Skip to main content
Erschienen in: The Journal of Supercomputing 6/2017

09.01.2017

Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues

verfasst von: Tarunpreet Bhatia, A. K. Verma

Erschienen in: The Journal of Supercomputing | Ausgabe 6/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The incessant spurt of research activities to augment capabilities of resource-constrained mobile devices by leveraging heterogeneous cloud resources has created a new research impetus called mobile cloud computing. However, this rapid relocation to the cloud has fueled security and privacy concerns as users’ data leave owner’s protection sphere and enter the cloud. Significant efforts have been devoted by academia and research community to study and build secure frameworks in cloud environment, but there exists a research gap for comprehensive study of security frameworks in mobile cloud computing environment. Therefore, we aim to conduct a comprehensive survey to analyze various cryptographic, biometric and multifactor lightweight solutions for data security in mobile cloud. This survey highlights the current security issues in mobile cloud environment and infrastructure, investigates various data security frameworks and provides a taxonomy of the state-of-the-art data security frameworks and deep insight into open research issues for ensuring security and privacy of data in mobile cloud computing platform.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abolfazli S et al (2013) Cloud-based augmentation for mobile devices: motivation, taxonomies, and open challenges. IEEE Commun Surv Tutor 16(1):1–32 Abolfazli S et al (2013) Cloud-based augmentation for mobile devices: motivation, taxonomies, and open challenges. IEEE Commun Surv Tutor 16(1):1–32
2.
Zurück zum Zitat Sanaei Z, Abolfazli S, Gani A, Buyya R (2014) Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Commun Surv Tutor 16(1):369–392CrossRef Sanaei Z, Abolfazli S, Gani A, Buyya R (2014) Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Commun Surv Tutor 16(1):369–392CrossRef
3.
Zurück zum Zitat Dinh HT, Lee C, Niyato D, Wang P (2013) A survey of mobile cloud computing: architecture, applications, and approaches. Wirel Commun Mob Comput 13(18):1587–1611CrossRef Dinh HT, Lee C, Niyato D, Wang P (2013) A survey of mobile cloud computing: architecture, applications, and approaches. Wirel Commun Mob Comput 13(18):1587–1611CrossRef
4.
Zurück zum Zitat Williams B (2012) What is cloud computing?—The journey to cloud. In: Economics of Cloud Computing: An Overview for Decision Makers, 1st edn. Cisco Press, Indiana, pp 1–13 Williams B (2012) What is cloud computing?—The journey to cloud. In: Economics of Cloud Computing: An Overview for Decision Makers, 1st edn. Cisco Press, Indiana, pp 1–13
5.
Zurück zum Zitat Branch R et al (2014) Cloud computing and big data: a review of current service models and hardware perspectives. J Softw Eng Appl 7(8):686–693CrossRef Branch R et al (2014) Cloud computing and big data: a review of current service models and hardware perspectives. J Softw Eng Appl 7(8):686–693CrossRef
6.
Zurück zum Zitat Contu R, Kavanagh KM (2013) Market Trends: Cloud-Based Security Services Market Worldwide, Gartner, G00253813 Contu R, Kavanagh KM (2013) Market Trends: Cloud-Based Security Services Market Worldwide, Gartner, G00253813
7.
Zurück zum Zitat Cisco Visual Networking Index (2016) Global mobile data traffic forecast update, 2015–2020. White paper, 3rd February 2016 Cisco Visual Networking Index (2016) Global mobile data traffic forecast update, 2015–2020. White paper, 3rd February 2016
9.
Zurück zum Zitat Rahimi MR et al (2014) Mobile cloud computing: a survey, state of art and future directions. Mob Netw Appl 19(2):133–143CrossRef Rahimi MR et al (2014) Mobile cloud computing: a survey, state of art and future directions. Mob Netw Appl 19(2):133–143CrossRef
10.
Zurück zum Zitat Fernando N, Loke SW, Rahayu W (2013) Mobile cloud computing: a survey. Future Gener Comput Syst 29(1):84–106CrossRef Fernando N, Loke SW, Rahayu W (2013) Mobile cloud computing: a survey. Future Gener Comput Syst 29(1):84–106CrossRef
11.
Zurück zum Zitat Lei L (2013) Challenges on wireless heterogeneous networks for mobile cloud computing. IEEE Wirel Commun 20(3):34–44CrossRef Lei L (2013) Challenges on wireless heterogeneous networks for mobile cloud computing. IEEE Wirel Commun 20(3):34–44CrossRef
12.
