SlideShare a Scribd company logo
ISSN: 2312-7694
Cecil et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 671-675
671 | P a g e
© IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com
Dynamic Key Based User Authentication (DKBUA)
Framework for MobiCloud Environment
A. Cecil Donald
Research Scholar in Computer Science
St. Joseph’s College (Autonomous)
Tiruchirappalli, Tamil Nadu, India
M. Regin
M. Phil. Scholar in Computer Science
St. Joseph’s College (Autonomous)
Tiruchirappalli, Tamil Nadu, India
Dr. A. Aloysius
Assistant Professor in Computer Science
St. Joseph’s College (Autonomous)
Tiruchirappalli, Tamil Nadu, India
Dr. L. Arockiam
Associate Professor in Computer Science
St. Joseph’s College (Autonomous)
Tiruchirappalli, Tamil Nadu, India
Abstract— Mobile Cloud Computing (MCC) is the profitable
field in business and it reduces the running and developing cost
of mobile applications and mobile users. In this emerging
technology security is the main issue as it combines the concept of
Mobile Computing and Cloud Computing. This paper focuses on
the Authentication which is one of the five pillars of Information
Assurance (IA). Critical analysis is made based on the various
existing mechanisms. In this paper, a user authentication
framework is proposed to authenticate users in mobile cloud
environment using Dynamic Key Generation Algorithm. The
algorithm is categorized into six phases: Registration,
Communication, Key Generation, Key Sending, Encryption &
Decryption and Authentication. The proposed algorithm is
lightweight which reduces the computation load and easy to use.
The process of encryption and decryption is used to make the
communication more secure. Moreover, the proposed work is
resilient against Denial of Service (DoS) attack, Known plaintext
attack, Masquerading attack and insider attack.
Index Terms— Authentication, Key Generation, Mobile Cloud
Computing (MCC), Security, Dynamic Key.
I. INTRODUCTION
Mobile Cloud Computing (MCC) is the rich technology for
mobile devices. The Main goal of MCC is to enable execution
of rich mobile applications on mobile devices, with a rich user
experience. MCC provides more opportunities for cloud
providers as well as Mobile Network Providers. The secure
communication of today’s mobile devices is of high interest
because the threats have increased and it is now not easy to
handle the billions of devices securely [1]. Authentication is
the most important factor to protect systems against attacks,
and authentication methods should be lightweight, also
computation and communication costs should be little [2]. The
combination of cloud computing and mobile computing
introduces mobile cloud computing, which also present new
issues of security threats such as unauthorized access to
resources exists in mobile cloud. In MCC, Authentication is the
main security issue as it is the doorstep for all process. The
proposed framework uses the Pseudo Random Number
Generation (PRNG) algorithm to generate the key. The
proposed algorithm resists the Denial of Service (DoS), Plain
Text Attack, Masquerading attack and insider attack. It takes
less time for key generation. Section II describes the
Motivation of the research work. Section III discusses the
related authentication mechanisms and methodologies, section
IV analyses and compares the existing authentication
mechanisms. Section V represents issues and challenges of
authentication mechanisms, and section VI presents the
proposed framework, components and workflow diagram and
the algorithm for proposed work. Section VII projects the
results and discussions of the proposed work and finally,
Section VIII concludes the paper.
II. MOTIVATION
Mobile computing is the emerging technology. MCC has
many open issues which is not yet solved. Security is one of
the major issues in Mobile cloud environment. Authentication
is one of the important factors in security which is used to
prevent user’s data from unauthorized access. Traditional
Authentication methods didn’t provide a reliable security to the
user and the Cloud Service Provider. So, it is essential to
develop an efficient mechanism to provide better security to
the user’s data in mobile cloud environment. Developing
mechanism should be light weight.
III. LITERATURE BACKGROUND
Laleh Boroumand et al. [3] have proposed port knocking
method for authentication in mobile cloud computing. Current
port knocking method is divided into two main categories,
which includes static and dynamic knock sequences. The port
knocking authentication methods are compared on the basis of
significant parameters that illustrate the commonalities and
differences in current methods. In this paper they also
discussed the integrity and suitability of the port knocking
authentication method for Mobile Cloud Computing. Port
knocking method provides a lightweight application layer
solution for addressing the security issues in Mobile Cloud
Computing. It provides a suitable security layer to ensure
authentic communication between smart mobile devices and
Mobile Cloud Computing. Current port-knocking
authentication methods are compared based on static or
ISSN: 2312-7694
Cecil et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 671-675
672 | P a g e
© IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com
dynamic knocked sequences, which tend to solve the Network
Address Translation knock and Denial of Service attacks.
Costin Andrei et al. [4] described a method for
implementing two-factor authentication using smart phones as
software tokens. The proposed system will use the mobile
phone as software token and generate unique one time
passwords (OTP). It will be used when authenticating to an
Internet Banking application. The tokens can also serve as a
method of signing online money orders. They have focused on
the implementation of two-factor authentication on any smart-
phone that allows third-party developers to add and run
applications such as Android, Apple's iOS, Windows Phone,
BlackBerry OS, Symbian. The implemented demo application
was created for only Android, but can be easily written on any
other operating system.
Bhavana et al. [5] have proposed a new framework called
Password Authentication System for Cloud Environment
(PASCE), which is immune to the common attacks suffered by
other verification schemes. Password Authentication System
for Cloud Environment (PASCE) uses graphical authentication
system with image in reshuffled format when the data
upload/download into the cloud account. This technique can be
classified into two categories:
1. Recognition-based graphical technique.
2. Recall based graphical technique.
No password information is exchanged between the client
and the server by using PAS authentication system. Strength of
PASCE is creating a good verification space.
Thamba Meshach et al. [6] presented the current state of
mobile-cloud authentication technology and the proposed
system Mobile Cloud Key Exchange (MCKE), an
authenticated key exchange scheme that aims at efficient
authentication. This scheme is designed based on randomness-
reuse strategy and Internet Key Exchange (IKE) scheme.
Theoretical analysis and simulation results are compared with
the IKE scheme; the Mobile Cloud Key Exchange scheme can
improve the efficiency and reduce time consumption and
