A blockchain-based privacy-preserving auditable authentication scheme with hierarchical access control for mobile cloud computing

Y Zhang, L Xiong, F Li, X Niu, H Wu - Journal of Systems Architecture, 2023 - Elsevier
Blockchain-based authentication mode, a fundamental solution to prevent unauthorized
access behavior, gradually becomes a focus in future distributed mobile cloud computing …

[HTML][HTML] A blockchain-based authentication and authorization scheme for distributed mobile cloud computing services

L Yu, M He, H Liang, L Xiong, Y Liu - Sensors, 2023 - mdpi.com
Authentication and authorization constitute the essential security component, access control,
for preventing unauthorized access to cloud services in mobile cloud computing (MCC) …

Blockchain based privacy preserving user authentication protocol for distributed mobile cloud environment

M Vivekanandan, S VN, SR U - Peer-to-Peer Networking and Applications, 2021 - Springer
The development in cloud computing platforms has resulted, hosting many day-to-day
service applications in the cloud. To avail the services provided by different cloud service …

An enhanced privacy-aware authentication scheme for distributed mobile cloud computing services

L Xiong, D Peng, T Peng, H Liang - KSII Transactions on Internet …, 2017 - koreascience.kr
With the fast growth of mobile services, Mobile Cloud Computing (MCC) has gained a great
deal of attention from researchers in the academic and industrial field. User authentication …

A blockchain-based privacy-awareness authentication scheme with efficient revocation for multi-server architectures

L Xiong, F Li, S Zeng, T Peng, Z Liu - IEEE Access, 2019 - ieeexplore.ieee.org
Multi-server authentication technology has become more and more popular with the
extensive applications of networks. Although it has brought great convenience to people's …

Cloud based efficient authentication for mobile payments using key distribution method

A Saranya, R Naresh - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
The extensive usage of clever strategies fascinates numerous considerations on the
innovation intended for mobile payment method in the background of cloud computing …

Blockchain-based portable authenticated data transmission for mobile edge computing: a universally composable secure solution

S Li, Y Zhang, Y Song, N Cheng… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In mobile edge computing (MEC) systems, data is frequently transmitted between MEC
servers and users holding mobile devices for supporting related services. However, critical …

A2UA: An auditable anonymous user authentication protocol based on blockchain for cloud services

Q Lyu, H Li, Z Deng, J Wang, Y Ren… - … on Cloud Computing, 2022 - ieeexplore.ieee.org
Regulating illegal activities in cyberspace to balance user privacy and cyberspace
governance has been a non-trivial challenge when designing anonymous authentication …

[HTML][HTML] Blockchain-based authentication protocol design from a cloud computing perspective

Z Du, W Jiang, C Tian, X Rong, Y She - Electronics, 2023 - mdpi.com
Cloud computing is a disruptive technology that has transformed the way people access and
utilize computing resources. Due to the diversity of services and complexity of environments …

An efficient privacy-aware authentication scheme with hierarchical access control for mobile cloud computing services

L Xiong, F Li, M He, Z Liu, T Peng - IEEE Transactions on cloud …, 2020 - ieeexplore.ieee.org
In the last few years, mobile cloud computing (MCC) gains a huge development because of
the popularity of mobile applications and cloud computing. User authentication and access …