Zurück zum Zitat Alizadeh M, Hassan WH (2013) Challenges and opportunities of mobile cloud computing. In: Proceedings of the 9th International Wireless Communications and Mobile Computing Conference (IWCMC). Sardinia, Italy, pp 660–666 Alizadeh M, Hassan WH (2013) Challenges and opportunities of mobile cloud computing. In: Proceedings of the 9th International Wireless Communications and Mobile Computing Conference (IWCMC). Sardinia, Italy, pp 660–666
13.
Zurück zum Zitat Ra MR et al (2011) Odessa: enabling interactive perception applications on mobile devices. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services. ACM, Bethesda pp 43–56 Ra MR et al (2011) Odessa: enabling interactive perception applications on mobile devices. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services. ACM, Bethesda pp 43–56
14.
Zurück zum Zitat Kovachev D, Cao Y, Klamma R (2011) Mobile cloud computing: a comparison of application models. Comput Res Repos, CoRR. arXiv preprint. arXiv:1107.4940 Kovachev D, Cao Y, Klamma R (2011) Mobile cloud computing: a comparison of application models. Comput Res Repos, CoRR. arXiv preprint. arXiv:​1107.​4940
15.
Zurück zum Zitat Guan L, Ke X, Song M, Song J (2011) A survey of research on mobile cloud computing. In: Proceedings of the 10th IEEE/ACIS International Conference on Computer and Information Science, (ICIS’11). Sanya, China, pp 387–392CrossRef Guan L, Ke X, Song M, Song J (2011) A survey of research on mobile cloud computing. In: Proceedings of the 10th IEEE/ACIS International Conference on Computer and Information Science, (ICIS’11). Sanya, China, pp 387–392CrossRef
16.
Zurück zum Zitat Rahimi MR, Venkatasubramanian N, Vasilakos AV (2013) Music: mobility-aware optimal service allocation in mobile cloud computing. In: Proceedings of the 6th International Conference on Cloud Computing. IEEE, Santa Clara, pp 75–82 Rahimi MR, Venkatasubramanian N, Vasilakos AV (2013) Music: mobility-aware optimal service allocation in mobile cloud computing. In: Proceedings of the 6th International Conference on Cloud Computing. IEEE, Santa Clara, pp 75–82
17.
Zurück zum Zitat Kumar K, Liu J, Lu YH, Bhargava B (2013) A survey of computation offloading for mobile systems. ACM/Springer MONET 18(1):129–140 Kumar K, Liu J, Lu YH, Bhargava B (2013) A survey of computation offloading for mobile systems. ACM/Springer MONET 18(1):129–140
18.
Zurück zum Zitat Xia F et al (2014) Phone2Cloud: exploiting computation offloading for energy saving on smartphones in mobile cloud computing. Inf Syst Front 16(1):95–111CrossRef Xia F et al (2014) Phone2Cloud: exploiting computation offloading for energy saving on smartphones in mobile cloud computing. Inf Syst Front 16(1):95–111CrossRef
19.
Zurück zum Zitat Yang S et al (2013) Fast dynamic execution offloading for efficient mobile cloud computing. In: Proceedings of the International Conference on Pervasive Computing and Communications (PerCom). IEEE, San Diego, pp 20–28 Yang S et al (2013) Fast dynamic execution offloading for efficient mobile cloud computing. In: Proceedings of the International Conference on Pervasive Computing and Communications (PerCom). IEEE, San Diego, pp 20–28
20.
Zurück zum Zitat Yang S et al (2014) Techniques to minimize state transfer costs for dynamic execution offloading in mobile cloud computing. IEEE Trans Mob Comput 13(11):2648–2660CrossRef Yang S et al (2014) Techniques to minimize state transfer costs for dynamic execution offloading in mobile cloud computing. IEEE Trans Mob Comput 13(11):2648–2660CrossRef
21.
Zurück zum Zitat Kaewpuang R, Niyato D, Wang P, Hossain E (2013) A framework for cooperative resource management in mobile cloud computing. IEEE J Sel Areas Commun 31(12):2685–2700CrossRef Kaewpuang R, Niyato D, Wang P, Hossain E (2013) A framework for cooperative resource management in mobile cloud computing. IEEE J Sel Areas Commun 31(12):2685–2700CrossRef
22.
Zurück zum Zitat Suo H, Liu Z, Wan J, Zhou K (2013) Security and privacy in mobile cloud computing. In: Proceedings of the 9th International Wireless Communications and Mobile Computing Conference (IWCMC). Sardinia, Italy, pp 655–659 Suo H, Liu Z, Wan J, Zhou K (2013) Security and privacy in mobile cloud computing. In: Proceedings of the 9th International Wireless Communications and Mobile Computing Conference (IWCMC). Sardinia, Italy, pp 655–659
23.