computation load without sacrificing the level of security. This
scheme has been designed based on the commonly-used
Internet Key Exchange (IKE) scheme and randomness-reuse
strategy.
Chunhua Chen et al. [7] proposed a general scheme that
converts a simple static password authentication mechanism
into a one-time password (OTP) system using the GAA key
establishment service. The scheme uses a GAA-enabled user
device and a GAA-aware server. OTP systems use a dedicated
key-bearing token, so that the user device does not need to be
user or server specific, and can be used in the protocol with no
registration or configuration (except for the installation of the
necessary application software). The Proposed scheme is
secure, scalable and fits well to the multi-institution scenario,
and enable the provision of ubiquitous and on-demand OTP
services. It fits well to the multi institution scenario. User needs
only a GAA enabled mobile phone with a valid subscription.
Mahnoush Babaeizadeh et al. [8] have proposed Keystroke
Dynamic Authentication (KDA). It is a type of behavioral
biometric authentication. It is based on behavioral style of each
person’s typing on a keyboard. It can identify the user based on
their habitual typing pattern. Keystroke dynamics implies on
the process of measuring human’s typing rhythm on digital
devices. In another words, it is not important what you type,
but how you type. In this paper, Google Drive is considered as
data storage. Authors have used keystroke authentication in
mobile communication. It helps to identify users based on their
unique behavioral biometric and unlike the other biometric
methods, Keystroke analysis does not require the aid of extra
special tools. Therefore, it is cheaper than other type of
biometric authentication methods.
Deepak et al. [9] proposed a secure mobile cloud-based
algorithm, where the user's mobile phone is used as an
authentication device, presenting a onetime encrypted
password for the user and password is decrypted using
Dynamic key generation algorithm in user's mobile application.
The authors also described key security considerations and
challenges which are currently faced in the Cloud.
IV. ANALYSIS ON EXISTING MECHANISMS
From the literature of existing authentication mechanisms
[10], a comparative analysis is made to clearly understand the
problems in Mobile Cloud explained in table I.
TABLE I. ANALYSIS OF VARIOUS AUTHENTICATION MECHANISMS
Author Proposed Work Advantages
Drawbacks /
Limitations
Francisco
et al.
One- two- and
three factor
authentication
Mechanism
Provides Strong
security,
Easy to use
Not suitable for
all environments
Yogesh
Patel et al.
Multilevel
Authentication
Provides service
level security
and provides
User Based
Access Control
User needs to
enter credentials
every session
Yeh et al.
Visual Password
Authentication
Scheme
No need to
remember any
passwords
Larger variability
in the voiceprint
characteristics,
Information Loss
Rassan et
al.
Fingerprint
Authentication
Mechanism
Improved
Performance
and Security
No input is
allowed from user
to enter the
system
Vineet
Guha et al.
Key Generation
Mechanism
Network Key,
Suits
SaaS & PaaS
Inaccurate results
Indrajit
Das et al.
Authentication
Mechanism
Light weight Not Secure
Mohamma
d et al.
Lightweight
Authentication
Protocol
Easy and
Reduces
Latency
Consumes more
time especially in
wireless
communications.
Jin et al.
Mobile Device
authentication
Supports
authorization
service, device
certification
RADIUS server
can’t provide
security services
Davit
Authentication
and Authorization
Flexible,
security,
No Privacy
ISSN: 2312-7694
Cecil et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 671-675
673 | P a g e
© IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com
techniques reliable and
effective
Chow et al.
Behavioral
Authentication
Trust Cube
Method
Not Supported for
all devices
Gokaj et al.
Mobile Signature
Authentication
Lightweight
Mechanism
Unable to detect
the attacks
Deepa et
al.
Multifactor
authentication
using smart
phones as
software tokens.
No external
Devices and
generates
unique One
Time Passwords
(OTP)
User Anonymity
and Availability is
not addressed
Sanjoli et
al.
Rijndael
encryption with
EAP-CHAP
encryption
Provides
Authentication
and
Authorization
Prone Server Port
attack
Kashif et
al.
SSO based
authentication
Ability to
access Multiple
Services
Prone to man-in-
the Middle Attack
Neha et al.
Data encryption
and Key
Exchange
mechanism
Secure
Connection
Time delay due to
Complexity
V. ISSUES AND CHALLENGES
From the comprehensive literature review of existing and
proposed frameworks of MCC explained in the above section,
it is evident that there are some major issues and challenges in
MCC. Those issues and challenges are highlighted and
categorized below. The security related issues are then divided
into two broad categories as listed below.
A. Mobile Cloud Infrastructure Issues
B. Mobile Cloud Communication Channel Issues
A. Mobile Cloud Infrastructure Issues
From cloud infrastructure point of view, a variety of
attacks are possible on the cloud. Some of these attacks
are given below.
 Attacks on Virtual Machines
 Authorization and Authentication
 Attacks from Local Users
 Hybrid Cloud Security Management Issues
B. Mobile Cloud Communication Channel Issues
A lot of improvement needs to be done in the mobile
cloud communication channel. The following attacks
exist on communication channel.
 Access Control Attacks
 Attacks on Authentication
 Attacks on Availability
 Data Integrity Attacks
VI. PROPOSED AUTHENTICATION FRAMEWORK
The proposed mechanism holds six phases where each
phase is involved in authentication process. Fig 1 shows the
methodology of the proposed authentication mechanism.
A. Components of Framework
i. Users
User uses the mobile device to access the cloud
application services through login process. User can be
classified as Individual Users, Enterprise Users,
Administrators, etc.
ii. Mobile Network (MN)
Mobile Network (MN) plays an important role in
Mobile Cloud which provides the network to the user. It
acts as an intermediator between mobile user and server.
The MN authenticated the user by using the existing strong
mechanisms like AAA which resides in the AAA Server /
RADIUS Server.
Fig 1. Proposed MobiCloud Authentication Framework
iii. Authentication Server (AS)
Authentication server performs the authentication
using an efficient algorithm. The purpose is to validate the
user’s identity using user credentials like username,
password and other Unique Entities etc. When user submits
his/her details, the AS receives the request in the encrypted
form that no intermediator can view/understand the data.
iv. Cloud Storage
Database is a structured collection of records, files or
data which is used to store the user’s details in computer
system.
v. Key Generator (KG)
Key Generator plays a vital role in the authentication
process where it generates the key for performing
authentication and granting access to the appropriate cloud
services. Keys can be of two types: One is the Symmetric
Key where it has only one key that can be used for
encryption/ decryption and other one is Asymmetric key
where it uses two keys. (i.e.) a Private Key and a Public
Key.
vi. Cloud Service Provider (CSP)
Cloud Service Provider is a third party who provides
