Authentication in mobile cloud computing: A survey
暂无分享,去创建一个
Mojtaba Alizadeh | Kouichi Sakurai | Mazdak Zamani | Sabariah Baharun | Saeid Abolfazli | K. Sakurai | M. Alizadeh | M. Zamani | S. Baharun | S. Abolfazli
[1] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[2] Weibo Gong,et al. Mobility Can Help: Protect User Identity with Dynamic Credential , 2010, 2010 Eleventh International Conference on Mobile Data Management.
[3] Mohsen Guizani,et al. Mobile application security: malware threats and defenses , 2015, IEEE Wireless Communications.
[4] Ilias Maglogiannis,et al. Mobile healthcare information management utilizing Cloud Computing and Android OS , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.
[5] Michele Nogueira Lima,et al. Interoperability issues on heterogeneous wireless communication for smart cities , 2015, Comput. Commun..
[6] Athanasios V. Vasilakos,et al. MuSIC: Mobility-Aware Optimal Service Allocation in Mobile Cloud Computing , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.
[7] Ben Adida,et al. Beamauth: two-factor web authentication with a bookmark , 2007, CCS '07.
[8] Ejaz Ahmed,et al. A review on remote data auditing in single cloud server: Taxonomy and open issues , 2014, J. Netw. Comput. Appl..
[9] Sarbjeet Singh,et al. Design and Implementation of Multi-tier Authentication Scheme in Cloud , 2012 .
[10] P. Mell,et al. SP 800-145. The NIST Definition of Cloud Computing , 2011 .
[11] S. Kotani,et al. TrustCube: An Infrastructure that Builds Trust in Client , 2009 .
[12] Hyung-Jong Kim,et al. The Study on A Threat Countermeasure of Mobile Cloud Services , 2011 .
[13] Jong Hyuk Park,et al. SSP-MCloud: A Study on Security Service Protocol for Smartphone Centric Mobile Cloud Computing , 2011 .
[14] Muhammad Shiraz,et al. MOMCC: Market-oriented architecture for Mobile Cloud Computing based on Service Oriented Architecture , 2012, 2012 1st IEEE International Conference on Communications in China Workshops (ICCC).
[15] Luiz A. DaSilva,et al. Authentication protocols for ad hoc networks: taxonomy and research issues , 2005, Q2SWinet '05.
[16] Dennis G. Shea,et al. Cloud Service Portal for Mobile Device Management , 2010, 2010 IEEE 7th International Conference on E-Business Engineering.
[17] Jun Zhang,et al. A Remote Monitoring System Based on Measuring Instrument Cloud , 2014 .
[18] Chin-Chen Chang,et al. Enhanced authentication scheme with anonymity for roaming service in global mobility networks , 2009, Comput. Commun..
[19] Sebti Foufou,et al. Cloud-Ready Biometric System for Mobile Security Access , 2012, NDT.
[20] Anh Duc Duong,et al. Robust Mobile Device Integration of a Fingerprint Biometric Remote Authentication Scheme , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.
[21] Marco Mariotti,et al. The Response of Durum Wheat to the Preceding Crop in a Mediterranean Environment , 2014, TheScientificWorldJournal.
[22] Yunheung Paek,et al. Techniques to Minimize State Transfer Costs for Dynamic Execution Offloading in Mobile Cloud Computing , 2014, IEEE Transactions on Mobile Computing.
[23] Yong Wang,et al. Smartphone Security Challenges , 2012, Computer.
[24] Shu Ching Wang,et al. Security of Cloud Computing Lightweight Authentication Protocol , 2013 .
[25] Sangmin Seo,et al. A study of secure data transmissions in mobile cloud computing from the energy consumption side , 2013, The International Conference on Information Networking 2013 (ICOIN).
[26] Jonathan Loo,et al. Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR , 2014, Int. J. Commun. Syst..
[27] Ramesh Govindan,et al. Odessa: enabling interactive perception applications on mobile devices , 2011, MobiSys '11.
[28] Mauro Conti,et al. An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments , 2014, IEEE Transactions on Services Computing.
[29] Tristan Henderson,et al. MobOCloud: extending cloud computing with mobile opportunistic networks , 2013, CHANTS '13.
