Secure Authentication Protocol for Efficient Computational Offloading Service in the Mobile Cloud Computing

被引:0
|
作者
Munivel, E. [1 ]
Kannammal, A. [1 ]
机构
[1] PSG Coll Technol, Dept Elect & Commun Engn, Coimbatore, Tamil Nadu, India
来源
JOURNAL OF INTERNET TECHNOLOGY | 2020年 / 21卷 / 02期
关键词
Authentication; Mobile cloud computing; Smartphone; Cloud server; Computational offloading; ARCHITECTURE;
D O I
10.3966/160792642020032102014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Battery-powered mobile devices are convenient to use anywhere and anytime. Nowadays maximum people using the mobile device, such as Smartphone, Tablet computers to use mobile services anytime and anywhere. Moreover, most of the Smartphone having wireless communication like Wi-Fi and 4G. For some applications, the requirement of computing power may be very high, but the actual configuration of mobile devices are very limited, such as CPU, memory, storage, and battery. Among these computational resources, bandwidth and battery are the most significant problems for Smartphone. Efficient Computational Offloading is the best solution for extending the usage of Smartphone by executing the resource-intensive task to offload from mobile to the remote cloud servers can extend processing capability and support for multiple categories of application. However, this technique is having difficulty in offloading the process to a remote cloud server without the proven security of entity verification. To deal with these challenges, here we are proposing new security protocol to authenticate mobile and cloud server with zero knowledge proof of authentication to verify the communication entities and recommends to offload the service. The proposed protocol will get verify by the University of Oxford developed verification tool Scyther.
引用
收藏
页码:457 / 467
页数:11
相关论文
共 50 条
  • [21] Efficient Computation Offloading Strategies for Mobile Cloud Computing
    Tao, Yaling
    Zhang, Yongbing
    Ji, Yusheng
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 626 - 633
  • [22] Dynamic Reciprocal Authentication Protocol for Mobile Cloud Computing
    Ahmed, Abdulghani Ali
    Wendy, Kwan
    Kabir, Muhammad Nomani
    Sadiq, Ali Safaa
    IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 727 - 737
  • [23] Offloading Service Provisioning on Mobile Devices in Mobile Cloud Computing Environments
    Conti, Marco
    Mascitti, Davide
    Passarella, Andrea
    EURO-PAR 2015: PARALLEL PROCESSING WORKSHOPS, 2015, 9523 : 299 - 310
  • [24] Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing
    Derhab, Abdelouahid
    Belaoued, Mohamed
    Guerroumi, Mohamed
    Khan, Farrukh Aslam
    IEEE ACCESS, 2020, 8 (08): : 28956 - 28969
  • [25] A Lightweight Distributed Framework for Computational Offloading in Mobile Cloud Computing
    Shiraz, Muhammad
    Gani, Abdullah
    Ahmad, Raja Wasim
    Shah, Syed Adeel Ali
    Karim, Ahmad
    Rahman, Zulkanain Abdul
    PLOS ONE, 2014, 9 (08):
  • [26] Computational Offloading for Mashup Services in Mobile Cloud Computing Environment
    Kaur, Kuljeet
    Kaur, Pankaj Deep
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2015, 8 (03): : 145 - 154
  • [27] A SECURE AUTHENTICATION SCHEME FOR MOBILE CLOUD COMPUTING AGAINST CCA
    Hossain, Md Jakir
    Xu, Chunxiang
    Li, Chuang
    2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2020, : 266 - 270
  • [28] Authentication Model for Mobile Cloud Computing Database Service
    Munir, Kashif
    CLOUD COMPUTING AND BIG DATA: TECHNOLOGIES, APPLICATIONS AND SECURITY, 2019, 49 : 35 - 48
  • [29] A secure and efficient authentication protocol for mobile RFID systems
    Sandhya, M.
    Rangaswamy, T.R.
    Journal of Digital Information Management, 2011, 9 (03): : 99 - 105
  • [30] Efficient task scheduling and computational offloading optimization with federated learning and blockchain in mobile cloud computing
    Fathima, G. Matheen
    Shakkeera, L.
    RESULTS IN CONTROL AND OPTIMIZATION, 2025, 18