the Cloud Services. CSP shall provide any kind of services
on the “Pay-as-you-go” basis. Google, Amazon, IBM are
the major Cloud Service Providers. The CSP has the tie-up
ISSN: 2312-7694
Cecil et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 671-675
674 | P a g e
© IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com
with the user using Cloud Resource Policy / Service Level
Agreement (SLA).
B. Authentication Phase
Registration is done only once when mobile user
wants to access mobile cloud services. After registration
whenever mobile user wants to use mobile cloud services,
he/she must be authenticated. The mobile user submits
his/her login details and unique information to the Cloud
Authentication Server (CAS). Those details are encrypted
and stored in the cloud database. Now, the cloud server
checks for identity and if it is matched, the user is prompted
for the key. At the same time key generator generates a key
which is sent to the user and also to the database through
Cloud Authentication Server (CAS). User provides the
received key to the CAS to access the desired cloud
services. The Cloud Authentication Server checks for the
key and provides the access if it is matched. The access is
controlled by Cloud Controller (CC). Finally, the Cloud
Controller provides the Cloud Application Services.
C. Workflow Diagram of Proposed Work
User
Registration
Login
Checks Authorized or Not
Re-login / Unauthorized
User
Insists for Key Generation
Key with Acknowledgement Authentication Server
Check for Key Matching
Access Cloud Services
Invalid Key
Deny Access
Yes
Yes
No
No
Fig 2. Process Flow Diagram for Authentication
D. Dynamic Key Generation Algorithm
Table II explains the encryption algorithm which
is used for generating a key using a Pseudo Random
Number Generation (PRNG). Here, cryptographically
strong PRNG algorithm is considered in which no
intruder can predict as the random is more. Then, each
character is converted into ASCII character code. The
log function is applied on the obtained result. Finally,
trigonometric function on the value. This rounded value
acts as the key and sent to the desired user.
TABLE II. ALGORITHM FOR ENCRYPTION
Step 1: Generate random string using PRNG.
//Generated random string may be A-Z, a-z, 0-9 //
Step 2: Convert each character into its equivalent ASCII code.
Step 3: Apply log function to the obtained result in step 2.
Step 4: Apply trigonometric function to the result obtained in the step
3. Round the value to 4 decimal places.
Step 5: Transmit the key (step 4 result) to mobile device of the user.
The following table III shows the algorithm for decrypting
the encrypted key. The Decryption process is taken place at the
user side to avoid insider attack. After the decryption process,
the key will be sent to the Authentication Server (AS). If the
key is matched, the AS grants access to the cloud services to
the user.
TABLE III. ALGORITHM FOR DECRYPTION
Step 1: Mobile Device receives the Key sent by Key Generator.
Step 2: Shifting the number of decimal places indicated by the last
bit of the encrypted key.
//If the key is 441312, the number of places shifted should be
2 from left to right. So, the value obtained is 44.131//
Step 3: Apply inverse of sine function to the key
//This helps in the reverse process of getting the original
key//
Step 4: Apply Antilog function to the obtained result in Step 3.
Step 5: The result of step 4 will give the original key in the
numerical format.
Step 6: The result obtained in the step 5 is then converted into ASCII
code to get the original string.
Step 7: This key is sent to the authentication server for getting access
to cloud applications.
VII. RESULTS AND DISCUSSIONS
The proposed algorithm is simulated in Java NetBeans 8 to
show the time taken for generating the key. The code is written
for both encryption and decryption are given in table II and
table III respectively. It is important to note that the time taken
for decryption is comparatively less than the time taken for the
decrypting the key. The obtained results are tabulated and
shown in the below table IV.
TABLE IV. TIME TAKEN FOR GENERATING KEY
S. No. Random Number Obtained key Time Taken (ms)
1 2Y%-a 999087 8
2 8W&o2 532466 24
3 6(A@n 380928 11
4 %0X2!k 566884 39
5 +9;sB 997240 17
VIII. CONCLUSION
This research work mainly focuses on secured
Authentication. Using Authentication parameters user’s
sensitive data can be protected from internal and external
attack. Proposed framework is used for identifying and
protecting user’s data. Key generation mechanism is proposed
to identify and authenticate the user’s data. Using this
mechanism Encryption and decryption process is done.
Cryptographic (Symmetric Key) technique is used to provide
ISSN: 2312-7694
Cecil et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 671-675
675 | P a g e
© IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com
secure communication between Cloud Service Provider and
users. It is more secure and efficiency.
REFERENCES
[1] R. Gokaj, M.Ali Aydin, R, Selami Zbey, “Mobile Cloud
Authentication and Secure Communication”, In Proc. of
International Conference on Information Security and
Cryptology, September 2013.
[2] Mohammad Rasoul momeni, Iman reza, “A lightweight
Authentication scheme for Mobile Cloud Computing”,
International Journal of Computer Science and Business
Informatics, Vol. 14, No. 2, ISSN: 1694-2108, September 2014,
pp. 56-61.
[3] Laleh Boroumand, Muhammad shiraz, Abdulla gani, Suleman
Khan, Syed Adeel ali shah, “A Review on Port knocking
Authentication Methods for Mobile cloud computing”, Journal
of Centre for mobile cloud computing research (C4MCCR),
Vol.4, Issue.2, October 2013.
[4] Costin Andrei, “Internet Banking Two- factor Authentication
using Smart Phones”, Journal of mobile Embedded and
Distributed Systems”, Vol. 4, Issue 1, ISSN: 2067-4074, June
2012
[5] Bhavana A., Alekhya v., Deepak k., Sreenivas, “Password
Authentication system for cloud Environment”, International
Journal of Advanced Computer science and Information
Technology (IJACSIT), Vol. 2, Issue 1, ISSN: 2320-0235,
January 2013.
[6] Thamba Meshach, K. S. Suresh Babu, “Secured and Efficient
Authentication scheme for Mobile cloud”, International Journal
of Innovations in Engineering and technology (IJIET), Vol. 2,
Issue 1, ISSN: 2319-1058, February 2013.
[7] Chunha Chen, Chris. j. Mitchell, Shaohua tang, “Ubiquitious
One Time Password (OTP) Service using the Generic
Authentication Architecture”, Mobile Network Applications,
ISSN.738-747, November 2013.
[8] Mahnosush Babaeizadeh, Majid Bakhitiari and Mohd Aizaini
maarof, “Keystroke Dynamic Authentication in Mobile Cloud
Computing”, International Journal of Computer Applications
(IJCA), Vol. 90, Issue 1, March 2014, pp. 29-36.
[9] Deepak G., Pradeep B., S. Shreyas srinath, “Dyanamic Key
Generation Algorithm for User Authentication at Mobile Cloud
Environment”, International Journal of Science and Research
(IJSR), Vol. 3, Issue 7, ISSN: 2319-7064, July 2014.
[10] A. Cecil Donald and L. Arockiam, “A Unified Cloud
Authenticator for Mobile Cloud Computing Environment”,
IJCA Proceedings on International Conference on Advanced
Computing and Communication Techniques for High
Performance Applications (ICACCTHPA 2014), February 2015,
ISSN: 0975 – 8887, pp. 29-34.