[30] Rajkumar Buyya,et al. Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges , 2013, IEEE Communications Surveys & Tutorials.
[31] Iehab Al Rassan,et al. Securing Mobile Cloud Computing Using Biometric Authentication (SMCBA) , 2014, 2014 International Conference on Computational Science and Computational Intelligence.
[32] Yen-Chieh Ouyang,et al. Secure data transmission with cloud computing in heterogeneous wireless networks , 2012, Secur. Commun. Networks.
[33] Mojtaba Alizadeh,et al. Challenges and opportunities of Mobile Cloud Computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[34] Mauro Conti,et al. I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics , 2014, DIMVA.
[35] Hyotaek Lim,et al. An Analysis of Security System for Intrusion in Smartphone Environment , 2014, TheScientificWorldJournal.
[36] M. Anwar Hasan,et al. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems , 2013, IEEE Transactions on Parallel and Distributed Systems.
[37] Dong Hoon Lee,et al. Anonymous and Traceable Authentication Scheme using Smart Cards , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[38] Rolf Oppliger,et al. Authentication and authorization infrastructures (AAIs): a comparative survey , 2004, Comput. Secur..
[39] Bin Ma,et al. Risk-aware vertical handoff algorithm for security access support in heterogeneous wireless networks , 2012, 2012 5th International Conference on BioMedical Engineering and Informatics.
[40] Li Xu,et al. Software Service Signature (S3) for authentication in cloud computing , 2013, Cluster Computing.
[41] Xiang Zou,et al. Desktop Cloud-Based Research on Unified Authentication Architecture , 2012, 2012 Spring Congress on Engineering and Technology.
[42] Pin-Han Ho,et al. PPAB: A Privacy-Preserving Authentication and Billing Architecture for Metropolitan Area Sharing Networks , 2009, IEEE Transactions on Vehicular Technology.
[43] Amala V. Rajan,et al. Cloud and mobile computing: Affordances of the 21st century teaching and learning , 2013, 2013 International Conference on Current Trends in Information Technology (CTIT).
[44] Wei Jiang,et al. An Identity-Based Authentication Scheme in Cloud Computing , 2012, 2012 International Conference on Industrial Control and Electronics Engineering.
[45] Christian Esposito,et al. On Security in Publish/Subscribe Services: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[46] Zhang Yanhua,et al. QoS-aware dynamic resource management in heterogeneous mobile cloud computing networks , 2014, China Communications.
[47] Sandeep K. Sood,et al. A combined approach to ensure data security in cloud computing , 2012, J. Netw. Comput. Appl..
[48] Emiliano Miluzzo,et al. A survey of mobile phone sensing , 2010, IEEE Communications Magazine.
[49] Sheng Li,et al. Design and Implementation of the Web Content Adaptation for Intelligent Tourism Cloud Platform , 2012 .
[50] Oscar Mauricio Serrano Jaimes,et al. EVALUACION DE LA USABILIDAD EN SITIOS WEB, BASADA EN EL ESTANDAR ISO 9241-11 (International Standard (1998) Ergonomic requirements For office work with visual display terminals (VDTs)-Parts II: Guidance on usability , 2012 .
[51] Mohsen Guizani,et al. User privacy and data trustworthiness in mobile crowd sensing , 2015, IEEE Wireless Communications.
[52] Jingsha He,et al. A Service-oriented Identity Authentication Privacy Protection Method in Cloud Computing , 2013 .
[53] Zeyu Gao,et al. NemoAuth: A mnemonic multimodal approach to mobile user authentication , 2013, 2013 IEEE International Conference of IEEE Region 10 (TENCON 2013).
[54] Ming-Yen Lin,et al. Secure cloud storage for convenient data archive of smart phones , 2011, 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE).
[55] Rajkumar Buyya,et al. Application partitioning algorithms in mobile cloud computing: Taxonomy, review and future directions , 2015, J. Netw. Comput. Appl..
[56] Wei Ren,et al. Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing , 2011 .
[57] Debasish Jana,et al. Efficient management of security and privacy issues in mobile cloud environment , 2013, 2013 Annual IEEE India Conference (INDICON).
[58] Qiaoyan Wen,et al. Design of Security Solution to Mobile Cloud Storage , 2012 .
[59] Susan Morrow,et al. Data Security in the Cloud , 2011 .
