Access schemes for mobile cloud computing

A Klein, C Mannweiler, J Schneider… - … conference on mobile …, 2010 - ieeexplore.ieee.org
… , mobile cloud computing might open the cloud computing … In order to introduce mobile cloud
computing and to realize … meets the requirements of mobile cloud computing with respect to …

A privacy-aware authentication scheme for distributed mobile cloud computing services

JL Tsai, NW Lo - IEEE systems journal, 2015 - ieeexplore.ieee.org
scheme for distributed mobile cloud computing services is proposed. The … scheme
provides security and convenience for mobile users to access multiple mobile cloud computing

A lightweight secure data sharing scheme for mobile cloud computing

R Li, C Shen, H He, X Gu, Z Xu… - … on Cloud Computing, 2017 - ieeexplore.ieee.org
… computational overhead are in great need for mobile cloud … sharing scheme (LDSS) for
mobile cloud computing. It adopts CP-ABE, an access control technology used in normal cloud

A cooperative scheduling scheme of local cloud and internet cloud for delay-aware mobile cloud computing

T Zhao, S Zhou, X Guo, Y Zhao… - 2015 IEEE globecom …, 2015 - ieeexplore.ieee.org
… of mobile applications, Mobile Cloud Computing (MCC) has been proposed to help mobile
… To further improve the quality of service (QoS) of MCC, cloud servers can be deployed …

Efficient privacy-aware authentication scheme for mobile cloud computing services

D He, N Kumar, MK Khan, L Wang… - IEEE Systems …, 2016 - ieeexplore.ieee.org
… get some cloud storage services freely from many famous cloud ser… mobile cloud computing
(MCC) emerged recently, where the mobile computing is integrated with cloud computing

A context sensitive offloading scheme for mobile cloud computing service

B Zhou, AV Dastjerdi, RN Calheiros… - … on cloud computing, 2015 - ieeexplore.ieee.org
… the service performance in mobile cloud computing, we propose a … mobile device cloud,
and public cloud computing services in the remote to provide an adaptive and seamless mobile

An improved anonymous authentication scheme for distributed mobile cloud computing services

SA Chaudhry, IL Kim, S Rho, MS Farash, T Shon - Cluster Computing, 2019 - Springer
… This section shows that Tsai and Lo’s authentication scheme for distributed mobile cloud
environments is vulnerable to server forgery attack. We show that an adversary just after …

Incremental proxy re-encryption scheme for mobile cloud computing environment

AN Khan, MLM Kiah, SA Madani, M Ali… - The Journal of …, 2014 - Springer
… of application or portion(s) of application on the cloud for execution. The classification of
the existing security schemes for mobile cloud computing environment is presented in Fig. 2. …

On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services

Q Jiang, J Ma, F Wei - IEEE systems journal, 2016 - ieeexplore.ieee.org
… tion scheme for distributed mobile cloud computing services. It is claimed that the scheme
However, we first identify that their scheme fails to achieve mutual authentication, because it is …

Provably secure authenticated key agreement scheme for distributed mobile cloud computing services

V Odelu, AK Das, S Kumari, X Huang… - … Generation Computer …, 2017 - Elsevier
scheme, we propose a provably secure authentication scheme for distributed mobile cloud
computing … Through the rigorous security analysis, we show that our scheme achieves SK-…