Open Access   Article Go Back

A Review on Mutual Authentication and Location Privacy in Mobile Cloud Computing

Karuna Rana1 , Himanshu Yadav2 , Chetan Agrawal3

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-11 , Page no. 130-134, Nov-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i11.130134

Online published on Nov 30, 2019

Copyright © Karuna Rana, Himanshu Yadav, Chetan Agrawal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Karuna Rana, Himanshu Yadav, Chetan Agrawal, “A Review on Mutual Authentication and Location Privacy in Mobile Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.11, pp.130-134, 2019.

MLA Style Citation: Karuna Rana, Himanshu Yadav, Chetan Agrawal "A Review on Mutual Authentication and Location Privacy in Mobile Cloud Computing." International Journal of Computer Sciences and Engineering 7.11 (2019): 130-134.

APA Style Citation: Karuna Rana, Himanshu Yadav, Chetan Agrawal, (2019). A Review on Mutual Authentication and Location Privacy in Mobile Cloud Computing. International Journal of Computer Sciences and Engineering, 7(11), 130-134.

BibTex Style Citation:
@article{Rana_2019,
author = {Karuna Rana, Himanshu Yadav, Chetan Agrawal},
title = {A Review on Mutual Authentication and Location Privacy in Mobile Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2019},
volume = {7},
Issue = {11},
month = {11},
year = {2019},
issn = {2347-2693},
pages = {130-134},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4955},
doi = {https://doi.org/10.26438/ijcse/v7i11.130134}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i11.130134}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4955
TI - A Review on Mutual Authentication and Location Privacy in Mobile Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Karuna Rana, Himanshu Yadav, Chetan Agrawal
PY - 2019
DA - 2019/11/30
PB - IJCSE, Indore, INDIA
SP - 130-134
IS - 11
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
442 335 downloads 243 downloads
  
  
           

Abstract

In this paper we have explained about the mobile computing features, limitations which are necessarily should know to us for the future enhancements over the services which are provided by the Cloud Servers (CS). A mobile computing is basically a combination of the cloud computing and the mobile devices whose combination provides us the services over cloud which includes: data storage, data security. Also in this paper our aim is to provide a robust anonymous mutual authentication schemes to provide the effective and the secure data access services to its users. The scheme which used will be helpful to replay attackers and will support creation, modification, to read the information which is put away in the cloud servers. This paper likewise addresses client renouncement. Besides, our verification and access control plot is decentralized and hearty, not at all like different access control plans intended for mists which are incorporated. The correspondence, calculation, and capacity overheads are practically identical to incorporated approaches.

Key-Words / Index Term

Mobile Cloud Computing, Cloud Servers, Security, Smart Cards, Networking

References

[1] M. S. Hwang and L. H. Li, another remote client validation plot utilizing shrewd cards, IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 28–30, 2000.
[2] H. Flores and S. N. Srirama, "Versatile cloud middleware," JournalofSystemsandSoftware, http://dx.doi.org/10.1016/j.jss.2013.09.012.
[3] Bellovin S. M. what`s more, Merritt M. 1992. Encoded key trade Password-based conventions secure against word reference assaults. In Research in Security and Privacy. pp. 72-84.
[4] National Institute of Standard and Technology. The NIST meaning of distributed computing 2011. Accessible http//www.nist.gov/itl/cloud/transfer/cloud-def-v15.pdf>.
[5] H. T. Dinh, C. Lee, D. Niyato, and P.Wang,A review of versatile distributed computing design, applications, and approaches, Wireless interchanges and Mobile Computing, vol. 13, no. 18, pp. 1587–1611, 2013.
[6] Prosanta Gope and Ashok Kumar Das, IEEE Member, Robust Anonymous Mutual Authentication Scheme for n-times Ubiquitous Mobile Cloud Computing Services.
[7] Wong, C. K., Gouda, M., and Lam, S. S. (2000). Secure gathering interchanges utilizing key diagrams. IEEE/ACM exchanges on systems administration, 8(1), 16-30.
[8] Chen, J., and Ma, H. (2014, June). Productive decentralized attributebased get to control for distributed storage with client repudiation. In 2014 IEEE International Conference on Communications (ICC) (pp. 3782-3787). IEEE.
[9] Binbusayyis, An., and Zhang, N. (2015, June). Decentralized attributebased encryption plot with versatile renouncement for sharing information out in the open cloud servers. In Cloud Technologies and Applications (CloudTech), 2015 International Conference on (pp. 1-8). IEEE.
[10] Ganeshkumar, M., and Chow, S. S. (2009, November). Improving protection and security in multi-authority quality based encryption. In Proceedings of the sixteenth ACM meeting on Computer and correspondences security (pp. 121-130). ACM.
[11] Ruj, S., Stojmenovic, M., and Nayak, A. (2014). Decentralized access control with unknown validation of information put away in mists. IEEE exchanges on parallel and appropriated frameworks, 25(2), 384-394.
[12] Bharathy, S. D., and Ramesh, T. (2014). Verifying Data Stored in Clouds Using Privacy Preserving Authenticated Access Control. Proc. IJCSMC, 3(4), 1069-1074.
[13] Vijayalakshmi, An., and Arunapriya, R. (2014). Confirmation of information stockpiling utilizing decentralized access control in mists. Diary of Global Research in Computer Science, 5(9).
[14] Maharajanavar, S. Unknown Authentication of Decentralized Access Control of Data Stored in Cloud. Universal Journal on Recent and Innovation Trends in Computing and Communication ISSN, 2321-8169.
[15] Rescorla E. 1999. Diffie-Hellman key understanding technique.
[16] Leung, Chi-Hong, and Yuen-Yan Chan. "Versatile learning: another worldview in electronic learning." In Advanced learning innovations, 2003. Procedures. The third IEEE global gathering on, pp. 76-80. IEEE, 2003.
[17] Zhao, Weiqing, Yafei Sun, and Lijuan Dai. "Improving PC premise educating through portable correspondence and distributed computing innovation." In Advanced Computer Theory and Engineering (ICACTE), 2010 third International Conference on, vol. 1, pp. V1-452. IEEE, 2010.
[18] Yin, C., David, B. furthermore, Chalon, R., 2009, August. Utilize your portable processing gadgets to learn-Contextual versatile learning framework structure and contextual analyses. In Computer Science and Information Technology, 2009. ICCSIT 2009. second IEEE International Conference on (pp. 440-444). IEEE.
[19] K. Gai, M. Qiu, H. Zhao, L. Tao, and Z. Zong, "Dynamic energyaware cloudlet-based portable distributed computing model for green registering," Journal of Network and Computer Applications, vol. 59, 2016, pp.46-54, doi: http://dx.doi.org/10.1016/j.jnca.2015.05.016.
[20] A. Machen, S. Wang, K. K. Leung, B. J. Ko, and T. Salonidis, "Live Service Migration in Mobile Edge Clouds," IEEE Wireless Communications. Aug. 2017, on the web.