A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication

Mobile cloud computing is an extension of cloud computing that allow the users to access the cloud service via their mobile devices. Although mobile cloud computing is convenient and easy to use, the security challenges are increasing significantly.One of the major issues is unauthorized access.Ide...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohammed, Hamdun, Mohamed Fati, Suliman, Ponnusamy, Vasaki, Ooi, Boon Yaik, Annur, Robithoh, Liew, Soung Yue
Format: Conference or Workshop Item
Language:English
Published: 2017
Subjects:
Online Access:http://repo.uum.edu.my/22874/1/ICOCI%202017%20426-434.pdf
http://repo.uum.edu.my/22874/
http://icoci.cms.net.my/PROCEEDINGS/2017/Pdf_Version_Chap08e/PID113-426-434e.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Mobile cloud computing is an extension of cloud computing that allow the users to access the cloud service via their mobile devices. Although mobile cloud computing is convenient and easy to use, the security challenges are increasing significantly.One of the major issues is unauthorized access.Identity Management enables to tackle this issue by protecting the identity of users and controlling access to resources. Although there are several IDM frameworks in place, they are vulnerable to attacks like timing attacks in OAuth, malicious code attack in OpenID and huge amount of information leakage when user’s identity is compromised in Single Sign-On. Our proposed framework implicitly authenticates a user based on user’s typing behavior.The authentication information is encrypted into homomorphic signature before being sent to IDM server and tokens are used to authorize users to access the cloud resources.Advantages of our proposed framework are: user’s identity protection and prevention from unauthorized access.