More Related Content

What's hot

MPROVING THE PRIVACY-PRESERVING OF COVID-19 BLUETOOTH-BASED CONTACT TRACI...
MPROVING THE PRIVACY-PRESERVING   OF COVID-19 BLUETOOTH-BASED   CONTACT TRACI...MPROVING THE PRIVACY-PRESERVING   OF COVID-19 BLUETOOTH-BASED   CONTACT TRACI...
MPROVING THE PRIVACY-PRESERVING OF COVID-19 BLUETOOTH-BASED CONTACT TRACI...
AIRCC Publishing Corporation
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
IJERA Editor
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
TELKOMNIKA JOURNAL
 
Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)
Conference Papers
 
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate System
IRJET Journal
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
Venkat Projects
 
Survey mobile app
Survey mobile appSurvey mobile app
Survey mobile app
eSAT Journals
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
IRJET Journal
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
YogeshIJTSRD
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
CSCJournals
 
Validation of early testing method for e government projects by requirement ...
Validation of early testing method for e  government projects by requirement ...Validation of early testing method for e  government projects by requirement ...
Validation of early testing method for e government projects by requirement ...
Conference Papers
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
acijjournal
 
Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Editor IJARCET
 
Hybrid dental charting system (hy decs)
Hybrid dental charting system (hy decs)Hybrid dental charting system (hy decs)
Hybrid dental charting system (hy decs)
Conference Papers
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
IJERA Editor
 
Security for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIsSecurity for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIs
idescitation
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
ijsrd.com
 

What's hot (20)

MPROVING THE PRIVACY-PRESERVING OF COVID-19 BLUETOOTH-BASED CONTACT TRACI...
MPROVING THE PRIVACY-PRESERVING   OF COVID-19 BLUETOOTH-BASED   CONTACT TRACI...MPROVING THE PRIVACY-PRESERVING   OF COVID-19 BLUETOOTH-BASED   CONTACT TRACI...
MPROVING THE PRIVACY-PRESERVING OF COVID-19 BLUETOOTH-BASED CONTACT TRACI...
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
 
Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)
 
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate System
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
 
Survey mobile app
Survey mobile appSurvey mobile app
Survey mobile app
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
 
Z041106163167
Z041106163167Z041106163167
Z041106163167
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
 
Validation of early testing method for e government projects by requirement ...
Validation of early testing method for e  government projects by requirement ...Validation of early testing method for e  government projects by requirement ...
Validation of early testing method for e government projects by requirement ...
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
 
Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404
 
Hybrid dental charting system (hy decs)
Hybrid dental charting system (hy decs)Hybrid dental charting system (hy decs)
Hybrid dental charting system (hy decs)
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
Security for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIsSecurity for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIs
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
 

Viewers also liked

Compact Fractal Based UWB Band Notch Antenna
Compact Fractal Based UWB Band Notch AntennaCompact Fractal Based UWB Band Notch Antenna
Modified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password EncryptionModified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password Encryption
International Journal of Computer and Communication System Engineering
 
Analysis of Male and Female Handwriting
Analysis of Male and Female HandwritingAnalysis of Male and Female Handwriting
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
International Journal of Computer and Communication System Engineering
 
An Approach of Improvisation in Efficiency of Apriori Algorithm
An Approach of Improvisation in Efficiency of Apriori AlgorithmAn Approach of Improvisation in Efficiency of Apriori Algorithm
An Approach of Improvisation in Efficiency of Apriori Algorithm
International Journal of Computer and Communication System Engineering
 
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
International Journal of Computer and Communication System Engineering
 
Real Time Parking Information Provider System on Android Phones
Real Time Parking Information Provider System on Android PhonesReal Time Parking Information Provider System on Android Phones
Real Time Parking Information Provider System on Android Phones
International Journal of Computer and Communication System Engineering
 
SMS BASED FIRST AID TREATMENT MANAGEMENT SYSTEM FOR RURAL AREAS OF BALTISTAN
SMS BASED FIRST AID TREATMENT MANAGEMENT SYSTEM FOR RURAL AREAS OF BALTISTANSMS BASED FIRST AID TREATMENT MANAGEMENT SYSTEM FOR RURAL AREAS OF BALTISTAN
SMS BASED FIRST AID TREATMENT MANAGEMENT SYSTEM FOR RURAL AREAS OF BALTISTAN
International Journal of Computer and Communication System Engineering
 
Measurement of Web Usability: An Approach
Measurement of Web Usability: An ApproachMeasurement of Web Usability: An Approach
Cloud Computing for Exploring to Scope in Business
Cloud Computing for Exploring to Scope in BusinessCloud Computing for Exploring to Scope in Business
Cloud Computing for Exploring to Scope in Business
International Journal of Computer and Communication System Engineering
 
Exploratory Analysis of Pakistan Software Industry on Quality Improvement by ...
Exploratory Analysis of Pakistan Software Industry on Quality Improvement by ...Exploratory Analysis of Pakistan Software Industry on Quality Improvement by ...
Exploratory Analysis of Pakistan Software Industry on Quality Improvement by ...
International Journal of Computer and Communication System Engineering
 
An Image-Based Bone fracture Detection Using AForge Library
An Image-Based Bone fracture Detection Using AForge LibraryAn Image-Based Bone fracture Detection Using AForge Library
An Image-Based Bone fracture Detection Using AForge Library
International Journal of Computer and Communication System Engineering
 
A novel adaptive algorithm for removal of power line interference from ecg si...
A novel adaptive algorithm for removal of power line interference from ecg si...A novel adaptive algorithm for removal of power line interference from ecg si...
A novel adaptive algorithm for removal of power line interference from ecg si...
International Journal of Computer and Communication System Engineering
 
Feasibility Study on e-Voting System
Feasibility Study on e-Voting SystemFeasibility Study on e-Voting System
Efficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdmaEfficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdma
International Journal of Computer and Communication System Engineering
 

Viewers also liked (16)

Compact Fractal Based UWB Band Notch Antenna
Compact Fractal Based UWB Band Notch AntennaCompact Fractal Based UWB Band Notch Antenna
Compact Fractal Based UWB Band Notch Antenna
 
Modified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password EncryptionModified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password Encryption
 
Analysis of Male and Female Handwriting
Analysis of Male and Female HandwritingAnalysis of Male and Female Handwriting
Analysis of Male and Female Handwriting
 
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
 
An Approach of Improvisation in Efficiency of Apriori Algorithm
An Approach of Improvisation in Efficiency of Apriori AlgorithmAn Approach of Improvisation in Efficiency of Apriori Algorithm
An Approach of Improvisation in Efficiency of Apriori Algorithm
 
