Authentication in mobile cloud computing: A survey

Mobile cloud computing (MCC) is the state-of-the-art mobile distributed computing model that incorporates multitude of heterogeneous cloud-based resources to augment computational capabilities of the plethora of resource-constraint mobile devices. In MCC, execution time and energy consumption are significantly improved by transferring execution of resource-intensive tasks such as image processing, 3D rendering, and voice recognition from the hosting mobile to the cloud-based resources. However, accessing and exploiting remote cloud-based resources is associated with numerous security and privacy implications, including user authentication and authorization. User authentication in MCC is a critical requirement in securing cloud-based computations and communications. Despite its critical role, there is a gap for a comprehensive study of the authentication approaches in MCC which can provide a deep insight into the state-of-the-art research. This paper presents a comprehensive study of authentication methods in MCC to describe MCC authentication and compare it with that of cloud computing. The taxonomy of the state-of-the-art authentication methods is devised and the most credible efforts are critically reviewed. Moreover, we present a comparison of the state-of-the-art MCC authentication methods considering five evaluation metrics. The results suggest the need for futuristic authentication methods that are designed based on capabilities and limitations of MCC environment. Finally, the design factors deemed could lead to effective authentication mechanisms are presented, and open challenges are highlighted based on the weaknesses and strengths of existing authentication methods.

[1]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[2]  Weibo Gong,et al.  Mobility Can Help: Protect User Identity with Dynamic Credential , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[3]  Mohsen Guizani,et al.  Mobile application security: malware threats and defenses , 2015, IEEE Wireless Communications.

[4]  Ilias Maglogiannis,et al.  Mobile healthcare information management utilizing Cloud Computing and Android OS , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.

[5]  Michele Nogueira Lima,et al.  Interoperability issues on heterogeneous wireless communication for smart cities , 2015, Comput. Commun..

[6]  Athanasios V. Vasilakos,et al.  MuSIC: Mobility-Aware Optimal Service Allocation in Mobile Cloud Computing , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.

[7]  Ben Adida,et al.  Beamauth: two-factor web authentication with a bookmark , 2007, CCS '07.

[8]  Ejaz Ahmed,et al.  A review on remote data auditing in single cloud server: Taxonomy and open issues , 2014, J. Netw. Comput. Appl..

[9]  Sarbjeet Singh,et al.  Design and Implementation of Multi-tier Authentication Scheme in Cloud , 2012 .

[10]  P. Mell,et al.  SP 800-145. The NIST Definition of Cloud Computing , 2011 .

[11]  S. Kotani,et al.  TrustCube: An Infrastructure that Builds Trust in Client , 2009 .

[12]  Hyung-Jong Kim,et al.  The Study on A Threat Countermeasure of Mobile Cloud Services , 2011 .

[13]  Jong Hyuk Park,et al.  SSP-MCloud: A Study on Security Service Protocol for Smartphone Centric Mobile Cloud Computing , 2011 .

[14]  Muhammad Shiraz,et al.  MOMCC: Market-oriented architecture for Mobile Cloud Computing based on Service Oriented Architecture , 2012, 2012 1st IEEE International Conference on Communications in China Workshops (ICCC).

[15]  Luiz A. DaSilva,et al.  Authentication protocols for ad hoc networks: taxonomy and research issues , 2005, Q2SWinet '05.

[16]  Dennis G. Shea,et al.  Cloud Service Portal for Mobile Device Management , 2010, 2010 IEEE 7th International Conference on E-Business Engineering.

[17]  Jun Zhang,et al.  A Remote Monitoring System Based on Measuring Instrument Cloud , 2014 .

[18]  Chin-Chen Chang,et al.  Enhanced authentication scheme with anonymity for roaming service in global mobility networks , 2009, Comput. Commun..

[19]  Sebti Foufou,et al.  Cloud-Ready Biometric System for Mobile Security Access , 2012, NDT.

[20]  Anh Duc Duong,et al.  Robust Mobile Device Integration of a Fingerprint Biometric Remote Authentication Scheme , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.

[21]  Marco Mariotti,et al.  The Response of Durum Wheat to the Preceding Crop in a Mediterranean Environment , 2014, TheScientificWorldJournal.

[22]  Yunheung Paek,et al.  Techniques to Minimize State Transfer Costs for Dynamic Execution Offloading in Mobile Cloud Computing , 2014, IEEE Transactions on Mobile Computing.

[23]  Yong Wang,et al.  Smartphone Security Challenges , 2012, Computer.

[24]  Shu Ching Wang,et al.  Security of Cloud Computing Lightweight Authentication Protocol , 2013 .

