A Review on Mutual Authentication and Location Privacy in Mobile Cloud Computing

2019 ◽  
Vol 7 (11) ◽  
pp. 130-134
Author(s):  
Karuna Rana ◽  
Himanshu Yadav ◽  
Chetan Agrawal
2019 ◽  
Vol 2019 ◽  
pp. 1-11 ◽  
Author(s):  
Munivel E ◽  
Kannammal A

A phishing attack is one of the severe threats to the smartphone users. As per the recent lookout report, mobile phishing attack is increasing 85% year to year and going to become a significant threat to the smartphone users. This social engineering attack attempts to get the user’s password by disguising as trusted service provider. Most of the smartphone users are using the Internet services outside of the traditional firewall. Cloud-based documents are one of the primary targets of this phishing attack in mobile cloud computing. Also, most smartphone users are using the cloud storage in their device. To secure against this password attack in a mobile cloud environment, we propose a new authentication scheme to provide novel security to the mobile cloud services. This scheme will verify the user and service provider without transmitting the password using the Zero-knowledge proof based authentication protocol. Moreover, the proposed scheme will provide mutual authentication between the communication entities. The effectiveness of proposed scheme would be verified using protocol verification tool called Scyther.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 28956-28969 ◽  
Author(s):  
Abdelouahid Derhab ◽  
Mohamed Belaoued ◽  
Mohamed Guerroumi ◽  
Farrukh Aslam Khan

2019 ◽  
Vol 49 ◽  
pp. 101522 ◽  
Author(s):  
Subramani Jegadeesan ◽  
Maria Azees ◽  
Priyan Malarvizhi Kumar ◽  
Gunasekaran Manogaran ◽  
Naveen Chilamkurti ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document