Mobile cloud computing models security issues: A systematic review

AS AlAhmad, H Kahtan, YI Alzoubi, O Ali… - Journal of Network and …, 2021 - Elsevier
Mobile cloud computing (MCC) is a trending technology employed in several domains to
overcome the limitations of mobile devices by using cloud capabilities. Communication …

A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography

D Sadhukhan, S Ray, GP Biswas, MK Khan… - The Journal of …, 2021 - Springer
Internet of things (IoT) has become a new era of communication technology for performing
information exchange. With the immense increment of usage of smart devices, IoT services …

A secure and efficient multiserver authentication and key agreement protocol for internet of vehicles

J Wang, L Wu, H Wang, KKR Choo… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Internet of Vehicles (IoV) being a subdivided application of the Internet of Things, is
considered as one of the most prominent and emerging technologies for model …

LCDMA: Lightweight cross-domain mutual identity authentication scheme for Internet of Things

B Gong, G Zheng, M Waqas, S Tu… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the widespread popularity of mobile terminals in the Internet of Things (IoT), the
demand for cross-domain access of mobile terminals between different regions has also …

A Secure Two‐Factor Authentication Framework in Cloud Computing

S Kaur, G Kaur, M Shabaz - Security and Communication …, 2022 - Wiley Online Library
Cloud computing technology has brought tremendous evaluation in the arena of IT
(information technology). This technology paves the path of starting business with lowest …

Edge-Assisted Intelligent Device Authentication in Cyber–Physical Systems

Y Lu, D Wang, MS Obaidat… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Cyber–physical system (CPS) provides a foundation for the Industrial Internet of Things
(IIoT) that interconnects all types of devices. The integration of CPS with IIoT generates the …

A systematic survey of multi-factor authentication for cloud infrastructure

SP Otta, S Panda, M Gupta, C Hota - Future Internet, 2023 - mdpi.com
The unauthorized usage of various services and resources in cloud computing is something
that must be protected against. Authentication and access control are the most significant …

Cybersecurity attack-resilience authentication mechanism for intelligent healthcare system

P Soni, J Pradhan, AK Pal… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
People focus on the intelligent healthcare system expecting sufficient medical facilities even
from a remote location. However, to make the healthcare system more trustworthy, secure …

A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud

AK Singh, A Nayyar, A Garg - Multimedia Tools and Applications, 2023 - Springer
With the increased number of smart devices in IoT and cloud, communication messages are
exchanged extensively throughout the network. This requires secure data transfer between …

Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture

TY Wu, F Kong, Q Meng, S Kumari… - EURASIP Journal on …, 2023 - Springer
With the continuous progress of the Internet of Things (IoT) technology, IoT devices have
gradually penetrated all aspects of life. However, due to rapid data growth, IoT devices with …