[25]  Sangmin Seo,et al.  A study of secure data transmissions in mobile cloud computing from the energy consumption side , 2013, The International Conference on Information Networking 2013 (ICOIN).

[26]  Jonathan Loo,et al.  Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR , 2014, Int. J. Commun. Syst..

[27]  Ramesh Govindan,et al.  Odessa: enabling interactive perception applications on mobile devices , 2011, MobiSys '11.

[28]  Mauro Conti,et al.  An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments , 2014, IEEE Transactions on Services Computing.

[29]  Tristan Henderson,et al.  MobOCloud: extending cloud computing with mobile opportunistic networks , 2013, CHANTS '13.

[30]  Rajkumar Buyya,et al.  Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges , 2013, IEEE Communications Surveys & Tutorials.

[31]  Iehab Al Rassan,et al.  Securing Mobile Cloud Computing Using Biometric Authentication (SMCBA) , 2014, 2014 International Conference on Computational Science and Computational Intelligence.

[32]  Yen-Chieh Ouyang,et al.  Secure data transmission with cloud computing in heterogeneous wireless networks , 2012, Secur. Commun. Networks.

[33]  Mojtaba Alizadeh,et al.  Challenges and opportunities of Mobile Cloud Computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[34]  Mauro Conti,et al.  I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics , 2014, DIMVA.

[35]  Hyotaek Lim,et al.  An Analysis of Security System for Intrusion in Smartphone Environment , 2014, TheScientificWorldJournal.

[36]  M. Anwar Hasan,et al.  Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems , 2013, IEEE Transactions on Parallel and Distributed Systems.

[37]  Dong Hoon Lee,et al.  Anonymous and Traceable Authentication Scheme using Smart Cards , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[38]  Rolf Oppliger,et al.  Authentication and authorization infrastructures (AAIs): a comparative survey , 2004, Comput. Secur..

[39]  Bin Ma,et al.  Risk-aware vertical handoff algorithm for security access support in heterogeneous wireless networks , 2012, 2012 5th International Conference on BioMedical Engineering and Informatics.

[40]  Li Xu,et al.  Software Service Signature (S3) for authentication in cloud computing , 2013, Cluster Computing.

[41]  Xiang Zou,et al.  Desktop Cloud-Based Research on Unified Authentication Architecture , 2012, 2012 Spring Congress on Engineering and Technology.

[42]  Pin-Han Ho,et al.  PPAB: A Privacy-Preserving Authentication and Billing Architecture for Metropolitan Area Sharing Networks , 2009, IEEE Transactions on Vehicular Technology.

[43]  Amala V. Rajan,et al.  Cloud and mobile computing: Affordances of the 21st century teaching and learning , 2013, 2013 International Conference on Current Trends in Information Technology (CTIT).

[44]  Wei Jiang,et al.  An Identity-Based Authentication Scheme in Cloud Computing , 2012, 2012 International Conference on Industrial Control and Electronics Engineering.

[45]  Christian Esposito,et al.  On Security in Publish/Subscribe Services: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[46]  Zhang Yanhua,et al.  QoS-aware dynamic resource management in heterogeneous mobile cloud computing networks , 2014, China Communications.

[47]  Sandeep K. Sood,et al.  A combined approach to ensure data security in cloud computing , 2012, J. Netw. Comput. Appl..

[48]  Emiliano Miluzzo,et al.  A survey of mobile phone sensing , 2010, IEEE Communications Magazine.

[49]  Sheng Li,et al.  Design and Implementation of the Web Content Adaptation for Intelligent Tourism Cloud Platform , 2012 .

[50]  Oscar Mauricio Serrano Jaimes,et al.  EVALUACION DE LA USABILIDAD EN SITIOS WEB, BASADA EN EL ESTANDAR ISO 9241-11 (International Standard (1998) Ergonomic requirements For office work with visual display terminals (VDTs)-Parts II: Guidance on usability , 2012 .

[51]  Mohsen Guizani,et al.  User privacy and data trustworthiness in mobile crowd sensing , 2015, IEEE Wireless Communications.

[52]  Jingsha He,et al.  A Service-oriented Identity Authentication Privacy Protection Method in Cloud Computing , 2013 .

[53]  Zeyu Gao,et al.  NemoAuth: A mnemonic multimodal approach to mobile user authentication , 2013, 2013 IEEE International Conference of IEEE Region 10 (TENCON 2013).

[54]  Ming-Yen Lin,et al.  Secure cloud storage for convenient data archive of smart phones , 2011, 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE).

