JOURNAL ARTICLE

MOBILE CLOUD COMPUTING SERVICES AUTHENTICATION SCHEME

Safana A. AbdulrahmanM. F. Al-Gailani

Year: 2022 Journal:   Iraqi Journal of Information & Communications Technology Vol: 5 (3)Pages: 1-14

Abstract

Because of the rapid growth of cloud computing and the expansion of mobile phone users in recent years, mobile cloud computing has attracted wide attention. In the mobile cloud, wireless computing networks are the basics of sharing data between mobile devices and cloud services. Since air is the communication medium, it must be properly protected; otherwise, it will be subject to a variety of security threats, for example, attacks from middle-man, identity tracking, etc... Furthermore, mobile devices are limited in storage, resources, and computing powers. Hence, designing an efficient and secure balance of authentication schemes is extremely important. First of all, a multi-factor authentication scheme based on biometric (fingerprint information), hash function, and fuzzy vault algorithm is presented in that paper. Secondly, the Validation and Analysis tool of AVISPA Security was approved. Thirdly, the security of the scheme proposed is compared to other related schemes.

Keywords:
Computer science Mobile cloud computing Cloud computing Computer security Authentication (law) Mobile computing Cloud computing security Hash function Mobile phone Mobile device Computer network Telecommunications World Wide Web Operating system

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
26
Refs
0.17
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Biometric Identification and Security
Physical Sciences →  Computer Science →  Signal Processing
Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications
User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems
© 2026 ScienceGate Book Chapters — All rights reserved.