Zurück zum Zitat Shahzad A, Hussain M (2013) Security issues and challenges of mobile cloud computing. Int J Grid Distrib Comput 6(6):37–50CrossRef Shahzad A, Hussain M (2013) Security issues and challenges of mobile cloud computing. Int J Grid Distrib Comput 6(6):37–50CrossRef
24.
Zurück zum Zitat Xiao Z, Xiao Y (2013) Security and privacy in cloud computing. IEEE Commun Surv Tutor 15(2):843–859CrossRef Xiao Z, Xiao Y (2013) Security and privacy in cloud computing. IEEE Commun Surv Tutor 15(2):843–859CrossRef
25.
26.
Zurück zum Zitat Gonzalez N et al (2012) A quantitative analysis of current security concerns and solutions for cloud computing. J Cloud Comput 1(1):1–18CrossRef Gonzalez N et al (2012) A quantitative analysis of current security concerns and solutions for cloud computing. J Cloud Comput 1(1):1–18CrossRef
27.
Zurück zum Zitat Shaikh R, Sasikumar M (2015) Trust model for measuring security strength of cloud computing service. Procedia Comput Sci 45:380–389CrossRef Shaikh R, Sasikumar M (2015) Trust model for measuring security strength of cloud computing service. Procedia Comput Sci 45:380–389CrossRef
28.
29.
Zurück zum Zitat Sood SK (2012) A combined approach to ensure data security in cloud computing. J Netw Comput Appl 35(6):1831–1838CrossRef Sood SK (2012) A combined approach to ensure data security in cloud computing. J Netw Comput Appl 35(6):1831–1838CrossRef
30.
Zurück zum Zitat Kumar R, Rajalakshmi S (2013) Mobile cloud computing: standard approach to protecting and securing of mobile cloud ecosystems. In: Proceedings of the International Conference on Computer Sciences and Applications (CSA). Wuhan, China, pp 663–669 Kumar R, Rajalakshmi S (2013) Mobile cloud computing: standard approach to protecting and securing of mobile cloud ecosystems. In: Proceedings of the International Conference on Computer Sciences and Applications (CSA). Wuhan, China, pp 663–669
31.
Zurück zum Zitat Khan AN, Kiah MLM, Khan SU, Madani SA (2013) Towards secure mobile cloud computing: a survey. Future Gener Comput Syst 29(5):1278–1299CrossRef Khan AN, Kiah MLM, Khan SU, Madani SA (2013) Towards secure mobile cloud computing: a survey. Future Gener Comput Syst 29(5):1278–1299CrossRef
32.
Zurück zum Zitat Alizadeh M et al (2016) Authentication in mobile cloud computing: a survey. J Netw Comput Appl 61(2):59–80CrossRef Alizadeh M et al (2016) Authentication in mobile cloud computing: a survey. J Netw Comput Appl 61(2):59–80CrossRef
33.
Zurück zum Zitat Somorovsky J et al (2011) All your clouds are belong to us: security analysis of cloud management interfaces. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, New York, USA, pp 3–14 Somorovsky J et al (2011) All your clouds are belong to us: security analysis of cloud management interfaces. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, New York, USA, pp 3–14
35.
Zurück zum Zitat Grobauer B, Walloschek T, Stocker E (2011) Understanding cloud-computing vulnerabilities. IEEE Secur Priv 9(2):50–57 Grobauer B, Walloschek T, Stocker E (2011) Understanding cloud-computing vulnerabilities. IEEE Secur Priv 9(2):50–57
36.
Zurück zum Zitat Liu F et al (2013) Gearing resource-poor mobile devices with powerful clouds: architecture, challenges and applications. IEEE Wirel Commun Mag 20(3):14–22CrossRef Liu F et al (2013) Gearing resource-poor mobile devices with powerful clouds: architecture, challenges and applications. IEEE Wirel Commun Mag 20(3):14–22CrossRef
37.
Zurück zum Zitat Modi C et al (2013) A survey on security issues and solutions at different layers of Cloud computing. J Supercomput 63(2):561–592CrossRef Modi C et al (2013) A survey on security issues and solutions at different layers of Cloud computing. J Supercomput 63(2):561–592CrossRef
38.
Zurück zum Zitat Jansen W, Grance T (2011) Guidelines on security and privacy in public cloud computing. NIST Spec Publ 800(144):10–11 Jansen W, Grance T (2011) Guidelines on security and privacy in public cloud computing. NIST Spec Publ 800(144):10–11
39.