[55]  Rajkumar Buyya,et al.  Application partitioning algorithms in mobile cloud computing: Taxonomy, review and future directions , 2015, J. Netw. Comput. Appl..

[56]  Wei Ren,et al.  Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing , 2011 .

[57]  Debasish Jana,et al.  Efficient management of security and privacy issues in mobile cloud environment , 2013, 2013 Annual IEEE India Conference (INDICON).

[58]  Qiaoyan Wen,et al.  Design of Security Solution to Mobile Cloud Storage , 2012 .

[59]  Susan Morrow,et al.  Data Security in the Cloud , 2011 .

[60]  Steven Furnell,et al.  Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices , 2002, Comput. Secur..

[61]  Shaheed Zulfikar,et al.  Security Issues and Challenges of Mobile Cloud Computing , 2013 .

[62]  Ali Chehab,et al.  Energy-efficient incremental integrity for securing storage in mobile cloud computing , 2010, 2010 International Conference on Energy Aware Computing.

[63]  Kemal Akkaya,et al.  A survey of authentication schemes for vehicular ad hoc networks , 2011, Secur. Commun. Networks.

[64]  Doan B. Hoang,et al.  Addressing Data and User Mobility Challenges in the Cloud , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.

[65]  Jie Wang,et al.  Mobile Learning System based on Cloud Computing , 2013, J. Networks.

[66]  Shahaboddin Shamshirband,et al.  Incremental proxy re-encryption scheme for mobile cloud computing environment , 2013, The Journal of Supercomputing.

[67]  Slawomir Grzonkowski SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge Proofs , 2010, Financial Cryptography.

[68]  Cho-Li Wang,et al.  Lightweight Application-Level Task Migration for Mobile Cloud Computing , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.

[69]  Thomas Coughlin,et al.  Security analysis of authentication protocols for next-generation mobile and CE cloud services , 2011, 2011 IEEE International Conference on Consumer Electronics -Berlin (ICCE-Berlin).

[70]  Himanshu Dwivedi,et al.  Mobile Application Security , 2010 .

[71]  Qiaoyan Wen,et al.  A protect solution for data security in mobile cloud storage , 2013, Other Conferences.

[72]  Zhang Yuanjun,et al.  The implementation of the travel cloud interpretation system , 2011, Proceedings of 2011 International Conference on Computer Science and Network Technology.

[73]  Chang-Seop Park,et al.  Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems , 2004, Comput. Networks.

[74]  Doan B. Hoang,et al.  Mobile Cloud for Assistive Healthcare (MoCAsH) , 2010, 2010 IEEE Asia-Pacific Services Computing Conference.

[75]  Hai Jin,et al.  Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing , 2012, 2012 Second International Conference on Cloud and Green Computing.

[76]  Sheng-Yuan Yang,et al.  An ontology-supported ubiquitous interface agent for cloud computing — Example on Bluetooth wireless technique with Java programming , 2010, 2010 International Conference on Machine Learning and Cybernetics.

[77]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[78]  Huang Bin The study of Mobile Education development based on 3G technique and Cloud Computing , 2011, 2011 International Conference on Uncertainty Reasoning and Knowledge Engineering.

[79]  Haixia Mao,et al.  A Survey of Mobile Cloud Computing , 2011 .

[80]  Shozo Komaki,et al.  Cognitive Radio Ad-Hoc Network Architectures: A Survey , 2015, Wirel. Pers. Commun..

[81]  Xiaomin Zhu,et al.  Real-Time Tasks Oriented Energy-Aware Scheduling in Virtualized Clouds , 2014, IEEE Transactions on Cloud Computing.

[82]  Nicola Cordeschi,et al.  FUGE: A joint meta-heuristic approach to cloud job scheduling algorithm using fuzzy theory and a genetic method , 2014, Cluster Computing.

[83]  Ravi Prakash,et al.  Mobile Ticketing System for Automatic Fare Collection Model for Public Transport , 2013, 2013 5th International Conference on Computational Intelligence and Communication Networks.

[84]  Sancheng Peng,et al.  Smartphone Malware and Its Propagation Modeling: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[85]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[86]  Min Chen,et al.  Security protection between users and the mobile media cloud , 2014, IEEE Communications Magazine.

[87]  Mahadev Satyanarayanan,et al.  Quantifying interactive user experience on thin clients , 2006, Computer.

[88]  Xiaojiang Du,et al.  A lightweight access control mechanism for mobile cloud computing , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[89]  David M'Raïhi,et al.  Designing a Trade-Off Between Usability and Security: A Metrics Based-Model , 2007, INTERACT.

