A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication
Mobile cloud computing is an extension of cloud computing that allow the users to access the cloud service via their mobile devices. Although mobile cloud computing is convenient and easy to use, the security challenges are increasing significantly.One of the major issues is unauthorized access.Ide...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | http://repo.uum.edu.my/22874/1/ICOCI%202017%20426-434.pdf http://repo.uum.edu.my/22874/ http://icoci.cms.net.my/PROCEEDINGS/2017/Pdf_Version_Chap08e/PID113-426-434e.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uum.repo.22874 |
---|---|
record_format |
eprints |
spelling |
my.uum.repo.228742017-07-27T02:34:41Z http://repo.uum.edu.my/22874/ A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication Mohammed, Hamdun Mohamed Fati, Suliman Ponnusamy, Vasaki Ooi, Boon Yaik Annur, Robithoh Liew, Soung Yue QA75 Electronic computers. Computer science Mobile cloud computing is an extension of cloud computing that allow the users to access the cloud service via their mobile devices. Although mobile cloud computing is convenient and easy to use, the security challenges are increasing significantly.One of the major issues is unauthorized access.Identity Management enables to tackle this issue by protecting the identity of users and controlling access to resources. Although there are several IDM frameworks in place, they are vulnerable to attacks like timing attacks in OAuth, malicious code attack in OpenID and huge amount of information leakage when user’s identity is compromised in Single Sign-On. Our proposed framework implicitly authenticates a user based on user’s typing behavior.The authentication information is encrypted into homomorphic signature before being sent to IDM server and tokens are used to authorize users to access the cloud resources.Advantages of our proposed framework are: user’s identity protection and prevention from unauthorized access. 2017-04-25 Conference or Workshop Item PeerReviewed application/pdf en http://repo.uum.edu.my/22874/1/ICOCI%202017%20426-434.pdf Mohammed, Hamdun and Mohamed Fati, Suliman and Ponnusamy, Vasaki and Ooi, Boon Yaik and Annur, Robithoh and Liew, Soung Yue (2017) A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication. In: 6th International Conference on Computing & Informatics (ICOCI2017), 25 - 27 April 2017, Kuala Lumpur. http://icoci.cms.net.my/PROCEEDINGS/2017/Pdf_Version_Chap08e/PID113-426-434e.pdf |
institution |
Universiti Utara Malaysia |
building |
UUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Utara Malaysia |
content_source |
UUM Institutionali Repository |
url_provider |
http://repo.uum.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Mohammed, Hamdun Mohamed Fati, Suliman Ponnusamy, Vasaki Ooi, Boon Yaik Annur, Robithoh Liew, Soung Yue A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication |
description |
Mobile cloud computing is an extension of cloud computing that allow the users to access the cloud service via their mobile devices. Although
mobile cloud computing is convenient and easy to use, the security challenges are increasing significantly.One of the major issues is unauthorized access.Identity Management enables to tackle this issue by protecting the identity of users and controlling access to resources. Although there are several IDM frameworks in place, they are vulnerable to attacks like timing
attacks in OAuth, malicious code attack in OpenID and huge amount of information leakage when user’s identity is compromised in Single Sign-On.
Our proposed framework implicitly authenticates a user based on user’s typing behavior.The authentication information is encrypted into homomorphic signature before being sent to IDM server and tokens are used to authorize users to access the cloud resources.Advantages of our proposed framework are: user’s identity protection and prevention from unauthorized access. |
format |
Conference or Workshop Item |
author |
Mohammed, Hamdun Mohamed Fati, Suliman Ponnusamy, Vasaki Ooi, Boon Yaik Annur, Robithoh Liew, Soung Yue |
author_facet |
Mohammed, Hamdun Mohamed Fati, Suliman Ponnusamy, Vasaki Ooi, Boon Yaik Annur, Robithoh Liew, Soung Yue |
author_sort |
Mohammed, Hamdun |
title |
A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication |
title_short |
A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication |
title_full |
A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication |
title_fullStr |
A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication |
title_full_unstemmed |
A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication |
title_sort |
coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication |
publishDate |
2017 |
url |
http://repo.uum.edu.my/22874/1/ICOCI%202017%20426-434.pdf http://repo.uum.edu.my/22874/ http://icoci.cms.net.my/PROCEEDINGS/2017/Pdf_Version_Chap08e/PID113-426-434e.pdf |
_version_ |
1644283641624264704 |
score |
13.214268 |