The Journal of Supercomputing

, Volume 66, Issue 3, pp 1687–1706

Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing

  • Abdul Nasir Khan
  • M. L. Mat Kiah
  • Sajjad A. Madani
  • Atta ur Rehman Khan
  • Mazhar Ali
Article

DOI: 10.1007/s11227-013-0967-y

Cite this article as:
Khan, A.N., Mat Kiah, M.L., Madani, S.A. et al. J Supercomput (2013) 66: 1687. doi:10.1007/s11227-013-0967-y

Abstract

To improve the resource limitation of mobile devices, mobile users may utilize cloud-computational and storage services. Although the utilization of the cloud services improves the processing and storage capacity of mobile devices, the migration of confidential information on untrusted cloud raises security and privacy issues. Considering the security of mobile-cloud-computing subscribers’ information, a mechanism to authenticate legitimate mobile users in the cloud environment is sought. Usually, the mobile users are authenticated in the cloud environment through digital credential methods, such as password. Once the users’ credential information theft occurs, the adversary can use the hacked information for impersonating the mobile user later on. The alarming situation is that the mobile user is unaware about adversary’s malicious activities. In this paper, a light-weight security scheme is proposed for mobile user in cloud environment to protect the mobile user’s identity with dynamic credentials. The proposed scheme offloads the frequently occurring dynamic credential generation operations on a trusted entity to keep minimum processing burden on the mobile device. To enhance the security and reliability of the scheme, the credential information is updated frequently on the basis of mobile-cloud packets exchange. Furthermore, the proposed scheme is compared with the existing scheme on the basis of performance metrics i.e. turnaround time and energy consumption. The experimental results for the proposed scheme showed significant improvement in turnaround time and energy consumption as compared to the existing scheme.

Keywords

Cloud computing Mobile-cloud computing Security Privacy 

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Abdul Nasir Khan
    • 1
  • M. L. Mat Kiah
    • 1
  • Sajjad A. Madani
    • 2
  • Atta ur Rehman Khan
    • 1
  • Mazhar Ali
    • 3
  1. 1.Faculty of Computer Science & Information TechnologyUniversity of MalayaKuala LumpurMalaysia
  2. 2.Department of Computer ScienceCOMSATS Institute of Information TechnologyAbbottabadPakistan
  3. 3.Department of Electrical and Computer EngineeringNorth Dakota State UniversityFargoUSA

Personalised recommendations