[90]  Jing Liu,et al.  Shallow Analysis of Mobile Learning Environment under Cloud Computing , 2011 .

[91]  Rajkumar Buyya,et al.  Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges , 2014, IEEE Communications Surveys & Tutorials.

[92]  Mojtaba Alizadeh,et al.  A brief review of mobile cloud computing opportunities , 2013 .

[93]  Feng Xia,et al.  Phone2Cloud: Exploiting computation offloading for energy saving on smartphones in mobile cloud computing , 2013, Information Systems Frontiers.

[94]  Muhammad Shiraz,et al.  A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing , 2014, J. Netw. Comput. Appl..

[95]  Hyohyun Choi,et al.  Toward Advanced Mobile Cloud Computing for the Internet of Things: Current Issues and Future Direction , 2014, Mobile Networks and Applications.

[96]  S. Rajalakshmi,et al.  Mobile Cloud Computing: Standard Approach to Protecting and Securing of Mobile Cloud Ecosystems , 2013, 2013 International Conference on Computer Sciences and Applications.

[97]  D. Popa,et al.  A security framework for mobile cloud applications , 2013, 2013 11th RoEduNet International Conference.

[98]  Mojtaba Alizadeh,et al.  A Prospective Study of Mobile Cloud Computing , 2013 .

[99]  Filip De Turck,et al.  Adaptive deployment and configuration for mobile augmented reality in the cloudlet , 2014, J. Netw. Comput. Appl..

[100]  Zhifeng Xiao,et al.  Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.

[101]  Miss Laiha Mat Kiah,et al.  Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing , 2013, The Journal of Supercomputing.

[102]  Yunheung Paek,et al.  Fast dynamic execution offloading for efficient mobile cloud computing , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[103]  Issa M. Khalil,et al.  Consolidated Identity Management System for secure mobile cloud computing , 2014, Comput. Networks.

[104]  Muhammad Shiraz,et al.  SAMI: Service-based arbitrated multi-tier infrastructure for Mobile Cloud Computing , 2012, 2012 1st IEEE International Conference on Communications in China Workshops (ICCC).

[105]  Xiaodong Lin,et al.  SDSM: A secure data service mechanism in mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[106]  Jiafu Wan,et al.  Security and privacy in mobile cloud computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[107]  Dimitris Gritzalis,et al.  Delegate the smartphone user? Security awareness in smartphone platforms , 2013, Comput. Secur..

[108]  Feng Xia,et al.  Rich Mobile Applications: Genesis, taxonomy, and open issues , 2014, J. Netw. Comput. Appl..

[109]  Mojtaba Alizadeh,et al.  Trusted Computing Strengthens Cloud Authentication , 2014, TheScientificWorldJournal.

[110]  Choong Seon Hong,et al.  An efficient block classification for media healthcare service in mobile cloud computing , 2014, Multimedia Tools and Applications.

[111]  Qiang Ye,et al.  Message digest as authentication entity for mobile cloud computing , 2013, 2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC).

[112]  Feng Xia,et al.  An experimental analysis on cloud-based mobile augmentation in mobile cloud computing , 2014, IEEE Transactions on Consumer Electronics.

[113]  OppligerRolf,et al.  Authentication and authorization infrastructures (AAIs) , 2004 .

[114]  Tim Storer,et al.  A framework for continuous, transparent mobile device authentication , 2013, Comput. Secur..

[115]  Layuan Li,et al.  Phased Scheduling for Resource-Constrained Mobile Devices in Mobile Cloud Computing , 2014, Wirel. Pers. Commun..

[116]  Daniele Sgandurra,et al.  A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.

[117]  Frank Stajano,et al.  The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.

[118]  Rabih Bashroush,et al.  An authentication model towards cloud federation in the enterprise , 2013, J. Syst. Softw..

[119]  Dusit Niyato,et al.  A Framework for Cooperative Resource Management in Mobile Cloud Computing , 2013, IEEE Journal on Selected Areas in Communications.

[120]  Markus Jakobsson,et al.  Implicit Authentication through Learning User Behavior , 2010, ISC.

[121]  Jean-Marc Robert,et al.  Security and usability: the case of the user authentication methods , 2006, IHM '06.

[122]  V. K. Agrawal,et al.  Multi-level authentication technique for accessing cloud services , 2012, 2012 International Conference on Computing, Communication and Applications.

[123]  Sushmita Ruj,et al.  Privacy Preserving Access Control with Authentication for Securing Data in Clouds , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).

[124]  Dong-Sik Oh,et al.  A Study on Authentication System Using QR Code for Mobile Cloud Computing Environment , 2011 .