[60] Steven Furnell,et al. Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices , 2002, Comput. Secur..
[61] Shaheed Zulfikar,et al. Security Issues and Challenges of Mobile Cloud Computing , 2013 .
[62] Ali Chehab,et al. Energy-efficient incremental integrity for securing storage in mobile cloud computing , 2010, 2010 International Conference on Energy Aware Computing.
[63] Kemal Akkaya,et al. A survey of authentication schemes for vehicular ad hoc networks , 2011, Secur. Commun. Networks.
[64] Doan B. Hoang,et al. Addressing Data and User Mobility Challenges in the Cloud , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.
[65] Jie Wang,et al. Mobile Learning System based on Cloud Computing , 2013, J. Networks.
[66] Shahaboddin Shamshirband,et al. Incremental proxy re-encryption scheme for mobile cloud computing environment , 2013, The Journal of Supercomputing.
[67] Slawomir Grzonkowski. SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge Proofs , 2010, Financial Cryptography.
[68] Cho-Li Wang,et al. Lightweight Application-Level Task Migration for Mobile Cloud Computing , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.
[69] Thomas Coughlin,et al. Security analysis of authentication protocols for next-generation mobile and CE cloud services , 2011, 2011 IEEE International Conference on Consumer Electronics -Berlin (ICCE-Berlin).
[70] Himanshu Dwivedi,et al. Mobile Application Security , 2010 .
[71] Qiaoyan Wen,et al. A protect solution for data security in mobile cloud storage , 2013, Other Conferences.
[72] Zhang Yuanjun,et al. The implementation of the travel cloud interpretation system , 2011, Proceedings of 2011 International Conference on Computer Science and Network Technology.
[73] Chang-Seop Park,et al. Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems , 2004, Comput. Networks.
[74] Doan B. Hoang,et al. Mobile Cloud for Assistive Healthcare (MoCAsH) , 2010, 2010 IEEE Asia-Pacific Services Computing Conference.
[75] Hai Jin,et al. Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing , 2012, 2012 Second International Conference on Cloud and Green Computing.
[76] Sheng-Yuan Yang,et al. An ontology-supported ubiquitous interface agent for cloud computing — Example on Bluetooth wireless technique with Java programming , 2010, 2010 International Conference on Machine Learning and Cybernetics.
[77] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[78] Huang Bin. The study of Mobile Education development based on 3G technique and Cloud Computing , 2011, 2011 International Conference on Uncertainty Reasoning and Knowledge Engineering.
[79] Haixia Mao,et al. A Survey of Mobile Cloud Computing , 2011 .
[80] Shozo Komaki,et al. Cognitive Radio Ad-Hoc Network Architectures: A Survey , 2015, Wirel. Pers. Commun..
[81] Xiaomin Zhu,et al. Real-Time Tasks Oriented Energy-Aware Scheduling in Virtualized Clouds , 2014, IEEE Transactions on Cloud Computing.
[82] Nicola Cordeschi,et al. FUGE: A joint meta-heuristic approach to cloud job scheduling algorithm using fuzzy theory and a genetic method , 2014, Cluster Computing.
[83] Ravi Prakash,et al. Mobile Ticketing System for Automatic Fare Collection Model for Public Transport , 2013, 2013 5th International Conference on Computational Intelligence and Communication Networks.
[84] Sancheng Peng,et al. Smartphone Malware and Its Propagation Modeling: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[85] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.
[86] Min Chen,et al. Security protection between users and the mobile media cloud , 2014, IEEE Communications Magazine.
[87] Mahadev Satyanarayanan,et al. Quantifying interactive user experience on thin clients , 2006, Computer.
[88] Xiaojiang Du,et al. A lightweight access control mechanism for mobile cloud computing , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[89] David M'Raïhi,et al. Designing a Trade-Off Between Usability and Security: A Metrics Based-Model , 2007, INTERACT.
[90] Jing Liu,et al. Shallow Analysis of Mobile Learning Environment under Cloud Computing , 2011 .
[91] Rajkumar Buyya,et al. Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges , 2014, IEEE Communications Surveys & Tutorials.
[92] Mojtaba Alizadeh,et al. A brief review of mobile cloud computing opportunities , 2013 .
