An efficient and secure delegated multi-authentication protocol for mobile data owners in cloud

L Wei, L Zhang, K Zhang, M Dong - … , WASA 2015, Qufu, China, August 10 …, 2015 - Springer
Due to plenty of cloud-based applications emerging and booming recently, data owners
always store their data in cloud and share them to data consumers through cloud servers …

MEDAPs: secure multi‐entities delegated authentication protocols for mobile cloud computing

L Zhang, L Wei, D Huang, K Zhang… - Security and …, 2016 - Wiley Online Library
Because the technology of mobile cloud computing has brought several benefits to
information world, many applications in mobile devices based on cloud have emerged and …

Efficient privacy-preserving authentication protocol for mobile cloud computing services

X Ling, P Daiyuan, P Tu, L Hongbin - 西南交通大学学报, 2019 - xnjdxb.swjtu.edu.cn
To address the problems of mutual authentication and privacy preservation in mobile cloud
computing (MCC) services, an efficient and provably secure privacy-preserving …

[PDF][PDF] Multi-factor authentication as a service for cloud data security

S Rajani, V Ghorpade, M Dhange - Int J Comput Sci Eng, 2016 - researchgate.net
Cloud computing is a one of the emerging technology in IT industries nowadays. Cloud
computing offers a wide range of services to its users. It delivers on demand services over …

A lightweight two-factor authentication scheme for mobile cloud computing

A Abuarqoub - Proceedings of the 3rd International Conference on …, 2019 - dl.acm.org
Mobile Cloud Computing (MCC) offers a new world of promise, and can be leveraged to
improve the quality of mobile services. MCC brings cloud storage, processing and …

A privacy-aware authentication scheme for distributed mobile cloud computing services

JL Tsai, NW Lo - IEEE systems journal, 2015 - ieeexplore.ieee.org
In modern societies, the number of mobile users has dramatically risen in recent years. In
this paper, an efficient authentication scheme for distributed mobile cloud computing …

[PDF][PDF] An enhanced authentication strategy for multiservice authorization over mobile cloud

FM Shelke, PD Soni - International Journal on Recent and Innovation …, 2015 - academia.edu
Over the past decade the enterprise computing has been shifted to new paradigm called as
Cloud computing. The cloud-computing paradigm provides several service models fitting the …

An efficient and provably secure anonymous user authentication and key agreement for mobile cloud computing

J Mo, Z Hu, H Chen, W Shen - Wireless Communications and …, 2019 - Wiley Online Library
Nowadays, due to the rapid development and wide deployment of handheld mobile devices,
the mobile users begin to save their resources, access services, and run applications that …

A pairing-free identity based authentication framework for cloud computing

D Mishra, V Kumar, S Mukhopadhyay - … , NSS 2013, Madrid, Spain, June 3 …, 2013 - Springer
Cloud Computing facilitates convenient on-demand access to networks, servers, storage,
applications and services to the user with minimal management from user side. It is a client …

MASHED: Security and privacy-aware mutual authentication scheme for heterogeneous and distributed mobile cloud computing services

O Olufemi Olakanmi, SO Oke - Information Security Journal: A …, 2018 - Taylor & Francis
Rapid development in mobile devices and cloud computing technologies has increased the
number of mobile services from different vendors on the cloud platform. However, users of …