Open Access   Article Go Back

Mobile Cloud Computing Authentication: Methods and Techniques with Capabilities, Limitations

Manjusha Anant Shinde1 , Jadhav Shradha Ramesh2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-12 , Page no. 547-552, Dec-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i12.547552

Online published on Dec 31, 2018

Copyright © Manjusha Anant Shinde, Jadhav Shradha Ramesh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Manjusha Anant Shinde, Jadhav Shradha Ramesh, “Mobile Cloud Computing Authentication: Methods and Techniques with Capabilities, Limitations,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.547-552, 2018.

MLA Style Citation: Manjusha Anant Shinde, Jadhav Shradha Ramesh "Mobile Cloud Computing Authentication: Methods and Techniques with Capabilities, Limitations." International Journal of Computer Sciences and Engineering 6.12 (2018): 547-552.

APA Style Citation: Manjusha Anant Shinde, Jadhav Shradha Ramesh, (2018). Mobile Cloud Computing Authentication: Methods and Techniques with Capabilities, Limitations. International Journal of Computer Sciences and Engineering, 6(12), 547-552.

BibTex Style Citation:
@article{Shinde_2018,
author = {Manjusha Anant Shinde, Jadhav Shradha Ramesh},
title = {Mobile Cloud Computing Authentication: Methods and Techniques with Capabilities, Limitations},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {6},
Issue = {12},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {547-552},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3377},
doi = {https://doi.org/10.26438/ijcse/v6i12.547552}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i12.547552}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3377
TI - Mobile Cloud Computing Authentication: Methods and Techniques with Capabilities, Limitations
T2 - International Journal of Computer Sciences and Engineering
AU - Manjusha Anant Shinde, Jadhav Shradha Ramesh
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 547-552
IS - 12
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
374 249 downloads 189 downloads
  
  
           

Abstract

Today the capabilities of mobile devices have improved real world user friendly applications, storage and feature support. The storage capacity can tremendously be increased with the use of cloud computing. Cloud computing is a flexible, cost effective and proven delivery platform for providing services. Mobile cloud computing means the availability of cloud computing services in a mobile environment. There are various authentication techniques being used like password, log off system, Biometric techniques. This process serves as a protection against different sorts of attacks where the goal is to confirm the identity of a user and the user requests services from cloud servers. Multiple authentication technologies have been put forward so far that confirm user identity before giving the permit to access resources. Authentication in cloud was fully explained in this paper together with the existing methods and the factors with its limitations.

Key-Words / Index Term

cloud computing , mobile cloud computing, authentication techniques

References

[1] Yogesh patel, Nidhi sethi, “Enhancing Security in Cloud Computing using Multilevel Authentication”,International Journal of Electrical and Electronics & computer Science Engineering, Vol. 1, Issue 1, February 2014, ISSN: 2348-2273, pp. 320-325.
[2] DeeptiSahu, Shipra Sharma, VandanaDubey, AlpikaTripathi” Cloud Computing in Mobile Applications”InternationalJournal of Scientific and Research Publications, Volume 2,Issue 8, August 2012.
[3] Wikipedia, http://en.wikipedia.org/wiki/MCC_stored data.
[4] Her Tyan Yeh, Bing chang chen, Yi-cong wu, “Mobile user Authentication System in Cloud Environment”,International Journal of Security and Communication Networks, November 2012, pp. 74-79.
[5] Indrajit Das, Riya Das, “Mobile Security (OTP) by Cloud Computing”, International Journal of Innovations in Engineering and Technology (IJIET), Vol. 2, Issue 4, August 2013, ISSN: 2319-1058, pp. 114-118.
[6] Mahnoush Babau Zadeh, Majit Bhaktiari, Mohol Aizaini Maar, “Keystroke Dynamic Authentication in Mobile Cloud Computing”, International Journal of Computer Applications, Vol. 90, No.1, March 2014, ISSN: 0975-8887, pp. 35-39.
[7] Jin mookkim, Jeong-Kyung moon, “Secure Authentication System for Hybrid Cloud service in Mobile Communication Environments”, International Journal of Distributed Sensor Networks, Vol. 2, July 2014, pp. 62-66.
[8] Davit Hakobyan, “Authentication and Authorization Systems in Cloud Environments, International Journal of Information and Communication Technology, Vol. 4, Issue 5, October 2012, pp. 165-169.
[9] Richard Chaw, Markus Jakobsson, Ryusuke Arasuoka, “Authentication in the Clouds: A Framework and its Application to Mobile Users”, CCSW, ACM, October 2012, pp. 352-358.
[10] R. Gokaj, M. Ali Aydin, R, Selami Z bey, “Mobile Cloud Authentication and Secure Communication”, In Proc. of International Conference on Information Security and Cryptology, September 2013, pp. 42-45.
[11] Google books accessed via,http://books.google.com (2016)
[12] R. W. Lucky, “Cloud computing”, IEEE Journal of Spectrum, Vol. 46, No. 5, May 2009, pages 27-45.
[13] cloud computing, www.wikipedia.com.
[14]http://www.crn.com/news/cloud/231900862/box-net-one-ups-apple-icloud-with-50-gb-free-cloud-storage.htm