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
 
Real Time Parking Information Provider System on Android Phones
Real Time Parking Information Provider System on Android PhonesReal Time Parking Information Provider System on Android Phones
Real Time Parking Information Provider System on Android Phones
 
SMS BASED FIRST AID TREATMENT MANAGEMENT SYSTEM FOR RURAL AREAS OF BALTISTAN
SMS BASED FIRST AID TREATMENT MANAGEMENT SYSTEM FOR RURAL AREAS OF BALTISTANSMS BASED FIRST AID TREATMENT MANAGEMENT SYSTEM FOR RURAL AREAS OF BALTISTAN
SMS BASED FIRST AID TREATMENT MANAGEMENT SYSTEM FOR RURAL AREAS OF BALTISTAN
 
Measurement of Web Usability: An Approach
Measurement of Web Usability: An ApproachMeasurement of Web Usability: An Approach
Measurement of Web Usability: An Approach
 
Cloud Computing for Exploring to Scope in Business
Cloud Computing for Exploring to Scope in BusinessCloud Computing for Exploring to Scope in Business
Cloud Computing for Exploring to Scope in Business
 
Exploratory Analysis of Pakistan Software Industry on Quality Improvement by ...
Exploratory Analysis of Pakistan Software Industry on Quality Improvement by ...Exploratory Analysis of Pakistan Software Industry on Quality Improvement by ...
Exploratory Analysis of Pakistan Software Industry on Quality Improvement by ...
 
An Image-Based Bone fracture Detection Using AForge Library
An Image-Based Bone fracture Detection Using AForge LibraryAn Image-Based Bone fracture Detection Using AForge Library
An Image-Based Bone fracture Detection Using AForge Library
 
Mobile Effects on Human Body
Mobile Effects on Human BodyMobile Effects on Human Body
Mobile Effects on Human Body
 
A novel adaptive algorithm for removal of power line interference from ecg si...
A novel adaptive algorithm for removal of power line interference from ecg si...A novel adaptive algorithm for removal of power line interference from ecg si...
A novel adaptive algorithm for removal of power line interference from ecg si...
 
Feasibility Study on e-Voting System
Feasibility Study on e-Voting SystemFeasibility Study on e-Voting System
Feasibility Study on e-Voting System
 
Efficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdmaEfficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdma
 

Similar to Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environment

Biometric Identification and Authentication Providence using Fingerprint for ...
Biometric Identification and Authentication Providence using Fingerprint for ...Biometric Identification and Authentication Providence using Fingerprint for ...
Biometric Identification and Authentication Providence using Fingerprint for ...
IJECEIAES
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
IJNSA Journal
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationSecuring Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print Authentication
IJNSA Journal
 
Kx3518741881
Kx3518741881Kx3518741881
Kx3518741881
IJERA Editor
 
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosSingle Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Deepak Bagga
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
IRJET Journal
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
idescitation
 
An interoperability framework for
An interoperability framework forAn interoperability framework for
An interoperability framework for
IJCNCJournal
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
IJERD Editor
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
Editor IJCATR
 
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingA Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
James Heller
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
Putra Wanda
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
SHREYASSRINATH94
 
Android Based Total Security for System Authentication
Android Based Total Security for System AuthenticationAndroid Based Total Security for System Authentication
Android Based Total Security for System Authentication
IJERA Editor
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
A secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOpsA secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOps
nooriasukmaningtyas
 
A Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingA Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud Computing
Suzanne Simmons
 

Similar to Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environment (20)

Biometric Identification and Authentication Providence using Fingerprint for ...
Biometric Identification and Authentication Providence using Fingerprint for ...Biometric Identification and Authentication Providence using Fingerprint for ...
Biometric Identification and Authentication Providence using Fingerprint for ...
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationSecuring Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print Authentication
 
Kx3518741881
Kx3518741881Kx3518741881
Kx3518741881
 
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosSingle Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using Kerberos
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
An interoperability framework for
An interoperability framework forAn interoperability framework for
An interoperability framework for
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
 
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingA Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Android Based Total Security for System Authentication
Android Based Total Security for System AuthenticationAndroid Based Total Security for System Authentication
Android Based Total Security for System Authentication
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOpsA secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOps
 
A Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingA Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud Computing
 

More from International Journal of Computer and Communication System Engineering

Cloud Security Analysis for Health Care Systems
Cloud Security Analysis for Health Care SystemsCloud Security Analysis for Health Care Systems
Cloud Security Analysis for Health Care Systems
International Journal of Computer and Communication System Engineering
 
Implementing Pareto Analysis of Total Quality Management for Service Industri...
Implementing Pareto Analysis of Total Quality Management for Service Industri...Implementing Pareto Analysis of Total Quality Management for Service Industri...
Implementing Pareto Analysis of Total Quality Management for Service Industri...
International Journal of Computer and Communication System Engineering
 
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
International Journal of Computer and Communication System Engineering
 
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
International Journal of Computer and Communication System Engineering
 
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGESCLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
International Journal of Computer and Communication System Engineering
 
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
International Journal of Computer and Communication System Engineering
 
Gabor Filter
Gabor FilterGabor Filter
SCTUR: A Sentiment Classification Technique for URDU
SCTUR: A Sentiment Classification Technique for URDUSCTUR: A Sentiment Classification Technique for URDU
SCTUR: A Sentiment Classification Technique for URDU
International Journal of Computer and Communication System Engineering
 
A NOVEL METHOD FOR HIDING INFORMATION
A NOVEL METHOD FOR HIDING INFORMATIONA NOVEL METHOD FOR HIDING INFORMATION
Analytical Survey on Bug Tracking System
Analytical Survey on Bug Tracking SystemAnalytical Survey on Bug Tracking System
Intelligent Mobile Hospital Appointment Scheduling and Medicine Collection
Intelligent Mobile Hospital Appointment Scheduling and Medicine CollectionIntelligent Mobile Hospital Appointment Scheduling and Medicine Collection
Intelligent Mobile Hospital Appointment Scheduling and Medicine Collection
International Journal of Computer and Communication System Engineering
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
International Journal of Computer and Communication System Engineering
 

More from International Journal of Computer and Communication System Engineering (13)

Cloud Security Analysis for Health Care Systems
Cloud Security Analysis for Health Care SystemsCloud Security Analysis for Health Care Systems
Cloud Security Analysis for Health Care Systems
 
Implementing Pareto Analysis of Total Quality Management for Service Industri...
Implementing Pareto Analysis of Total Quality Management for Service Industri...Implementing Pareto Analysis of Total Quality Management for Service Industri...
Implementing Pareto Analysis of Total Quality Management for Service Industri...
 
