Secure Authentication Protocol for Efficient Computational Offloading Service in the Mobile Cloud Computing

被引:0
|
作者
Munivel, E. [1 ]
Kannammal, A. [1 ]
机构
[1] PSG Coll Technol, Dept Elect & Commun Engn, Coimbatore, Tamil Nadu, India
来源
JOURNAL OF INTERNET TECHNOLOGY | 2020年 / 21卷 / 02期
关键词
Authentication; Mobile cloud computing; Smartphone; Cloud server; Computational offloading; ARCHITECTURE;
D O I
10.3966/160792642020032102014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Battery-powered mobile devices are convenient to use anywhere and anytime. Nowadays maximum people using the mobile device, such as Smartphone, Tablet computers to use mobile services anytime and anywhere. Moreover, most of the Smartphone having wireless communication like Wi-Fi and 4G. For some applications, the requirement of computing power may be very high, but the actual configuration of mobile devices are very limited, such as CPU, memory, storage, and battery. Among these computational resources, bandwidth and battery are the most significant problems for Smartphone. Efficient Computational Offloading is the best solution for extending the usage of Smartphone by executing the resource-intensive task to offload from mobile to the remote cloud servers can extend processing capability and support for multiple categories of application. However, this technique is having difficulty in offloading the process to a remote cloud server without the proven security of entity verification. To deal with these challenges, here we are proposing new security protocol to authenticate mobile and cloud server with zero knowledge proof of authentication to verify the communication entities and recommends to offload the service. The proposed protocol will get verify by the University of Oxford developed verification tool Scyther.
引用
收藏
页码:457 / 467
页数:11
相关论文
共 50 条
  • [41] A Secure User Authentication Protocol Based on ECC for Cloud Computing Environment
    Diksha Rangwani
    Hari Om
    Arabian Journal for Science and Engineering, 2021, 46 : 3865 - 3888
  • [42] A Study on the Critical Analysis of Computational Offloading Frameworks for Mobile Cloud Computing
    Shiraz, Muhammad
    Sookhak, Mehdi
    Gani, Abdullah
    Shah, Syed Adeel Ali
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 47 : 47 - 60
  • [43] Secure Authentication Protocol for Mobile
    Kalaichelvi, V.
    Chandrasekaran, R. M.
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 38 - +
  • [44] Lightweight deep learning model to secure authentication in Mobile Cloud Computing
    Zeroual, Abdelhakim
    Amroune, Mohamed
    Derdour, Makhlouf
    Bentahar, Atef
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (09) : 6938 - 6948
  • [45] An Enhanced Secure Authentication Scheme with User Anonymity in Mobile Cloud Computing
    Madhusudhan, R.
    Suvidha, K. S.
    2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 17 - 22
  • [46] SEBAP: A secure and efficient biometric-assisted authentication protocol using ECC for vehicular cloud computing
    Kumar, Vinod
    Ahmad, Musheer
    Kumari, Adesh
    Kumari, Saru
    Khan, M. K.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (02)
  • [47] Improved Identity Management Protocol for Secure Mobile Cloud Computing
    Park, In-Shin
    Lee, Yoon-Deock
    Jeong, Jonpil
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 4958 - 4965
  • [48] A provably secure lightweight authentication protocol in mobile edge computing environments
    Tsu-Yang Wu
    Qian Meng
    Lei Yang
    Xinglan Guo
    Saru Kumari
    The Journal of Supercomputing, 2022, 78 : 13893 - 13914
  • [49] A provably secure lightweight authentication protocol in mobile edge computing environments
    Wu, Tsu-Yang
    Meng, Qian
    Yang, Lei
    Guo, Xinglan
    Kumari, Saru
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (12): : 13893 - 13914
  • [50] Secure User Authentication in Cloud Computing
    Javaid, Zeeshan
    Ijaz, Imran
    PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013), 2013,