An efficient authentication system of smart device using multi factors in mobile cloud service architecture

YS Jeong, JS Park, JH Park - International Journal of …, 2015 - Wiley Online Library
Mobile cloud computing environments have overcome the performance limitation of mobile
devices and provide use environments not restricted by places. However, user information …

A lightweight two-factor authentication scheme for mobile cloud computing

A Abuarqoub - Proceedings of the 3rd International Conference on …, 2019 - dl.acm.org
Mobile Cloud Computing (MCC) offers a new world of promise, and can be leveraged to
improve the quality of mobile services. MCC brings cloud storage, processing and …

[PDF][PDF] A lightweight authentication scheme for mobile cloud computing

MR Momeni - International Journal of Computer Science and …, 2014 - academia.edu
The ABI Research believes that the number of mobile cloud computing users is expected to
grow from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total …

A privacy-aware authentication scheme for distributed mobile cloud computing services

JL Tsai, NW Lo - IEEE systems journal, 2015 - ieeexplore.ieee.org
In modern societies, the number of mobile users has dramatically risen in recent years. In
this paper, an efficient authentication scheme for distributed mobile cloud computing …

Strengthening cloud security: an innovative multi-factor multi-layer authentication framework for cloud user authentication

AM Mostafa, M Ezz, MK Elbashir, M Alruily… - Applied Sciences, 2023 - mdpi.com
Cloud multi-factor authentication is a critical security measure that helps strengthen cloud
security from unauthorized access and data breaches. Multi-factor authentication verifies …

A Secure Two‐Factor Authentication Framework in Cloud Computing

S Kaur, G Kaur, M Shabaz - Security and Communication …, 2022 - Wiley Online Library
Cloud computing technology has brought tremendous evaluation in the arena of IT
(information technology). This technology paves the path of starting business with lowest …

Cloud based efficient authentication for mobile payments using key distribution method

A Saranya, R Naresh - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
The extensive usage of clever strategies fascinates numerous considerations on the
innovation intended for mobile payment method in the background of cloud computing …

Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing

AN Khan, ML Mat Kiah, SA Madani, AR Khan… - The Journal of …, 2013 - Springer
To improve the resource limitation of mobile devices, mobile users may utilize cloud-
computational and storage services. Although the utilization of the cloud services improves …

Two-factor mutual authentication offloading for mobile cloud computing

A Derhab, M Belaoued, M Guerroumi, FA Khan - IEEE Access, 2020 - ieeexplore.ieee.org
Security analysts have shown that it is possible to compromise the mobile two-factor
authentication applications that employ SMS-based authentication. In this paper, we …

[PDF][PDF] A multi-factor authentication-based framework for identity management in cloud applications

W Said, E Mostafa, MM Hassan… - … -Computers Materials & …, 2022 - cdn.techscience.cn
User's data is considered as a vital asset of several organizations. Migrating data to the
cloud computing is not an easy decision for any organization due to the privacy and security …