Zurück zum Zitat Anati I, Gueron S, Johnson S, Scarlata V (2013) Innovative technology for CPU based attestation and sealing. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy. Tel Aviv, Israel, pp 1–7 Anati I, Gueron S, Johnson S, Scarlata V (2013) Innovative technology for CPU based attestation and sealing. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy. Tel Aviv, Israel, pp 1–7
40.
Zurück zum Zitat Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gener Comput Syst 28(3):583–592CrossRef Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gener Comput Syst 28(3):583–592CrossRef
41.
42.
Zurück zum Zitat Ren W, Zeng L, Liu R, Cheng C (2016) F2AC: a lightweight, fine-grained, and flexible access control scheme for file storage in mobile cloud computing. Mob Inf Syst 2016:1–9. doi:10.1155/2016/5232846 Ren W, Zeng L, Liu R, Cheng C (2016) F2AC: a lightweight, fine-grained, and flexible access control scheme for file storage in mobile cloud computing. Mob Inf Syst 2016:1–9. doi:10.​1155/​2016/​5232846
43.
Zurück zum Zitat Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552MathSciNetCrossRef Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552MathSciNetCrossRef
44.
Zurück zum Zitat Shoup V, Rubin A (1996) Session key distribution using smart cards. In: Proceedings of the 15th Annual International Conference on Theory and Application of Cryptographic Techniques (EUROCRYPT 96). Saragossa, Spain, pp 321–331 Shoup V, Rubin A (1996) Session key distribution using smart cards. In: Proceedings of the 15th Annual International Conference on Theory and Application of Cryptographic Techniques (EUROCRYPT 96). Saragossa, Spain, pp 321–331
45.
46.
Zurück zum Zitat Halevi S, Krawczyk H (1999) Public-key cryptography and password protocols. ACM Trans Inf Syst Secur 2(3):230–268CrossRef Halevi S, Krawczyk H (1999) Public-key cryptography and password protocols. ACM Trans Inf Syst Secur 2(3):230–268CrossRef
47.
Zurück zum Zitat Hwang MS, Li LH (2000) A new remote user authentication scheme using smart cards. IEEE Trans Consum Electron 46(1):28–30CrossRef Hwang MS, Li LH (2000) A new remote user authentication scheme using smart cards. IEEE Trans Consum Electron 46(1):28–30CrossRef
53.
Zurück zum Zitat Zonouz S et al (2013) Secloud: a cloud based comprehensive and lightweight security solution for smartphones. Comput Secur 37(9):215–227CrossRef Zonouz S et al (2013) Secloud: a cloud based comprehensive and lightweight security solution for smartphones. Comput Secur 37(9):215–227CrossRef
54.
Zurück zum Zitat Simmons GJ (1979) Symmetric and asymmetric encryption. ACM Comput Surv (CSUR) 11(4):305–330MATHCrossRef Simmons GJ (1979) Symmetric and asymmetric encryption. ACM Comput Surv (CSUR) 11(4):305–330MATHCrossRef
55.
Zurück zum Zitat Neuman BC, Ts’O Theodore (1994) Kerberos: an authentication service for computer networks. IEEE Commun Mag 32(9):33–38CrossRef Neuman BC, Ts’O Theodore (1994) Kerberos: an authentication service for computer networks. IEEE Commun Mag 32(9):33–38CrossRef
56.
Zurück zum Zitat Stallings W (2006) Cryptography and network security: principles and practice. Prentice Hall, Upper Saddle River Stallings W (2006) Cryptography and network security: principles and practice. Prentice Hall, Upper Saddle River
58.
Zurück zum Zitat Pirzada AA, McDonald C (2004) Kerberos-assisted authentication in mobile ad hoc networks. In: Proceedings of the 27th Australasian Conference on Computer Science (ACSC ’04). Dunedin, New Zealand, pp 41–46 Pirzada AA, McDonald C (2004) Kerberos-assisted authentication in mobile ad hoc networks. In: Proceedings of the 27th Australasian Conference on Computer Science (ACSC ’04). Dunedin, New Zealand, pp 41–46
59.
Zurück zum Zitat Carman DW, Kruus PS, Matt BJ (2000) Constraints and approaches for distributed sensor network security. DARPA Project report (Cryptographic Technologies Group, Trusted Information System, NAI Labs) 1(1) Carman DW, Kruus PS, Matt BJ (2000) Constraints and approaches for distributed sensor network security. DARPA Project report (Cryptographic Technologies Group, Trusted Information System, NAI Labs) 1(1)
61.
Zurück zum Zitat Ren W et al (2011) Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing. J Tsinghua Sci Technol 16(5):520–528CrossRef Ren W et al (2011) Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing. J Tsinghua Sci Technol 16(5):520–528CrossRef
62.
