Skip to main content

Authentication Model for Mobile Cloud Computing Database Service

  • Conference paper
  • First Online:
Cloud Computing and Big Data: Technologies, Applications and Security (CloudTech 2017)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 49))

  • 1079 Accesses

Abstract

Mobile cloud computing (MCC) is a technique or model, in which mobile applications are built, powered and hosted using cloud computing technology. It refers to the availability of Cloud Computing services in a mobile environment and it is the combination of the heterogeneous fields like mobile phone device, cloud computing and wireless networks. Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective security model for mobile cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in MCC. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Schwartz, B.: How to choose a DBaaS for Database Management, 15 October 2015. http://readwrite.com/2015/10/05/database-as-a-service-tips-choosing-dbaas/ Accessed 05 Nov 2016

  • Oracle Corporation: Database as a Service: Reference Architecture – An Overview (2011)

    Google Scholar 

  • Krishna, K., Roger, L.: Database as a Service (DBaaS) using Enterprise Manager 12c, Oracle Open World (2012)

    Google Scholar 

  • Ferretti, L., Colajanni, M., Marchetti, M.: Supporting security and consistency for cloud database, cyberspace safety and security. Lecture Notes in Computer Science, vol. 7672, pp. 179–193 (2012)

    Chapter  Google Scholar 

  • Cong, W., Sherman, S.M.C., Qian, W., Kui, R., Wenjing, L.: Privacy preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)

    Article  MathSciNet  Google Scholar 

  • Jia, W., Zhu, H., Cao, Z., Wei, L., Lin, X.: SDSM: a securedata service mechanism in mobile cloud computing. In: Proceedings of the IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS, Shanghai, China (2011)

    Google Scholar 

  • Huang, D., Zhou, Z., Xu, L., Xing, T., Zhong, Y.: Secure data processing framework for mobilecloud computing. In: Proceeding IEEE INFOCOM Workshop on Cloud Computing, INFOCOM 2011, Shanghai, China (2011)

    Google Scholar 

  • Hsueh, S.C., Lin, J.Y., Lin, M.Y.: Secure cloud storage for conventional data archive of smart phones. In: Proceeding 15th IEEE International Symposium on Consumer Electronics, ISCE 2011, Singapore (2011)

    Google Scholar 

  • Nithiavathy, R.: Data integrity and data dynamics with secure storage service in cloud. In: Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, pp. 125–130. IEEE (2013)

    Google Scholar 

  • Qingji, Z., Shouhuai, X., Giuseppe, A.: Efficient query integrity for outsourced dynamic databases. In: CCSW 2012, Raleigh, North Carolina, USA (2012)

    Google Scholar 

  • Kumar, M., Tuli, A., Tuli, R.: Secure communication using Needham-Schroeder protocol. CPMR-IJT 1(1) (2011)

    Google Scholar 

  • Maciej, B., Gracjan, J., MichaĹ‚, J., StanisĹ‚aw, J., Tomasz, J., Norbert, M., Rafal, M., Adam, Z., SĹ‚awomir, Z.: National Data Storage 2: Secure Storage Cloud with Efficient and Easy. Data Access (2013)

    Google Scholar 

  • Hacigumus, H., Iyer, B., Li, C., Mehrotra, S.: Efficient execution of aggregation queries over encrypted relational databases. In: Proceedings of the 9th International Conference on Database Systems for Advanced Applications (DASFAA 2004), Jeju Island, Korea, pp. 125–136 (2004)

    Google Scholar 

  • Oracle: Oracle MAA Reference Architectures (2016). http://www.oracle.com/technetwork/database/availability/maa-reference-architectures-2244929.pdf. Accessed 30 Oct 2016

  • Lowe, G.: An attack on the Needham-Schroeder public-key protocol. Inf. Process. Lett. 56, 131–133 (1995)

    Article  Google Scholar 

  • Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: IEEE International Conference on Computer Science and Electronics Engineering (2012)

    Google Scholar 

  • ALzain, M., Pardede, E.: Using multi shares for ensuring privacy in database-as-a-service. In: Proceedings of 44th Hawaii International Conference on System Sciences, pp. 1–9 (2011)

    Google Scholar 

  • Munir, K.: Security model for cloud database as a service (DBaaS). In: IEEE Proceedings of the International Conference on Cloud Computing Technologies and Applications - CLOUDTECH 2015, pp. 1–5 (2015). ISBN 978-1-4673-8148-2

    Google Scholar 

  • Hexatier Survey: Database as a Service (DBaaS) Security Research 2016 (2016). https://cdn2.hubspot.net/hubfs/1759710/Hexatier-Survey-2016.pdf. Accessed 05 Nov 2016

  • Al-Rousan, T.: Cloud computing for global software development: opportunities and challenges. Int. J. Cloud Appl. Comput. 5(1), 58–68 (2015)

    Google Scholar 

  • Jouini, M., Rabai, L.: A security framework for secure cloud computing environments. Int. J. Cloud Appl. Comput. 2(3), 1–25 (2012)

    Google Scholar 

  • Asija, R., Nallusamy, R.: Healthcare SaaS based on a data model with built-in security and privacy. Int. J. Cloud Appl. Comput. 6(3) (2016)

    Article  Google Scholar 

  • Nagar, N., Suman, U.: Analyzing virtualization vulnerabilities and design a secure cloud environment to prevent from XSS attack. Int. J. Cloud Appl. Comput. 6(1), 1–14 (2016)

    Google Scholar 

  • Alhaj, A., Aljawarneh, S., Masadeh, S., Abu-Taieh, E.: A secure data transmission mechanism for cloud outsourced data. Int. J. Cloud Appl. Comput. 3(1), 34–43 (2013)

    Google Scholar 

  • Alizadeh, M., Abolfazli, S., Zamani, M., Baharun, S., Sakurai, K.: Authentication in mobile cloud computing: a survey. J. Netw. Comput. Appl. 61, 59–80 (2016)

    Article  Google Scholar 

  • AlZain, M.A., Li, A.S., Soh, B., Pardede, E.: Multi-cloud data management using Shamir’s secret sharing and quantum byzantine agreement schemes. Int. J. Cloud Appl. Comput. 5(3), 35–52 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kashif Munir .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Munir, K. (2019). Authentication Model for Mobile Cloud Computing Database Service. In: Zbakh, M., Essaaidi, M., Manneback, P., Rong, C. (eds) Cloud Computing and Big Data: Technologies, Applications and Security. CloudTech 2017. Lecture Notes in Networks and Systems, vol 49. Springer, Cham. https://doi.org/10.1007/978-3-319-97719-5_3

Download citation

Publish with us

Policies and ethics