A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication

Mobile cloud computing is an extension of cloud computing that allow the users to access the cloud service via their mobile devices. Although mobile cloud computing is convenient and easy to use, the security challenges are increasing significantly.One of the major issues is unauthorized access.Ide...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohammed, Hamdun, Mohamed Fati, Suliman, Ponnusamy, Vasaki, Ooi, Boon Yaik, Annur, Robithoh, Liew, Soung Yue
Format: Conference or Workshop Item
Language:English
Published: 2017
Subjects:
Online Access:http://repo.uum.edu.my/22874/1/ICOCI%202017%20426-434.pdf
http://repo.uum.edu.my/22874/
http://icoci.cms.net.my/PROCEEDINGS/2017/Pdf_Version_Chap08e/PID113-426-434e.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uum.repo.22874
record_format eprints
spelling my.uum.repo.228742017-07-27T02:34:41Z http://repo.uum.edu.my/22874/ A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication Mohammed, Hamdun Mohamed Fati, Suliman Ponnusamy, Vasaki Ooi, Boon Yaik Annur, Robithoh Liew, Soung Yue QA75 Electronic computers. Computer science Mobile cloud computing is an extension of cloud computing that allow the users to access the cloud service via their mobile devices. Although mobile cloud computing is convenient and easy to use, the security challenges are increasing significantly.One of the major issues is unauthorized access.Identity Management enables to tackle this issue by protecting the identity of users and controlling access to resources. Although there are several IDM frameworks in place, they are vulnerable to attacks like timing attacks in OAuth, malicious code attack in OpenID and huge amount of information leakage when user’s identity is compromised in Single Sign-On. Our proposed framework implicitly authenticates a user based on user’s typing behavior.The authentication information is encrypted into homomorphic signature before being sent to IDM server and tokens are used to authorize users to access the cloud resources.Advantages of our proposed framework are: user’s identity protection and prevention from unauthorized access. 2017-04-25 Conference or Workshop Item PeerReviewed application/pdf en http://repo.uum.edu.my/22874/1/ICOCI%202017%20426-434.pdf Mohammed, Hamdun and Mohamed Fati, Suliman and Ponnusamy, Vasaki and Ooi, Boon Yaik and Annur, Robithoh and Liew, Soung Yue (2017) A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication. In: 6th International Conference on Computing & Informatics (ICOCI2017), 25 - 27 April 2017, Kuala Lumpur. http://icoci.cms.net.my/PROCEEDINGS/2017/Pdf_Version_Chap08e/PID113-426-434e.pdf
institution Universiti Utara Malaysia
building UUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Utara Malaysia
content_source UUM Institutionali Repository
url_provider http://repo.uum.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Mohammed, Hamdun
Mohamed Fati, Suliman
Ponnusamy, Vasaki
Ooi, Boon Yaik
Annur, Robithoh
Liew, Soung Yue
A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication
description Mobile cloud computing is an extension of cloud computing that allow the users to access the cloud service via their mobile devices. Although mobile cloud computing is convenient and easy to use, the security challenges are increasing significantly.One of the major issues is unauthorized access.Identity Management enables to tackle this issue by protecting the identity of users and controlling access to resources. Although there are several IDM frameworks in place, they are vulnerable to attacks like timing attacks in OAuth, malicious code attack in OpenID and huge amount of information leakage when user’s identity is compromised in Single Sign-On. Our proposed framework implicitly authenticates a user based on user’s typing behavior.The authentication information is encrypted into homomorphic signature before being sent to IDM server and tokens are used to authorize users to access the cloud resources.Advantages of our proposed framework are: user’s identity protection and prevention from unauthorized access.
format Conference or Workshop Item
author Mohammed, Hamdun
Mohamed Fati, Suliman
Ponnusamy, Vasaki
Ooi, Boon Yaik
Annur, Robithoh
Liew, Soung Yue
author_facet Mohammed, Hamdun
Mohamed Fati, Suliman
Ponnusamy, Vasaki
Ooi, Boon Yaik
Annur, Robithoh
Liew, Soung Yue
author_sort Mohammed, Hamdun
title A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication
title_short A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication
title_full A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication
title_fullStr A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication
title_full_unstemmed A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication
title_sort coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication
publishDate 2017
url http://repo.uum.edu.my/22874/1/ICOCI%202017%20426-434.pdf
http://repo.uum.edu.my/22874/
http://icoci.cms.net.my/PROCEEDINGS/2017/Pdf_Version_Chap08e/PID113-426-434e.pdf
_version_ 1644283641624264704
score 13.214268