Zurück zum Zitat Khan AN et al (2014) BSS: block-based sharing scheme for secure data storage services in mobile cloud environment. J Supercomput 70(2):946–976CrossRef Khan AN et al (2014) BSS: block-based sharing scheme for secure data storage services in mobile cloud environment. J Supercomput 70(2):946–976CrossRef
65.
Zurück zum Zitat Hellman M (1978) An overview of public key cryptography. IEEE Commun Mag 16(6):24–32CrossRef Hellman M (1978) An overview of public key cryptography. IEEE Commun Mag 16(6):24–32CrossRef
66.
Zurück zum Zitat Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126MathSciNetMATHCrossRef Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126MathSciNetMATHCrossRef
67.
Zurück zum Zitat ElGamal T (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472MathSciNetMATHCrossRef ElGamal T (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472MathSciNetMATHCrossRef
68.
Zurück zum Zitat Miller V (1985) Use of elliptic curves in cryptography. CRYPTO. Lect Notes Comput Sci 85:417–426 Miller V (1985) Use of elliptic curves in cryptography. CRYPTO. Lect Notes Comput Sci 85:417–426
69.
Zurück zum Zitat Lamport L (1979) Constructing digital signatures from a one-way function. Technical Report CSL-98, SRI International, Palo Alto Lamport L (1979) Constructing digital signatures from a one-way function. Technical Report CSL-98, SRI International, Palo Alto
70.
Zurück zum Zitat Merkle R (1990) A certified digital signature. In: Gilles Brassard G (ed) Advances in Cryptology—CRYPTO ’89. Springer, Berlin, pp 218–238 Merkle R (1990) A certified digital signature. In: Gilles Brassard G (ed) Advances in Cryptology—CRYPTO ’89. Springer, Berlin, pp 218–238
71.
Zurück zum Zitat Mehuron W (1994) Digital Signature Standard (DSS). US Department of Commerce, National Institute of Standards and Technology (NIST). Information Technology Laboratory (ITL). FIPS PEB 1994:186 Mehuron W (1994) Digital Signature Standard (DSS). US Department of Commerce, National Institute of Standards and Technology (NIST). Information Technology Laboratory (ITL). FIPS PEB 1994:186
72.
Zurück zum Zitat Han JH, Kim YJ, Jun SI, Chung KI, Seo CH (2002) Implementation of ECC/ECDSA cryptography algorithms based on Java card. In: Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops. Austria, Vienna, pp 272–276CrossRef Han JH, Kim YJ, Jun SI, Chung KI, Seo CH (2002) Implementation of ECC/ECDSA cryptography algorithms based on Java card. In: Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops. Austria, Vienna, pp 272–276CrossRef
73.
Zurück zum Zitat Lee S et al (2010) Two factor authentication for cloud computing. J Inf Commun Converg Eng 8(4):427–432 Lee S et al (2010) Two factor authentication for cloud computing. J Inf Commun Converg Eng 8(4):427–432
74.
Zurück zum Zitat Xiao S, Gong W (2010) Mobility can help: protect user identity with dynamic credential. In: Proceedings of the 11th International Conference on Mobile Data Management (MDM). IEEE, Kansas City, pp 378–380 Xiao S, Gong W (2010) Mobility can help: protect user identity with dynamic credential. In: Proceedings of the 11th International Conference on Mobile Data Management (MDM). IEEE, Kansas City, pp 378–380
75.
Zurück zum Zitat Khan AN, Kiah MM, Madani SA, Ali M (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Supercomput 66(3):1687–1706CrossRef Khan AN, Kiah MM, Madani SA, Ali M (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Supercomput 66(3):1687–1706CrossRef
76.
Zurück zum Zitat Khan AN et al (2013) A study of incremental cryptography for security schemes in mobile cloud computing environments. In: Proceedings of the IEEE Symposium on Wireless Technology and Applications (ISWTA). Kuching, Malaysia. IEEE, pp 62–67 Khan AN et al (2013) A study of incremental cryptography for security schemes in mobile cloud computing environments. In: Proceedings of the IEEE Symposium on Wireless Technology and Applications (ISWTA). Kuching, Malaysia. IEEE, pp 62–67
77.
Zurück zum Zitat Khalid U et al (2013) Cloud based secure and privacy enhanced authentication & authorization protocol. Procedia Comput Sci 22:680–688CrossRef Khalid U et al (2013) Cloud based secure and privacy enhanced authentication & authorization protocol. Procedia Comput Sci 22:680–688CrossRef
78.
Zurück zum Zitat Annappaian DH, Agrawal VK (2015) Multilevel cryptography with metadata and lock approach for storing data in cloud. Trans Netw Commun 2(6):47–55 Annappaian DH, Agrawal VK (2015) Multilevel cryptography with metadata and lock approach for storing data in cloud. Trans Netw Commun 2(6):47–55
79.
