Abstract
Mobile cloud computing (MCC) is a technique or model, in which mobile applications are built, powered and hosted using cloud computing technology. It refers to the availability of Cloud Computing services in a mobile environment and it is the combination of the heterogeneous fields like mobile phone device, cloud computing and wireless networks. Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective security model for mobile cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in MCC. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Schwartz, B.: How to choose a DBaaS for Database Management, 15 October 2015. http://readwrite.com/2015/10/05/database-as-a-service-tips-choosing-dbaas/ Accessed 05 Nov 2016
Oracle Corporation: Database as a Service: Reference Architecture – An Overview (2011)
Krishna, K., Roger, L.: Database as a Service (DBaaS) using Enterprise Manager 12c, Oracle Open World (2012)
Ferretti, L., Colajanni, M., Marchetti, M.: Supporting security and consistency for cloud database, cyberspace safety and security. Lecture Notes in Computer Science, vol. 7672, pp. 179–193 (2012)
Cong, W., Sherman, S.M.C., Qian, W., Kui, R., Wenjing, L.: Privacy preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)
Jia, W., Zhu, H., Cao, Z., Wei, L., Lin, X.: SDSM: a securedata service mechanism in mobile cloud computing. In: Proceedings of the IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS, Shanghai, China (2011)
Huang, D., Zhou, Z., Xu, L., Xing, T., Zhong, Y.: Secure data processing framework for mobilecloud computing. In: Proceeding IEEE INFOCOM Workshop on Cloud Computing, INFOCOM 2011, Shanghai, China (2011)
Hsueh, S.C., Lin, J.Y., Lin, M.Y.: Secure cloud storage for conventional data archive of smart phones. In: Proceeding 15th IEEE International Symposium on Consumer Electronics, ISCE 2011, Singapore (2011)
Nithiavathy, R.: Data integrity and data dynamics with secure storage service in cloud. In: Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, pp. 125–130. IEEE (2013)
Qingji, Z., Shouhuai, X., Giuseppe, A.: Efficient query integrity for outsourced dynamic databases. In: CCSW 2012, Raleigh, North Carolina, USA (2012)
Kumar, M., Tuli, A., Tuli, R.: Secure communication using Needham-Schroeder protocol. CPMR-IJT 1(1) (2011)
Maciej, B., Gracjan, J., Michał, J., Stanisław, J., Tomasz, J., Norbert, M., Rafal, M., Adam, Z., Sławomir, Z.: National Data Storage 2: Secure Storage Cloud with Efficient and Easy. Data Access (2013)
Hacigumus, H., Iyer, B., Li, C., Mehrotra, S.: Efficient execution of aggregation queries over encrypted relational databases. In: Proceedings of the 9th International Conference on Database Systems for Advanced Applications (DASFAA 2004), Jeju Island, Korea, pp. 125–136 (2004)
Oracle: Oracle MAA Reference Architectures (2016). http://www.oracle.com/technetwork/database/availability/maa-reference-architectures-2244929.pdf. Accessed 30 Oct 2016
Lowe, G.: An attack on the Needham-Schroeder public-key protocol. Inf. Process. Lett. 56, 131–133 (1995)
Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: IEEE International Conference on Computer Science and Electronics Engineering (2012)
ALzain, M., Pardede, E.: Using multi shares for ensuring privacy in database-as-a-service. In: Proceedings of 44th Hawaii International Conference on System Sciences, pp. 1–9 (2011)
Munir, K.: Security model for cloud database as a service (DBaaS). In: IEEE Proceedings of the International Conference on Cloud Computing Technologies and Applications - CLOUDTECH 2015, pp. 1–5 (2015). ISBN 978-1-4673-8148-2
Hexatier Survey: Database as a Service (DBaaS) Security Research 2016 (2016). https://cdn2.hubspot.net/hubfs/1759710/Hexatier-Survey-2016.pdf. Accessed 05 Nov 2016
Al-Rousan, T.: Cloud computing for global software development: opportunities and challenges. Int. J. Cloud Appl. Comput. 5(1), 58–68 (2015)
Jouini, M., Rabai, L.: A security framework for secure cloud computing environments. Int. J. Cloud Appl. Comput. 2(3), 1–25 (2012)
Asija, R., Nallusamy, R.: Healthcare SaaS based on a data model with built-in security and privacy. Int. J. Cloud Appl. Comput. 6(3) (2016)
Nagar, N., Suman, U.: Analyzing virtualization vulnerabilities and design a secure cloud environment to prevent from XSS attack. Int. J. Cloud Appl. Comput. 6(1), 1–14 (2016)
Alhaj, A., Aljawarneh, S., Masadeh, S., Abu-Taieh, E.: A secure data transmission mechanism for cloud outsourced data. Int. J. Cloud Appl. Comput. 3(1), 34–43 (2013)
Alizadeh, M., Abolfazli, S., Zamani, M., Baharun, S., Sakurai, K.: Authentication in mobile cloud computing: a survey. J. Netw. Comput. Appl. 61, 59–80 (2016)
AlZain, M.A., Li, A.S., Soh, B., Pardede, E.: Multi-cloud data management using Shamir’s secret sharing and quantum byzantine agreement schemes. Int. J. Cloud Appl. Comput. 5(3), 35–52 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Munir, K. (2019). Authentication Model for Mobile Cloud Computing Database Service. In: Zbakh, M., Essaaidi, M., Manneback, P., Rong, C. (eds) Cloud Computing and Big Data: Technologies, Applications and Security. CloudTech 2017. Lecture Notes in Networks and Systems, vol 49. Springer, Cham. https://doi.org/10.1007/978-3-319-97719-5_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-97719-5_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-97718-8
Online ISBN: 978-3-319-97719-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)