A 3-LEVEL MULTIFACTOR AUTHENTICATION SCHEME FOR CLOUD COMPUTING
نویسندگان
چکیده
منابع مشابه
A Lightweight Authentication Scheme for Mobile Cloud Computing
The ABI Research believes that the number of mobile cloud computing users is expected to grow from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total mobile users) in 2014. The security risks have become a hurdle in the rapid adaptability of the mobile cloud computing technology. Significant efforts have been devoted in research organizations and academia to securing...
متن کاملSESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملPrivacy Aware Authentication Scheme for Distributed Mobile Cloud Computing
As mobile users generally access different types of mobile cloud computing services from a variety of service providers, it is extremely tedious for users to register different user accounts on each service provider and maintain corresponding private keys or passwords for authentication usage. In this paper, I propose a encryption method call Attribute encryption method. Cloud computing is a re...
متن کاملAn Efficient Authentication Scheme for Mobile Cloud Computing Services
The explosive growth of mobile users has been increasing in the past few years. In this paper, an efficient authentication scheme for distributed mobile cloud computing is proposed. This proposed scheme enables the users to access multiple service providers with a single private key. Instead of opting traditional public key cryptosystem like RSA, the proposed scheme uses bilinear pairing techni...
متن کاملMultifactor Authentication Scheme for Wireless H.264/AVC Video Streaming
Wireless communication channels are grown tremendously. Multimedia applications are using different wireless communication channels. Multimedia content verification and endorsement has become a rising issue for continuous video streaming. Especially this is a major issue over lossy/congested networks, which refers the network gives a lot of Timeout errors when packets are transmitted over it. E...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY
سال: 2019
ISSN: 0976-6375,0976-6367
DOI: 10.34218/ijcet.10.1.2019.020