Soft Computing

, Volume 21, Issue 10, pp 2643–2649

Towards secure and cost-effective fuzzy access control in mobile cloud computing

  • Wei Wu
  • Shun Hu
  • Xu Yang
  • Joseph K. Liu
  • Man Ho Au
Methodologies and Application

DOI: 10.1007/s00500-015-1964-2

Cite this article as:
Wu, W., Hu, S., Yang, X. et al. Soft Comput (2017) 21: 2643. doi:10.1007/s00500-015-1964-2

Abstract

In this article, we suggest a secure and cost-effective fuzzy access control protocol in mobile cloud computing. It is especially designed for small and medium enterprises (SMEs) providing business-to-customers services. Our protocol allows the SME to outsource its services to a cloud to reduce the running cost. At the same time, it does not require any communication between the cloud and the SME during user authentication stage. That is, SME can be offline after users have been registered. Users directly deal with the cloud for gaining access. This helps the SME to save a lot of resources, including a large bandwidth connecting with the cloud and a strong firewall system. Meanwhile, the user database never leaves the SME. In addition, our protocol can withstand common attacks such as dictionary attacks for server and phishing attacks for client. Our security protection is especially important for mobile users as mobile devices are easily exposed to such attacks. Furthermore, our protocol provides user traceability to SME and it is very efficient for mobile devices.

Keywords

Secure Cost-effective Fuzzy access-control Mobile cloud SME B2C 

Funding information

Funder NameGrant NumberFunding Note
National Natural Science Foundation of China (CN)
  • 61472083
National Natural Science Foundation of China (CN)
  • 61402110
National Natural Science Foundation of China (CN)
  • U1405255
Fok Ying Tung Education Foundation
  • 141065
ISN Research Fund
  • ISN15-03
the Scientific Research Foundation for the Returned Overseas Chinese Scholars, Ministry of Education of China
    Fujian Normal University Innovative Research Team
    • IRTL1207

    Copyright information

    © Springer-Verlag Berlin Heidelberg 2015

    Authors and Affiliations

    • Wei Wu
      • 1
      • 2
    • Shun Hu
      • 3
    • Xu Yang
      • 1
      • 2
    • Joseph K. Liu
      • 4
    • Man Ho Au
      • 5
    1. 1.Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer ScienceFujian Normal UniversityFuzhouChina
    2. 2.State Key Laboratory of Integrated Service Networks (ISN)Xidian UniversityXi’anPeople’s Republic of China
    3. 3.College of Information Science and TechnologyJinan UniversityGuangzhouPeople’s Republic of China
    4. 4.Faculty of Information TechnologyMonash UniversityMelbourneAustralia
    5. 5.Hong Kong Polytechnic UniversityHong KongHong Kong

    Personalised recommendations