Zurück zum Zitat Lauter K (2004) The advantages of elliptic curve cryptography for wireless security. IEEE Wirel Commun 11(1):62–67MathSciNetCrossRef Lauter K (2004) The advantages of elliptic curve cryptography for wireless security. IEEE Wirel Commun 11(1):62–67MathSciNetCrossRef
80.
Zurück zum Zitat Toorani M, Beheshti A (2008) LPKI-a lightweight public key infrastructure for the mobile environments. In: Proceedings of the 11th International Conference on Communication Systems (ICCS). IEEE, Guangzhou, pp 162–166 Toorani M, Beheshti A (2008) LPKI-a lightweight public key infrastructure for the mobile environments. In: Proceedings of the 11th International Conference on Communication Systems (ICCS). IEEE, Guangzhou, pp 162–166
81.
Zurück zum Zitat Krawczyk H (2005) HMQV: a high-performance secure Diffie-Hellman protocol. In: Advances in Cryptology—CRYPTO’05. LNCS, vol 3621. Springer, Berlin, pp 546–566 Krawczyk H (2005) HMQV: a high-performance secure Diffie-Hellman protocol. In: Advances in Cryptology—CRYPTO’05. LNCS, vol 3621. Springer, Berlin, pp 546–566
85.
Zurück zum Zitat Boneh D, Franklin MK (2001) Identity-based encryption from the Weil pairing. In: Kilian J (ed) Advances in Cryptology-CRYPTO 2001. Springer, Berlin, pp 213–229CrossRef Boneh D, Franklin MK (2001) Identity-based encryption from the Weil pairing. In: Kilian J (ed) Advances in Cryptology-CRYPTO 2001. Springer, Berlin, pp 213–229CrossRef
87.
Zurück zum Zitat Gentry C, Silverberg A (2002) Hierarchical ID-based cryptography. In: Zheng Y (ed) Proceedings of Asiacrypt 2002. Springer, Berlin, pp 548–566CrossRef Gentry C, Silverberg A (2002) Hierarchical ID-based cryptography. In: Zheng Y (ed) Proceedings of Asiacrypt 2002. Springer, Berlin, pp 548–566CrossRef
88.
Zurück zum Zitat Ragini P, Mehrotra S, Venkatesan, (2014) An efficient model for privacy and security in Mobile Cloud Computing. In: Proceedings of the International Conference on Recent Trends in Information Technology (ICRTIT). Chennai, India, pp 1–6 Ragini P, Mehrotra S, Venkatesan, (2014) An efficient model for privacy and security in Mobile Cloud Computing. In: Proceedings of the International Conference on Recent Trends in Information Technology (ICRTIT). Chennai, India, pp 1–6
89.
Zurück zum Zitat Li H, Dai Y, Tian L, Yang H (2009) Identity-based authentication for cloud computing. In: Jaatun M (ed) Cloud Computing. Springer, Berlin, pp 157–166CrossRef Li H, Dai Y, Tian L, Yang H (2009) Identity-based authentication for cloud computing. In: Jaatun M (ed) Cloud Computing. Springer, Berlin, pp 157–166CrossRef
90.
Zurück zum Zitat Dong X et al (2015) SECO: secure and scalable data collaboration services in cloud computing. Comput Secur 50(5):91–105CrossRef Dong X et al (2015) SECO: secure and scalable data collaboration services in cloud computing. Comput Secur 50(5):91–105CrossRef
91.
92.
Zurück zum Zitat Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R (ed) Advances in Cryptology-EUROCRYPT. Springer, Berlin, pp 457–473 Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R (ed) Advances in Cryptology-EUROCRYPT. Springer, Berlin, pp 457–473
93.
Zurück zum Zitat Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security. Alexandria, Virginia, USA, pp 89–98 Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security. Alexandria, Virginia, USA, pp 89–98
94.
Zurück zum Zitat Lv Z, Hong C, Zhang M, Feng D (2012) A secure and efficient revocation scheme for fine-grained access control in cloud storage. In: Proceedings of the 4th International Conference on Cloud Computing Technology and Science (CloudCom’12). Taipei, Chennai, India, pp 545–550CrossRef Lv Z, Hong C, Zhang M, Feng D (2012) A secure and efficient revocation scheme for fine-grained access control in cloud storage. In: Proceedings of the 4th International Conference on Cloud Computing Technology and Science (CloudCom’12). Taipei, Chennai, India, pp 545–550CrossRef
95.
