Abstract—With the exponential increase of
the mobile devices and the fast development of cloud computing, a new computing
paradigm called mobile cloud computing (MCC) is put forward to solve the
limitation of the mobile device’s storage, communication, and computation.
Through mobile devices, users can enjoy various cloud computing services during
their mobility. However, it is difficult to ensure security and protect privacy
due to the openness of wireless communication in the new computing paradigm.
Recently, Tsai and Lo proposed a privacy-aware authentication (PAA) scheme to
solve the identification problem in MCC services and proved that their scheme
was able to resist many kinds of existing attacks. Unfortunately, we found that
Tsai and Lo’s scheme cannot resist the service provider impersonation attack,
i.e., an adversary can impersonate the service provider to the user. Also, the
adversary can extract the user’s real identity during executing the service
provider impersonation attack. To address the above problems, in this paper, we
construct a new PAA scheme for MCC services by using an identity-based
signature scheme. Security analysis shows that the proposed PAA scheme is able
to address the serious security problems existing in Tsai and Lo’s scheme and
can meet security requirements for MCC services. The performance evaluation
shows that the proposed PAA scheme has less computation and communication costs
compared with Tsai and Lo’s PAA scheme.
CONCLUSION
Due to highly dynamic nature of mobile devices in the MCC
environment, the traditional authentication schemes are not suitable for
various services in this environment. To solve the security problem in MCC
services, Tsai and Lo proposed an efficient PAA scheme for the MCC services by
using the bilinear pairing. This paper points out that Tsai and Lo’s PAA scheme
is vulnerable to a Any Query Call Us: 9566355386
serious attack and is
not able to support user anonymity. To solve such serious weaknesses, the paper
proposes a new PAA scheme for MCC services. Security analysis shows that our
proposed PAA scheme can solve the security problem existing in Tsai and Lo’s
PAA scheme. Besides, the performance analysis shows that our proposed PAA
scheme has better performance than their PAA scheme.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
• System : Pentium IV
2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44
Mb.
• Monitor : 15 VGA
Colour.
• Mouse : Logitech.
• Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
• Operating system : -
Windows XP/7.
• Coding Language :
JAVA/J2EE
• Data Base : MYSQL
REFERENCES
[1] M. Satyanarayanan, ―Fundamental challenges in
mobile computing,‖ in Proc. 15th Annu. ACM Symp. Princ. Distrib. Comput.,
1996, pp. 1–7. Any Query Call Us: 9566355386
[2] Z. Fu, X. Sun, Q.
Liu, L. Zhou, and J. Shu, ―Achieving efficient cloud search services:
Multi-keyword ranked search over encrypted cloud data supporting parallel
computing,‖ IEICE Trans. Commun., vol. 98, no. 1, pp. 190–200, 2015.
[3] Z. Xia, X. Wang, X. Sun, and Q. Wang, ―A
secure and dynamic multikeyword ranked search scheme over encrypted cloud
data,‖ IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340–352,
Feb. 2016.