[93] Feng Xia,et al. Phone2Cloud: Exploiting computation offloading for energy saving on smartphones in mobile cloud computing , 2013, Information Systems Frontiers.
[94] Muhammad Shiraz,et al. A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing , 2014, J. Netw. Comput. Appl..
[95] Hyohyun Choi,et al. Toward Advanced Mobile Cloud Computing for the Internet of Things: Current Issues and Future Direction , 2014, Mobile Networks and Applications.
[96] S. Rajalakshmi,et al. Mobile Cloud Computing: Standard Approach to Protecting and Securing of Mobile Cloud Ecosystems , 2013, 2013 International Conference on Computer Sciences and Applications.
[97] D. Popa,et al. A security framework for mobile cloud applications , 2013, 2013 11th RoEduNet International Conference.
[98] Mojtaba Alizadeh,et al. A Prospective Study of Mobile Cloud Computing , 2013 .
[99] Filip De Turck,et al. Adaptive deployment and configuration for mobile augmented reality in the cloudlet , 2014, J. Netw. Comput. Appl..
[100] Zhifeng Xiao,et al. Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.
[101] Miss Laiha Mat Kiah,et al. Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing , 2013, The Journal of Supercomputing.
[102] Yunheung Paek,et al. Fast dynamic execution offloading for efficient mobile cloud computing , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[103] Issa M. Khalil,et al. Consolidated Identity Management System for secure mobile cloud computing , 2014, Comput. Networks.
[104] Muhammad Shiraz,et al. SAMI: Service-based arbitrated multi-tier infrastructure for Mobile Cloud Computing , 2012, 2012 1st IEEE International Conference on Communications in China Workshops (ICCC).
[105] Xiaodong Lin,et al. SDSM: A secure data service mechanism in mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[106] Jiafu Wan,et al. Security and privacy in mobile cloud computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[107] Dimitris Gritzalis,et al. Delegate the smartphone user? Security awareness in smartphone platforms , 2013, Comput. Secur..
[108] Feng Xia,et al. Rich Mobile Applications: Genesis, taxonomy, and open issues , 2014, J. Netw. Comput. Appl..
[109] Mojtaba Alizadeh,et al. Trusted Computing Strengthens Cloud Authentication , 2014, TheScientificWorldJournal.
[110] Choong Seon Hong,et al. An efficient block classification for media healthcare service in mobile cloud computing , 2014, Multimedia Tools and Applications.
[111] Qiang Ye,et al. Message digest as authentication entity for mobile cloud computing , 2013, 2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC).
[112] Feng Xia,et al. An experimental analysis on cloud-based mobile augmentation in mobile cloud computing , 2014, IEEE Transactions on Consumer Electronics.
[113] OppligerRolf,et al. Authentication and authorization infrastructures (AAIs) , 2004 .
[114] Tim Storer,et al. A framework for continuous, transparent mobile device authentication , 2013, Comput. Secur..
[115] Layuan Li,et al. Phased Scheduling for Resource-Constrained Mobile Devices in Mobile Cloud Computing , 2014, Wirel. Pers. Commun..
[116] Daniele Sgandurra,et al. A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.
[117] Frank Stajano,et al. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.
[118] Rabih Bashroush,et al. An authentication model towards cloud federation in the enterprise , 2013, J. Syst. Softw..
[119] Dusit Niyato,et al. A Framework for Cooperative Resource Management in Mobile Cloud Computing , 2013, IEEE Journal on Selected Areas in Communications.
[120] Markus Jakobsson,et al. Implicit Authentication through Learning User Behavior , 2010, ISC.
[121] Jean-Marc Robert,et al. Security and usability: the case of the user authentication methods , 2006, IHM '06.
[122] V. K. Agrawal,et al. Multi-level authentication technique for accessing cloud services , 2012, 2012 International Conference on Computing, Communication and Applications.
[123] Sushmita Ruj,et al. Privacy Preserving Access Control with Authentication for Securing Data in Clouds , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).
[124] Dong-Sik Oh,et al. A Study on Authentication System Using QR Code for Mobile Cloud Computing Environment , 2011 .
[125] Chun Chen,et al. A strong user authentication scheme with smart cards for wireless communications , 2011, Comput. Commun..
