A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication
Mobile cloud computing is an extension of cloud computing that allow the users to access the cloud service via their mobile devices. Although mobile cloud computing is convenient and easy to use, the security challenges are increasing significantly.One of the major issues is unauthorized access.Ide...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | http://repo.uum.edu.my/22874/1/ICOCI%202017%20426-434.pdf http://repo.uum.edu.my/22874/ http://icoci.cms.net.my/PROCEEDINGS/2017/Pdf_Version_Chap08e/PID113-426-434e.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Mobile cloud computing is an extension of cloud computing that allow the users to access the cloud service via their mobile devices. Although
mobile cloud computing is convenient and easy to use, the security challenges are increasing significantly.One of the major issues is unauthorized access.Identity Management enables to tackle this issue by protecting the identity of users and controlling access to resources. Although there are several IDM frameworks in place, they are vulnerable to attacks like timing
attacks in OAuth, malicious code attack in OpenID and huge amount of information leakage when user’s identity is compromised in Single Sign-On.
Our proposed framework implicitly authenticates a user based on user’s typing behavior.The authentication information is encrypted into homomorphic signature before being sent to IDM server and tokens are used to authorize users to access the cloud resources.Advantages of our proposed framework are: user’s identity protection and prevention from unauthorized access. |
---|