Zurück zum Zitat Yang K, Jia X, Ren K, Zhang B, Xie R (2013) DAC-MACS: effective data access control for multiauthority cloud storage systems. IEEE Trans Inf Forensics Secur 8(11):1790–1801CrossRef Yang K, Jia X, Ren K, Zhang B, Xie R (2013) DAC-MACS: effective data access control for multiauthority cloud storage systems. IEEE Trans Inf Forensics Secur 8(11):1790–1801CrossRef
96.
Zurück zum Zitat Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of 2007 IEEE Symposium on Security and Privacy. California, USA, Berkeley, pp 321–334CrossRef Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of 2007 IEEE Symposium on Security and Privacy. California, USA, Berkeley, pp 321–334CrossRef
97.
Zurück zum Zitat Hur J, Noh DK (2011) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214–1221CrossRef Hur J, Noh DK (2011) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214–1221CrossRef
98.
Zurück zum Zitat Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of IEEE Conference on Computer Communications. San Diego, California, USA, pp 1–9 Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of IEEE Conference on Computer Communications. San Diego, California, USA, pp 1–9
99.
Zurück zum Zitat Sun GZ (2011) CP-ABE based data access control for cloud storage. J China Inst Commun 32(7):146–152 Sun GZ (2011) CP-ABE based data access control for cloud storage. J China Inst Commun 32(7):146–152
100.
Zurück zum Zitat Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. Computer 29(2):38–47CrossRef Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. Computer 29(2):38–47CrossRef
101.
Zurück zum Zitat Huang D et al (2010) Mobicloud: building secure cloud framework for mobile computing and communication. In: Proceedings of the 5th IEEE International Symposium on Service Oriented System Engineering (SOSE). Nanjing, China, pp 27–34 Huang D et al (2010) Mobicloud: building secure cloud framework for mobile computing and communication. In: Proceedings of the 5th IEEE International Symposium on Service Oriented System Engineering (SOSE). Nanjing, China, pp 27–34
102.
Zurück zum Zitat Zhou Z, Huang D (2011) Efficient and secure data storage operations for mobile cloud computing. In: Proceedings of the 8th International Conference on Network and Service Management. Laxenburg, Austria, pp 37–45 Zhou Z, Huang D (2011) Efficient and secure data storage operations for mobile cloud computing. In: Proceedings of the 8th International Conference on Network and Service Management. Laxenburg, Austria, pp 37–45
103.
Zurück zum Zitat Yu S, Wang C, Ren K, Lou W (2010) Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on Information. Computer and Communications Security, Beijing, China, pp 261–270 Yu S, Wang C, Ren K, Lou W (2010) Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on Information. Computer and Communications Security, Beijing, China, pp 261–270
104.
Zurück zum Zitat Li F, Rahulamathavan Y, Rajarajan M, Phan RC (2013) Low complexity multi-authority attribute based encryption scheme for mobile cloud computing. In: Proceedings of the 7th International Symposium on Service Oriented System Engineering (SOSE). IEEE, San Francisco, pp 573–577 Li F, Rahulamathavan Y, Rajarajan M, Phan RC (2013) Low complexity multi-authority attribute based encryption scheme for mobile cloud computing. In: Proceedings of the 7th International Symposium on Service Oriented System Engineering (SOSE). IEEE, San Francisco, pp 573–577
105.
Zurück zum Zitat Chase M, Chow SS (2009) Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS ’09). Illinois, USA, Chicago, pp 121–130 Chase M, Chow SS (2009) Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS ’09). Illinois, USA, Chicago, pp 121–130
106.
Zurück zum Zitat Lv Z, Chi J, Zhang M, Feng D (2014) Efficiently attribute-based access control for mobile cloud storage system. In: Proceedings of the 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, Beijing, pp 292–299 Lv Z, Chi J, Zhang M, Feng D (2014) Efficiently attribute-based access control for mobile cloud storage system. In: Proceedings of the 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, Beijing, pp 292–299
107.
Zurück zum Zitat Fei L, Rahulamathavan Y, Rajarajan M (2014) LSD-ABAC: Lightweight static and dynamic attributes based access control scheme for secure data access in mobile environment. In: Proceedings of the 39th Conference on Local Computer Networks (LCN). IEE, Edmonton, Alberta, Canada, pp 354–361 Fei L, Rahulamathavan Y, Rajarajan M (2014) LSD-ABAC: Lightweight static and dynamic attributes based access control scheme for secure data access in mobile environment. In: Proceedings of the 39th Conference on Local Computer Networks (LCN). IEE, Edmonton, Alberta, Canada, pp 354–361
108.
Zurück zum Zitat Dong X et al (2014) Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. Comput Secur 42(5):151–164CrossRef Dong X et al (2014) Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. Comput Secur 42(5):151–164CrossRef
110.