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
 
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
 
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGESCLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
 
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
 
Rp 3010 5814
Rp 3010 5814Rp 3010 5814
Rp 3010 5814
 
Gabor Filter
Gabor FilterGabor Filter
Gabor Filter
 
SCTUR: A Sentiment Classification Technique for URDU
SCTUR: A Sentiment Classification Technique for URDUSCTUR: A Sentiment Classification Technique for URDU
SCTUR: A Sentiment Classification Technique for URDU
 
A NOVEL METHOD FOR HIDING INFORMATION
A NOVEL METHOD FOR HIDING INFORMATIONA NOVEL METHOD FOR HIDING INFORMATION
A NOVEL METHOD FOR HIDING INFORMATION
 
Analytical Survey on Bug Tracking System
Analytical Survey on Bug Tracking SystemAnalytical Survey on Bug Tracking System
Analytical Survey on Bug Tracking System
 
Intelligent Mobile Hospital Appointment Scheduling and Medicine Collection
Intelligent Mobile Hospital Appointment Scheduling and Medicine CollectionIntelligent Mobile Hospital Appointment Scheduling and Medicine Collection
Intelligent Mobile Hospital Appointment Scheduling and Medicine Collection
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
 

Recently uploaded

space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 

Recently uploaded (20)

space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 

Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environment

  • 1. ISSN: 2312-7694 Cecil et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 671-675 671 | P a g e © IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environment A. Cecil Donald Research Scholar in Computer Science St. Joseph’s College (Autonomous) Tiruchirappalli, Tamil Nadu, India M. Regin M. Phil. Scholar in Computer Science St. Joseph’s College (Autonomous) Tiruchirappalli, Tamil Nadu, India Dr. A. Aloysius Assistant Professor in Computer Science St. Joseph’s College (Autonomous) Tiruchirappalli, Tamil Nadu, India Dr. L. Arockiam Associate Professor in Computer Science St. Joseph’s College (Autonomous) Tiruchirappalli, Tamil Nadu, India Abstract— Mobile Cloud Computing (MCC) is the profitable field in business and it reduces the running and developing cost of mobile applications and mobile users. In this emerging technology security is the main issue as it combines the concept of Mobile Computing and Cloud Computing. This paper focuses on the Authentication which is one of the five pillars of Information Assurance (IA). Critical analysis is made based on the various existing mechanisms. In this paper, a user authentication framework is proposed to authenticate users in mobile cloud environment using Dynamic Key Generation Algorithm. The algorithm is categorized into six phases: Registration, Communication, Key Generation, Key Sending, Encryption & Decryption and Authentication. The proposed algorithm is lightweight which reduces the computation load and easy to use. The process of encryption and decryption is used to make the communication more secure. Moreover, the proposed work is resilient against Denial of Service (DoS) attack, Known plaintext attack, Masquerading attack and insider attack. Index Terms— Authentication, Key Generation, Mobile Cloud Computing (MCC), Security, Dynamic Key. I. INTRODUCTION Mobile Cloud Computing (MCC) is the rich technology for mobile devices. The Main goal of MCC is to enable execution of rich mobile applications on mobile devices, with a rich user experience. MCC provides more opportunities for cloud providers as well as Mobile Network Providers. The secure communication of today’s mobile devices is of high interest because the threats have increased and it is now not easy to handle the billions of devices securely [1]. Authentication is the most important factor to protect systems against attacks, and authentication methods should be lightweight, also computation and communication costs should be little [2]. The combination of cloud computing and mobile computing introduces mobile cloud computing, which also present new issues of security threats such as unauthorized access to resources exists in mobile cloud. In MCC, Authentication is the main security issue as it is the doorstep for all process. The proposed framework uses the Pseudo Random Number Generation (PRNG) algorithm to generate the key. The proposed algorithm resists the Denial of Service (DoS), Plain Text Attack, Masquerading attack and insider attack. It takes less time for key generation. Section II describes the Motivation of the research work. Section III discusses the related authentication mechanisms and methodologies, section IV analyses and compares the existing authentication mechanisms. Section V represents issues and challenges of authentication mechanisms, and section VI presents the proposed framework, components and workflow diagram and the algorithm for proposed work. Section VII projects the results and discussions of the proposed work and finally, Section VIII concludes the paper. II. MOTIVATION Mobile computing is the emerging technology. MCC has many open issues which is not yet solved. Security is one of the major issues in Mobile cloud environment. Authentication is one of the important factors in security which is used to prevent user’s data from unauthorized access. Traditional Authentication methods didn’t provide a reliable security to the user and the Cloud Service Provider. So, it is essential to develop an efficient mechanism to provide better security to the user’s data in mobile cloud environment. Developing mechanism should be light weight. III. LITERATURE BACKGROUND Laleh Boroumand et al. [3] have proposed port knocking method for authentication in mobile cloud computing. Current port knocking method is divided into two main categories, which includes static and dynamic knock sequences. The port knocking authentication methods are compared on the basis of significant parameters that illustrate the commonalities and differences in current methods. In this paper they also discussed the integrity and suitability of the port knocking authentication method for Mobile Cloud Computing. Port knocking method provides a lightweight application layer solution for addressing the security issues in Mobile Cloud Computing. It provides a suitable security layer to ensure authentic communication between smart mobile devices and Mobile Cloud Computing. Current port-knocking authentication methods are compared based on static or
  • 2. ISSN: 2312-7694 Cecil et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 671-675 672 | P a g e © IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com dynamic knocked sequences, which tend to solve the Network Address Translation knock and Denial of Service attacks. Costin Andrei et al. [4] described a method for implementing two-factor authentication using smart phones as software tokens. The proposed system will use the mobile phone as software token and generate unique one time passwords (OTP). It will be used when authenticating to an Internet Banking application. The tokens can also serve as a method of signing online money orders. They have focused on the implementation of two-factor authentication on any smart- phone that allows third-party developers to add and run applications such as Android, Apple's iOS, Windows Phone, BlackBerry OS, Symbian. The implemented demo application was created for only Android, but can be easily written on any other operating system. Bhavana et al. [5] have proposed a new framework called Password Authentication System for Cloud Environment (PASCE), which is immune to the common attacks suffered by other verification schemes. Password Authentication System for Cloud Environment (PASCE) uses graphical authentication system with image in reshuffled format when the data upload/download into the cloud account. This technique can be classified into two categories: 1. Recognition-based graphical technique. 