998%20%281%29.pdf Lim, Tsu Chean and Ponnusamy, Vasaki and Sulaiman, Mohamed Fati (2018) Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing. 2018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE).
institution INTI International University
building INTI Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider INTI International University
content_source INTI Institutional Repository
url_provider http://eprints.intimal.edu.my
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Lim, Tsu Chean
Ponnusamy, Vasaki
Sulaiman, Mohamed Fati
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
description The purpose of this project is to design and implement a framework that employs unique authentication method that relies on third party identification which is required to accurately identify and authenticate legitimate user in order to reduce the risk of disclosing confidential data to unauthorized party in Mobile Cloud Computing, MCC. Cloud computing is a service provided for user to store and process their data online instead of local device. Mobile Cloud computing which is an extension of the cloud computing service allows user to remotely access their data and services that are being uploaded to the cloud beforehand in any place and any time as long as they have internet connection in their personal mobile device. Throughout the period of the mobile cloud computing era, the security has always been a concern and post as a formidable challenge even for experienced security specialist. Moreover, encryption method such as RSA and Diffie Hellman cryptosystem proven to be useless against the attacks launched by quantum computer. Hence, Homomorphic Signature scheme is introduced along with the Identity Management (IDM) server into the mobile cloud computing in order to address this issue by applying implicit authentication method to differentiate between the genuine and non-genuine user which allows system to authenticate the clients accurately. The details of the framework will be further explained later in this paper, where the user will be authenticated with IDM as medium and no password is used throughout the authentication process, allowing the client to be safely authenticated at the end of the process.
format Article
author Lim, Tsu Chean
Ponnusamy, Vasaki
Sulaiman, Mohamed Fati
author_facet Lim, Tsu Chean
Ponnusamy, Vasaki
Sulaiman, Mohamed Fati
author_sort Lim, Tsu Chean
title Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
title_short Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
title_full Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
title_fullStr Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
title_full_unstemmed Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
title_sort authentication scheme using unique identification method with homomorphic encryption in mobile cloud computing
publishDate 2018
url http://eprints.intimal.edu.my/1183/1/water-10-00998%20%281%29.pdf
http://eprints.intimal.edu.my/1183/
_version_ 1644541412854726656
score 13.211869