Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing

The purpose of this project is to design and implement a framework that employs unique authentication method that relies on third party identification which is required to accurately identify and authenticate legitimate user in order to reduce the risk of disclosing confidential data to unauthorized...

Full description

Bibliographic Details
Main Authors: Lim, Tsu Chean, Ponnusamy, Vasaki, Sulaiman, Mohamed Fati
Format: Article
Language:English
Published: 2018
Subjects:
Online Access:http://eprints.intimal.edu.my/1183/
http://eprints.intimal.edu.my/1183/1/water-10-00998%20%281%29.pdf
_version_ 1848766667654430720
author Lim, Tsu Chean
Ponnusamy, Vasaki
Sulaiman, Mohamed Fati
author_facet Lim, Tsu Chean
Ponnusamy, Vasaki
Sulaiman, Mohamed Fati
author_sort Lim, Tsu Chean
building INTI Institutional Repository
collection Online Access
description The purpose of this project is to design and implement a framework that employs unique authentication method that relies on third party identification which is required to accurately identify and authenticate legitimate user in order to reduce the risk of disclosing confidential data to unauthorized party in Mobile Cloud Computing, MCC. Cloud computing is a service provided for user to store and process their data online instead of local device. Mobile Cloud computing which is an extension of the cloud computing service allows user to remotely access their data and services that are being uploaded to the cloud beforehand in any place and any time as long as they have internet connection in their personal mobile device. Throughout the period of the mobile cloud computing era, the security has always been a concern and post as a formidable challenge even for experienced security specialist. Moreover, encryption method such as RSA and Diffie Hellman cryptosystem proven to be useless against the attacks launched by quantum computer. Hence, Homomorphic Signature scheme is introduced along with the Identity Management (IDM) server into the mobile cloud computing in order to address this issue by applying implicit authentication method to differentiate between the genuine and non-genuine user which allows system to authenticate the clients accurately. The details of the framework will be further explained later in this paper, where the user will be authenticated with IDM as medium and no password is used throughout the authentication process, allowing the client to be safely authenticated at the end of the process.
first_indexed 2025-11-14T11:54:47Z
format Article
id intimal-1183
institution INTI International University
institution_category Local University
language English
last_indexed 2025-11-14T11:54:47Z
publishDate 2018
recordtype eprints
repository_type Digital Repository
spelling intimal-11832018-10-18T09:50:05Z http://eprints.intimal.edu.my/1183/ Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing Lim, Tsu Chean Ponnusamy, Vasaki Sulaiman, Mohamed Fati QA75 Electronic computers. Computer science The purpose of this project is to design and implement a framework that employs unique authentication method that relies on third party identification which is required to accurately identify and authenticate legitimate user in order to reduce the risk of disclosing confidential data to unauthorized party in Mobile Cloud Computing, MCC. Cloud computing is a service provided for user to store and process their data online instead of local device. Mobile Cloud computing which is an extension of the cloud computing service allows user to remotely access their data and services that are being uploaded to the cloud beforehand in any place and any time as long as they have internet connection in their personal mobile device. Throughout the period of the mobile cloud computing era, the security has always been a concern and post as a formidable challenge even for experienced security specialist. Moreover, encryption method such as RSA and Diffie Hellman cryptosystem proven to be useless against the attacks launched by quantum computer. Hence, Homomorphic Signature scheme is introduced along with the Identity Management (IDM) server into the mobile cloud computing in order to address this issue by applying implicit authentication method to differentiate between the genuine and non-genuine user which allows system to authenticate the clients accurately. The details of the framework will be further explained later in this paper, where the user will be authenticated with IDM as medium and no password is used throughout the authentication process, allowing the client to be safely authenticated at the end of the process. 2018-04-28 Article PeerReviewed text en http://eprints.intimal.edu.my/1183/1/water-10-00998%20%281%29.pdf Lim, Tsu Chean and Ponnusamy, Vasaki and Sulaiman, Mohamed Fati (2018) Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing. 2018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE).
spellingShingle QA75 Electronic computers. Computer science
Lim, Tsu Chean
Ponnusamy, Vasaki
Sulaiman, Mohamed Fati
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
title Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
title_full Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
title_fullStr Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
title_full_unstemmed Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
title_short Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
title_sort authentication scheme using unique identification method with homomorphic encryption in mobile cloud computing
topic QA75 Electronic computers. Computer science
url http://eprints.intimal.edu.my/1183/
http://eprints.intimal.edu.my/1183/1/water-10-00998%20%281%29.pdf