2. Recall based graphical technique. No password information is exchanged between the client and the server by using PAS authentication system. Strength of PASCE is creating a good verification space. Thamba Meshach et al. [6] presented the current state of mobile-cloud authentication technology and the proposed system Mobile Cloud Key Exchange (MCKE), an authenticated key exchange scheme that aims at efficient authentication. This scheme is designed based on randomness- reuse strategy and Internet Key Exchange (IKE) scheme. Theoretical analysis and simulation results are compared with the IKE scheme; the Mobile Cloud Key Exchange scheme can improve the efficiency and reduce time consumption and computation load without sacrificing the level of security. This scheme has been designed based on the commonly-used Internet Key Exchange (IKE) scheme and randomness-reuse strategy. Chunhua Chen et al. [7] proposed a general scheme that converts a simple static password authentication mechanism into a one-time password (OTP) system using the GAA key establishment service. The scheme uses a GAA-enabled user device and a GAA-aware server. OTP systems use a dedicated key-bearing token, so that the user device does not need to be user or server specific, and can be used in the protocol with no registration or configuration (except for the installation of the necessary application software). The Proposed scheme is secure, scalable and fits well to the multi-institution scenario, and enable the provision of ubiquitous and on-demand OTP services. It fits well to the multi institution scenario. User needs only a GAA enabled mobile phone with a valid subscription. Mahnoush Babaeizadeh et al. [8] have proposed Keystroke Dynamic Authentication (KDA). It is a type of behavioral biometric authentication. It is based on behavioral style of each person’s typing on a keyboard. It can identify the user based on their habitual typing pattern. Keystroke dynamics implies on the process of measuring human’s typing rhythm on digital devices. In another words, it is not important what you type, but how you type. In this paper, Google Drive is considered as data storage. Authors have used keystroke authentication in mobile communication. It helps to identify users based on their unique behavioral biometric and unlike the other biometric methods, Keystroke analysis does not require the aid of extra special tools. Therefore, it is cheaper than other type of biometric authentication methods. Deepak et al. [9] proposed a secure mobile cloud-based algorithm, where the user's mobile phone is used as an authentication device, presenting a onetime encrypted password for the user and password is decrypted using Dynamic key generation algorithm in user's mobile application. The authors also described key security considerations and challenges which are currently faced in the Cloud. IV. ANALYSIS ON EXISTING MECHANISMS From the literature of existing authentication mechanisms [10], a comparative analysis is made to clearly understand the problems in Mobile Cloud explained in table I. TABLE I. ANALYSIS OF VARIOUS AUTHENTICATION MECHANISMS Author Proposed Work Advantages Drawbacks / Limitations Francisco et al. One- two- and three factor authentication Mechanism Provides Strong security, Easy to use Not suitable for all environments Yogesh Patel et al. Multilevel Authentication Provides service level security and provides User Based Access Control User needs to enter credentials every session Yeh et al. Visual Password Authentication Scheme No need to remember any passwords Larger variability in the voiceprint characteristics, Information Loss Rassan et al. Fingerprint Authentication Mechanism Improved Performance and Security No input is allowed from user to enter the system Vineet Guha et al. Key Generation Mechanism Network Key, Suits SaaS & PaaS Inaccurate results Indrajit Das et al. Authentication Mechanism Light weight Not Secure Mohamma d et al. Lightweight Authentication Protocol Easy and Reduces Latency Consumes more time especially in wireless communications. Jin et al. Mobile Device authentication Supports authorization service, device certification RADIUS server can’t provide security services Davit Authentication and Authorization Flexible, security, No Privacy
  • 3. ISSN: 2312-7694 Cecil et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 671-675 673 | P a g e © IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com techniques reliable and effective Chow et al. Behavioral Authentication Trust Cube Method Not Supported for all devices Gokaj et al. Mobile Signature Authentication Lightweight Mechanism Unable to detect the attacks Deepa et al. Multifactor authentication using smart phones as software tokens. No external Devices and generates unique One Time Passwords (OTP) User Anonymity and Availability is not addressed Sanjoli et al. Rijndael encryption with EAP-CHAP encryption Provides Authentication and Authorization Prone Server Port attack Kashif et al. SSO based authentication Ability to access Multiple Services Prone to man-in- the Middle Attack Neha et al. Data encryption and Key Exchange mechanism Secure Connection Time delay due to Complexity V. ISSUES AND CHALLENGES From the comprehensive literature review of existing and proposed frameworks of MCC explained in the above section, it is evident that there are some major issues and challenges in MCC. Those issues and challenges are highlighted and categorized below. The security related issues are then divided into two broad categories as listed below. A. Mobile Cloud Infrastructure Issues B. Mobile Cloud Communication Channel Issues A. Mobile Cloud Infrastructure Issues From cloud infrastructure point of view, a variety of attacks are possible on the cloud. Some of these attacks are given below.  Attacks on Virtual Machines  Authorization and Authentication  Attacks from Local Users  Hybrid Cloud Security Management Issues B. Mobile Cloud Communication Channel Issues A lot of improvement needs to be done in the mobile cloud communication channel. The following attacks exist on communication channel.  Access Control Attacks  Attacks on Authentication  Attacks on Availability  Data Integrity Attacks VI. PROPOSED AUTHENTICATION FRAMEWORK The proposed mechanism holds six phases where each phase is involved in authentication process. Fig 1 shows the methodology of the proposed authentication mechanism. A. Components of Framework i. Users User uses the mobile device to access the cloud application services through login process. User can be classified as Individual Users, Enterprise Users, Administrators, etc. ii. Mobile Network (MN) Mobile Network (MN) plays an important role in Mobile Cloud which provides the network to the user. It acts as an intermediator between mobile user and server. The MN authenticated the user by using the existing strong mechanisms like AAA which resides in the AAA Server / RADIUS Server. Fig 1. Proposed MobiCloud Authentication Framework iii. Authentication Server (AS) Authentication server performs the authentication using an efficient algorithm. The purpose is to validate the user’s identity using user credentials like username, password and other Unique Entities etc. When user submits his/her details, the AS receives the request in the encrypted form that no intermediator can view/understand the data. iv. Cloud Storage Database is a structured collection of records, files or data which is used to store the user’s details in computer system. v. Key Generator (KG) Key Generator plays a vital role in the authentication process where it generates the key for performing authentication and granting access to the appropriate cloud services. Keys can be of two types: One is the Symmetric Key where it has only one key that can be used for encryption/ decryption and other one is Asymmetric key where it uses two keys. (i.e.) a Private Key and a Public Key. vi. Cloud Service Provider (CSP) Cloud Service Provider is a third party who provides the Cloud Services. CSP shall provide any kind of services on the “Pay-as-you-go” basis. Google, Amazon, IBM are the major Cloud Service Providers. The CSP has the tie-up