[125]  Chun Chen,et al.  A strong user authentication scheme with smart cards for wireless communications , 2011, Comput. Commun..

[126]  Steven Furnell,et al.  Beyond the PIN: Enhancing user authentication for mobile devices , 2008 .

[127]  Zhibin Zhou,et al.  Secure data processing framework for mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[128]  Li-Chun Wang,et al.  A Security Framework of Group Location-Based Mobile Applications in Cloud Computing , 2011, 2011 40th International Conference on Parallel Processing Workshops.

[129]  Euiin Choi,et al.  User Authentication Platform Using Provisioning in Cloud Computing Environment , 2011 .

[130]  Li Yang,et al.  Entity authentication in a mobile-cloud environment , 2013, CSIIRW '13.

[131]  Tanvi Naik,et al.  Multi-Dimensional and Multi-Level Authentication Techniques , 2013 .

[132]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[133]  Behrouz A. Forouzan Introduction to cryptography and network security , 2008 .

[134]  Zhangdui Zhong,et al.  Challenges on wireless heterogeneous networks for mobile cloud computing , 2013, IEEE Wireless Communications.

[135]  Jaydip Sen,et al.  Security and Privacy Issues in Cloud Computing , 2013, ArXiv.

[136]  Behrouz A. Forouzan Cryptography & Network Security , 2007 .

[137]  U KhanSamee,et al.  Towards secure mobile cloud computing , 2013 .

[138]  Markus Jakobsson,et al.  Authentication in the clouds: a framework and its application to mobile users , 2010, CCSW '10.

[139]  Kee-Young Yoo,et al.  A lightweight multi-user authentication scheme based on cellular automata in cloud environment , 2012, 2012 IEEE 1st International Conference on Cloud Networking (CLOUDNET).

[140]  Steven Furnell,et al.  Advanced user authentication for mobile devices , 2007, Comput. Secur..

[141]  Stephen Flowerday,et al.  Smartphone information security awareness: A victim of operational pressures , 2014, Comput. Secur..

[142]  Zhibin Zhou,et al.  Efficient and secure data storage operations for mobile cloud computing , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).

[143]  Xianghan Zheng,et al.  A Cloud-based monitoring framework for Smart Home , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.

[144]  Abdul Nasir Khan,et al.  A study of incremental cryptography for security schemes in mobile cloud computing environments , 2013, 2013 IEEE Symposium on Wireless Technology & Applications (ISWTA).

[145]  Zhao Yong,et al.  An new anonymous authentication scheme for cloud computing , 2012, 2012 7th International Conference on Computer Science & Education (ICCSE).

[146]  Mohammed Al-Zoube,et al.  MOBILE CLOUD COMPUTING FRAMEWORK FOR PATIENTS' HEALTH DATA ANALYSIS , 2014 .

[147]  Jun Han,et al.  ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.

[148]  C. Cachin,et al.  A cloud you can trust , 2011, IEEE Spectrum.

[149]  Md. Shahadat Hossain,et al.  Integration of Wireless Hand-Held Devices with the Cloud Architecture: Security and Privacy Issues , 2011, 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.

[150]  Steven Furnell,et al.  Authentication and Supervision: A Survey of User Attitudes , 2000, Comput. Secur..

[151]  Siti Hafizah Ab Hamid,et al.  Mobile storage augmentation in mobile cloud computing: Taxonomy, approaches, and open issues , 2015, Simul. Model. Pract. Theory.

[152]  J. K. Wang,et al.  Data security and authentication in hybrid cloud computing model , 2012, 2012 IEEE Global High Tech Congress on Electronics.

[153]  Zhenfu Cao,et al.  On the anonymity of some authentication schemes for wireless communications , 2009, IEEE Commun. Lett..

[154]  Gustavus J. Simmons,et al.  A survey of information authentication , 1988, Proc. IEEE.

[155]  Hai Jin,et al.  Energy Efficient Task Scheduling in Mobile Cloud Computing , 2013, NPC.

[156]  Jason H. Christensen,et al.  Using RESTful web-services and cloud computing to create next generation mobile applications , 2009, OOPSLA Companion.

[157]  Samee Ullah Khan,et al.  Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .

[158]  Young-Sik Jeong,et al.  An efficient authentication system of smart device using multi factors in mobile cloud service architecture , 2015, Int. J. Commun. Syst..

[159]  Tomasz Imielinski,et al.  Introduction to Mobile Computing , 1994, Mobidata.

[160]  Shahryar Shafique Qureshi,et al.  Mobile cloud computing as future for mobile applications - Implementation methods and challenging issues , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.