[126] Steven Furnell,et al. Beyond the PIN: Enhancing user authentication for mobile devices , 2008 .
[127] Zhibin Zhou,et al. Secure data processing framework for mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[128] Li-Chun Wang,et al. A Security Framework of Group Location-Based Mobile Applications in Cloud Computing , 2011, 2011 40th International Conference on Parallel Processing Workshops.
[129] Euiin Choi,et al. User Authentication Platform Using Provisioning in Cloud Computing Environment , 2011 .
[130] Li Yang,et al. Entity authentication in a mobile-cloud environment , 2013, CSIIRW '13.
[131] Tanvi Naik,et al. Multi-Dimensional and Multi-Level Authentication Techniques , 2013 .
[132] J. Wenny Rahayu,et al. Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..
[133] Behrouz A. Forouzan. Introduction to cryptography and network security , 2008 .
[134] Zhangdui Zhong,et al. Challenges on wireless heterogeneous networks for mobile cloud computing , 2013, IEEE Wireless Communications.
[135] Jaydip Sen,et al. Security and Privacy Issues in Cloud Computing , 2013, ArXiv.
[136] Behrouz A. Forouzan. Cryptography & Network Security , 2007 .
[137] U KhanSamee,et al. Towards secure mobile cloud computing , 2013 .
[138] Markus Jakobsson,et al. Authentication in the clouds: a framework and its application to mobile users , 2010, CCSW '10.
[139] Kee-Young Yoo,et al. A lightweight multi-user authentication scheme based on cellular automata in cloud environment , 2012, 2012 IEEE 1st International Conference on Cloud Networking (CLOUDNET).
[140] Steven Furnell,et al. Advanced user authentication for mobile devices , 2007, Comput. Secur..
[141] Stephen Flowerday,et al. Smartphone information security awareness: A victim of operational pressures , 2014, Comput. Secur..
[142] Zhibin Zhou,et al. Efficient and secure data storage operations for mobile cloud computing , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).
[143] Xianghan Zheng,et al. A Cloud-based monitoring framework for Smart Home , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.
[144] Abdul Nasir Khan,et al. A study of incremental cryptography for security schemes in mobile cloud computing environments , 2013, 2013 IEEE Symposium on Wireless Technology & Applications (ISWTA).
[145] Zhao Yong,et al. An new anonymous authentication scheme for cloud computing , 2012, 2012 7th International Conference on Computer Science & Education (ICCSE).
[146] Mohammed Al-Zoube,et al. MOBILE CLOUD COMPUTING FRAMEWORK FOR PATIENTS' HEALTH DATA ANALYSIS , 2014 .
[147] Jun Han,et al. ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.
[148] C. Cachin,et al. A cloud you can trust , 2011, IEEE Spectrum.
[149] Md. Shahadat Hossain,et al. Integration of Wireless Hand-Held Devices with the Cloud Architecture: Security and Privacy Issues , 2011, 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[150] Steven Furnell,et al. Authentication and Supervision: A Survey of User Attitudes , 2000, Comput. Secur..
[151] Siti Hafizah Ab Hamid,et al. Mobile storage augmentation in mobile cloud computing: Taxonomy, approaches, and open issues , 2015, Simul. Model. Pract. Theory.
[152] J. K. Wang,et al. Data security and authentication in hybrid cloud computing model , 2012, 2012 IEEE Global High Tech Congress on Electronics.
[153] Zhenfu Cao,et al. On the anonymity of some authentication schemes for wireless communications , 2009, IEEE Commun. Lett..
[154] Gustavus J. Simmons,et al. A survey of information authentication , 1988, Proc. IEEE.
[155] Hai Jin,et al. Energy Efficient Task Scheduling in Mobile Cloud Computing , 2013, NPC.
[156] Jason H. Christensen,et al. Using RESTful web-services and cloud computing to create next generation mobile applications , 2009, OOPSLA Companion.
[157] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .
[158] Young-Sik Jeong,et al. An efficient authentication system of smart device using multi factors in mobile cloud service architecture , 2015, Int. J. Commun. Syst..
[159] Tomasz Imielinski,et al. Introduction to Mobile Computing , 1994, Mobidata.
[160] Shahryar Shafique Qureshi,et al. Mobile cloud computing as future for mobile applications - Implementation methods and challenging issues , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.