  • 4. ISSN: 2312-7694 Cecil et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 671-675 674 | P a g e © IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com with the user using Cloud Resource Policy / Service Level Agreement (SLA). B. Authentication Phase Registration is done only once when mobile user wants to access mobile cloud services. After registration whenever mobile user wants to use mobile cloud services, he/she must be authenticated. The mobile user submits his/her login details and unique information to the Cloud Authentication Server (CAS). Those details are encrypted and stored in the cloud database. Now, the cloud server checks for identity and if it is matched, the user is prompted for the key. At the same time key generator generates a key which is sent to the user and also to the database through Cloud Authentication Server (CAS). User provides the received key to the CAS to access the desired cloud services. The Cloud Authentication Server checks for the key and provides the access if it is matched. The access is controlled by Cloud Controller (CC). Finally, the Cloud Controller provides the Cloud Application Services. C. Workflow Diagram of Proposed Work User Registration Login Checks Authorized or Not Re-login / Unauthorized User Insists for Key Generation Key with Acknowledgement Authentication Server Check for Key Matching Access Cloud Services Invalid Key Deny Access Yes Yes No No Fig 2. Process Flow Diagram for Authentication D. Dynamic Key Generation Algorithm Table II explains the encryption algorithm which is used for generating a key using a Pseudo Random Number Generation (PRNG). Here, cryptographically strong PRNG algorithm is considered in which no intruder can predict as the random is more. Then, each character is converted into ASCII character code. The log function is applied on the obtained result. Finally, trigonometric function on the value. This rounded value acts as the key and sent to the desired user. TABLE II. ALGORITHM FOR ENCRYPTION Step 1: Generate random string using PRNG. //Generated random string may be A-Z, a-z, 0-9 // Step 2: Convert each character into its equivalent ASCII code. Step 3: Apply log function to the obtained result in step 2. Step 4: Apply trigonometric function to the result obtained in the step 3. Round the value to 4 decimal places. Step 5: Transmit the key (step 4 result) to mobile device of the user. The following table III shows the algorithm for decrypting the encrypted key. The Decryption process is taken place at the user side to avoid insider attack. After the decryption process, the key will be sent to the Authentication Server (AS). If the key is matched, the AS grants access to the cloud services to the user. TABLE III. ALGORITHM FOR DECRYPTION Step 1: Mobile Device receives the Key sent by Key Generator. Step 2: Shifting the number of decimal places indicated by the last bit of the encrypted key. //If the key is 441312, the number of places shifted should be 2 from left to right. So, the value obtained is 44.131// Step 3: Apply inverse of sine function to the key //This helps in the reverse process of getting the original key// Step 4: Apply Antilog function to the obtained result in Step 3. Step 5: The result of step 4 will give the original key in the numerical format. Step 6: The result obtained in the step 5 is then converted into ASCII code to get the original string. Step 7: This key is sent to the authentication server for getting access to cloud applications. VII. RESULTS AND DISCUSSIONS The proposed algorithm is simulated in Java NetBeans 8 to show the time taken for generating the key. The code is written for both encryption and decryption are given in table II and table III respectively. It is important to note that the time taken for decryption is comparatively less than the time taken for the decrypting the key. The obtained results are tabulated and shown in the below table IV. TABLE IV. TIME TAKEN FOR GENERATING KEY S. No. Random Number Obtained key Time Taken (ms) 1 2Y%-a 999087 8 2 8W&o2 532466 24 3 6(A@n 380928 11 4 %0X2!k 566884 39 5 +9;sB 997240 17 VIII. CONCLUSION This research work mainly focuses on secured Authentication. Using Authentication parameters user’s sensitive data can be protected from internal and external attack. Proposed framework is used for identifying and protecting user’s data. Key generation mechanism is proposed to identify and authenticate the user’s data. Using this mechanism Encryption and decryption process is done. Cryptographic (Symmetric Key) technique is used to provide
  • 5. ISSN: 2312-7694 Cecil et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 671-675 675 | P a g e © IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com secure communication between Cloud Service Provider and users. It is more secure and efficiency. REFERENCES [1] R. Gokaj, M.Ali Aydin, R, Selami Zbey, “Mobile Cloud Authentication and Secure Communication”, In Proc. of International Conference on Information Security and Cryptology, September 2013. [2] Mohammad Rasoul momeni, Iman reza, “A lightweight Authentication scheme for Mobile Cloud Computing”, International Journal of Computer Science and Business Informatics, Vol. 14, No. 2, ISSN: 1694-2108, September 2014, pp. 56-61. [3] Laleh Boroumand, Muhammad shiraz, Abdulla gani, Suleman Khan, Syed Adeel ali shah, “A Review on Port knocking Authentication Methods for Mobile cloud computing”, Journal of Centre for mobile cloud computing research (C4MCCR), Vol.4, Issue.2, October 2013. [4] Costin Andrei, “Internet Banking Two- factor Authentication using Smart Phones”, Journal of mobile Embedded and Distributed Systems”, Vol. 4, Issue 1, ISSN: 2067-4074, June 2012 [5] Bhavana A., Alekhya v., Deepak k., Sreenivas, “Password Authentication system for cloud Environment”, International Journal of Advanced Computer science and Information Technology (IJACSIT), Vol. 2, Issue 1, ISSN: 2320-0235, January 2013. [6] Thamba Meshach, K. S. Suresh Babu, “Secured and Efficient Authentication scheme for Mobile cloud”, International Journal of Innovations in Engineering and technology (IJIET), Vol. 2, Issue 1, ISSN: 2319-1058, February 2013. [7] Chunha Chen, Chris. j. Mitchell, Shaohua tang, “Ubiquitious One Time Password (OTP) Service using the Generic Authentication Architecture”, Mobile Network Applications, ISSN.738-747, November 2013. [8] Mahnosush Babaeizadeh, Majid Bakhitiari and Mohd Aizaini maarof, “Keystroke Dynamic Authentication in Mobile Cloud Computing”, International Journal of Computer Applications (IJCA), Vol. 90, Issue 1, March 2014, pp. 29-36. [9] Deepak G., Pradeep B., S. Shreyas srinath, “Dyanamic Key Generation Algorithm for User Authentication at Mobile Cloud Environment”, International Journal of Science and Research (IJSR), Vol. 3, Issue 7, ISSN: 2319-7064, July 2014. [10] A. Cecil Donald and L. Arockiam, “A Unified Cloud Authenticator for Mobile Cloud Computing Environment”, IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ICACCTHPA 2014), February 2015, ISSN: 0975 – 8887, pp. 29-34.