Authentication and Authorization Issues in Mobile Cloud Computing: A Case Study

Mobile Cloud Computing incorporates Cloud computing paradigma into the mobile environment, the set of technologies that enable to access network services anyplace, anytime and anywhere. This faces many technical challenges, such as low bandwidth, availability, heterogeneity, computing offloads, data accessing, security, privacy, and trust. In this paper the MCC security solution developed and applied within the STMicroelectronics plants is presented.

[1]  Keke Gai,et al.  A Novel Secure Big Data Cyber Incident Analytics Framework for Cloud-Based Cybersecurity Insurance , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).

[2]  Rajkumar Buyya,et al.  Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges , 2014, IEEE Communications Surveys & Tutorials.

[3]  Vincenza Carchiolo,et al.  Direct trust assignment using social reputation and aging , 2017, J. Ambient Intell. Humaniz. Comput..

[4]  Dobromir Todorov Mechanics of User Identification and Authentication: Fundamentals of Identity Management , 2007 .

[5]  Pascal Bouvry,et al.  Amazon Elastic Compute Cloud (EC2) vs. In-House HPC Platform: A Cost Analysis , 2016, 2016 IEEE 9th International Conference on Cloud Computing (CLOUD).

[6]  Nitin Gurbani Let’s Encrypt , 2015 .

[7]  Vincenza Carchiolo,et al.  The Cost of Trust in the Dynamics of Best Attachment , 2015, Comput. Informatics.

[8]  Martin Bean Laravel 5 Essentials , 2015 .

[9]  Mohammad Hammoudeh,et al.  Two Factor Vs Multi-factor, an Authentication Battle in Mobile Cloud Computing Environments , 2017, ICFNDS.

[10]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[11]  Vincenza Carchiolo,et al.  Exploiting Long Distance Connections to Strengthen Network Robustness , 2018, IDCS.

[12]  Dong-Sik Oh,et al.  A Study on Authentication System Using QR Code for Mobile Cloud Computing Environment , 2011 .

[13]  Young-Sik Jeong,et al.  An efficient authentication system of smart device using multi factors in mobile cloud service architecture , 2015, Int. J. Commun. Syst..

[14]  Jean-Marc Robert,et al.  Security and usability: the case of the user authentication methods , 2006, IHM '06.

[15]  Vincenza Carchiolo,et al.  Cloud in Mobile Platforms: Managing Authentication/Authorization , 2019, WorldCIST.

[16]  Li Yang,et al.  Entity authentication in a mobile-cloud environment , 2013, CSIIRW '13.

[17]  Mojtaba Alizadeh,et al.  Authentication in mobile cloud computing: A survey , 2016, J. Netw. Comput. Appl..

[18]  Drummond Reed,et al.  OpenID 2.0: a platform for user-centric identity management , 2006, DIM '06.

[19]  Dingjuan Wu,et al.  Robustness of Smart Manufacturing Information Systems under Conditions of Resource Failure: A Complex Network Perspective , 2018, IEEE Access.