Skip to main content

Private Security for the Cloud Mobile via a Strong Authentication Method

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11792))

Abstract

In recent years, many consumers are storing a large amount of data in the cloud, so the security of this data is very important for users and companies. The companies need to provide secure data for consumers and to offer resource access only when it is needed. For this purpose, consumers require a much higher degree of authentication, such as strong authentication, comparing with the simple couple identifier and password based identification. In this work, we will study and propose a new strong authentication security method based on One Time Password (OTP) for mobile cloud. The proposed method will be based on images selection by the users, which guarantees a secure access and authentication for services usage, while taking into account the user’s preferences. We will also present and discuss experimental results, which illustrate a practical implementation of the proposed method and its benefits.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Almuairfi, S., Veeraraghavan, P., Chilamkurti, N.: A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices. Math. Comput. Model. 58(1–2), 108–116 (2013)

    Article  Google Scholar 

  2. Chen, L., Zhao, D.: Image encryption with fractional wavelet packet method. Optik (Stuttg) 119(6), 286–291 (2008)

    Article  Google Scholar 

  3. Chan, C.S., Chang, C.C.: An efficient image authentication method based on Hamming code. Pattern Recognit. 40(2), 681–690 (2007)

    Article  Google Scholar 

  4. Chan, C.S.: An image authentication method by applying Hamming code on rearranged bits. Pattern Recognit. Lett. 32(14), 1679–1690 (2011)

    Article  Google Scholar 

  5. Gurav, S.M., Gawade, L.S., Rane, P.K., Khochare, N.R.: Graphical password authentication: cloud securing scheme. In: Proceedings – International Conference on Electronic Systems, Signal Processing and Computing Technologies (ICESC 2014), pp. 479–483 (2014)

    Google Scholar 

  6. Vishwakarma, N., Gangrade, K.: Secure image based one time password. Int. J. Sci. Res. (IJSR) 5(11), 680–683 (2016)

    Google Scholar 

  7. Cherdmuangpak, N., Anusas-amonkul, T., Limthanmaphon, B.: Two factor image-based password authentication for junior high school students. In: 14th International Joint Conference on Computer Science and Software Engineering (JCSSE), pp. 1–6 (2017)

    Google Scholar 

  8. Das, R., Manna, S., Dutta, S.: Secure user authentication system using image-based OTP and randomize numeric OTP based on user unique biometric image and digit repositioning scheme. In: Bhaumik, J., Chakrabarti, I., De, B.P., Bag, B., Mukherjee, S. (eds.) Communication, Devices, and Computing. LNEE, vol. 470, pp. 83–93. Springer, Singapore (2017). https://doi.org/10.1007/978-981-10-8585-7_8

    Chapter  Google Scholar 

  9. Shaik, A., Borgaonkar, R., Asokan, N., Niemi, V., Seifert, J.: Practical attacks against privacy and availability in 4G/LTE mobile communication systems, February 2016

    Google Scholar 

  10. Noor, T.H., Zeadally, S., Alfazi, A., Sheng, Q.Z.: Mobile cloud computing: challenges and future research directions. J. Netw. Comput. Appl. 115(May), 70–85 (2018). https://doi.org/10.1016/j.jnca.2018.04.018

    Article  Google Scholar 

  11. Jlassai, M., Ghazel, C., Saidane, L.: A survey on quality of service in cloud computing. In: 3rd International Conference on Frontiers of Signal Processing, France, September 2017

    Google Scholar 

  12. Singh, A., Chatterjee, K.: Cloud security issues and challenges: a survey. J. Netw. Comput. Appl. 79, 88–115 (2017)

    Article  Google Scholar 

  13. Das, R., Chakraborty, A., Nandi, S., Dutta, S.: An approach to implement secure user authentication scheme using secret values extracted from private information and unique biometric images of user directed by randomize numeric and image based OTP. Int. J. Appl. Eng. Res. 12(19), 8595–8601 (2017)

    Google Scholar 

  14. Richards, J.A., Jia, X.: Remote Sensing Digital Image Analysis (n.d.). https://www.springer.com/us/book/9783642300615

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cherif Ghazel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Merdassi, I., Bouchaala, M., Ghazel, C., Saidane, L. (2019). Private Security for the Cloud Mobile via a Strong Authentication Method. In: Luo, Y. (eds) Cooperative Design, Visualization, and Engineering. CDVE 2019. Lecture Notes in Computer Science(), vol 11792. Springer, Cham. https://doi.org/10.1007/978-3-030-30949-7_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30949-7_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30948-0

  • Online ISBN: 978-3-030-30949-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics