Efficient Hierarchical Multi-Server Authentication Protocol For Mobile Cloud Computing
نویسندگان
چکیده
منابع مشابه
An Efficient Authentication Scheme for Mobile Cloud Computing Services
The explosive growth of mobile users has been increasing in the past few years. In this paper, an efficient authentication scheme for distributed mobile cloud computing is proposed. This proposed scheme enables the users to access multiple service providers with a single private key. Instead of opting traditional public key cryptosystem like RSA, the proposed scheme uses bilinear pairing techni...
متن کاملAn Efficient Authentication Protocol Supporting Privacy in Mobile Computing Environments
The anticipated increase in mobility and popular use of the mobile services will require more technologies for authenticating mobile hosts and protecting their privacy. However, the issues such as privacy and confidentiality in mobile computing environments and the resource restriction of mobile hosts have not been given enough consideration. In this paper, we present an authentication protocol...
متن کاملAn efficient authentication protocol for mobile communications
In this paper, a new Global System of Mobile Communications (GSM) authentication protocol is proposed to improve some drawbacks of the current GSM authentication protocol for roaming users including: (a) communication overhead between VLR; (b) huge bandwidth consumption between VLR and HLR; (c) storage space overhead in VLR; (d) overloaded in HLR with authentication of mobile stations; and (e) ...
متن کاملAn Efficient Authentication Protocol for Mobile Networks
Many existing authentication protocols supporting inter-domain authentication on the Internet require their clients to communicate with every involved key distribution center (KDC) directly. This is inefficient and costly when the client side is a wireless mobile unit, for wireless transmission has relatively lower bandwidth, and a mobile unit is battery powered. In this paper, we present a mob...
متن کاملA novel multi-server authentication protocol
Recently, Tsai and Hsiang et al. each proposed a multi-server authentication protocol. They claimed their protocols are secure and can withstand various attacks. However, after our analysis, we found some security loopholes in each protocol. We will first show the attacks on their schemes and then present ours. After the security analysis, we conclude that our scheme is the most secure one amon...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers, Materials & Continua
سال: 2020
ISSN: 1546-2226
DOI: 10.32604/cmc.2020.09758