Zurück zum Zitat Al-Riyami S, Paterson K (2003) Certificateless public key cryptography. In: Laih CS (ed) Advances in Cryptology-ASIACRYPT. Springer, Berlin, pp 452–473 Al-Riyami S, Paterson K (2003) Certificateless public key cryptography. In: Laih CS (ed) Advances in Cryptology-ASIACRYPT. Springer, Berlin, pp 452–473
111.
Zurück zum Zitat Xu L, Wu X, Zhang X (2012) CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: Proceedings of the 7th ACM Symposium on Information. Seoul, Republic of Korea, Computer and Communications Security, pp 87–88 Xu L, Wu X, Zhang X (2012) CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: Proceedings of the 7th ACM Symposium on Information. Seoul, Republic of Korea, Computer and Communications Security, pp 87–88
112.
Zurück zum Zitat Seo SH, Nabeel M, Ding X, Bertino E (2014) An efficient certificateless encryption for secure data sharing in public clouds. IEEE Trans Knowl Data Eng 26(9):2107–2119CrossRef Seo SH, Nabeel M, Ding X, Bertino E (2014) An efficient certificateless encryption for secure data sharing in public clouds. IEEE Trans Knowl Data Eng 26(9):2107–2119CrossRef
113.
Zurück zum Zitat Yang C, Wang F, Wang X (2007) Efficient mediated certificates public key encryption scheme without pairings. In: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW’07). Niagara Falls, Ontario, Canada, pp 109–112 Yang C, Wang F, Wang X (2007) Efficient mediated certificates public key encryption scheme without pairings. In: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW’07). Niagara Falls, Ontario, Canada, pp 109–112
115.
Zurück zum Zitat Zhu L, Tung B (2006) RFC 4556: public key cryptography for initial authentication in Kerberos (PKINIT). IETF Network Working Group Zhu L, Tung B (2006) RFC 4556: public key cryptography for initial authentication in Kerberos (PKINIT). IETF Network Working Group
116.
Zurück zum Zitat Harbitter A, Menasce DA (2001) The performance of public key-enabled Kerberos authentication in mobile computing applications. In: Proceedings of the 8th ACM Conference on Computer and Communications Security. Pennsylvania, Philadelphia, pp 78–85 Harbitter A, Menasce DA (2001) The performance of public key-enabled Kerberos authentication in mobile computing applications. In: Proceedings of the 8th ACM Conference on Computer and Communications Security. Pennsylvania, Philadelphia, pp 78–85
117.
Zurück zum Zitat Fox A, Gribble SD (1996) Security on the move: indirect authentication using Kerberos. In: Proceedings of the 2nd Annual International Conference on Mobile Computing and Networking. Rye, New York, USA, pp 155–164CrossRef Fox A, Gribble SD (1996) Security on the move: indirect authentication using Kerberos. In: Proceedings of the 2nd Annual International Conference on Mobile Computing and Networking. Rye, New York, USA, pp 155–164CrossRef
118.
Zurück zum Zitat Park KW, Lim SS, Park KH (2008) Computationally efficient PKI-based single sign-on protocol, PKASSO for mobile devices. IEEE Trans Comput 57(6):821–834MathSciNetCrossRef Park KW, Lim SS, Park KH (2008) Computationally efficient PKI-based single sign-on protocol, PKASSO for mobile devices. IEEE Trans Comput 57(6):821–834MathSciNetCrossRef
119.
Zurück zum Zitat Yang J et al (2011) Provable data possession of resource constrained mobile devices in cloud computing. J Netw 6(7):1033–1040 Yang J et al (2011) Provable data possession of resource constrained mobile devices in cloud computing. J Netw 6(7):1033–1040
120.
Zurück zum Zitat Wang Q et al (2009) Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of the 14th European Conference on Research in Computer Security (ESORICS ’09). Saint-Malo, France, pp 355–370 Wang Q et al (2009) Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of the 14th European Conference on Research in Computer Security (ESORICS ’09). Saint-Malo, France, pp 355–370
122.
Zurück zum Zitat Nagaty KA (2014) Mobile health care on a secured hybrid cloud. J Sel Areas Health Inform 4(2):1–9 Nagaty KA (2014) Mobile health care on a secured hybrid cloud. J Sel Areas Health Inform 4(2):1–9
123.
Zurück zum Zitat Sujithra M, Padmavathi G, Narayanan S (2015) Mobile device data security: a cryptographic approach by outsourcing mobile data to cloud. Procedia Comput Sci 47:480–485CrossRef Sujithra M, Padmavathi G, Narayanan S (2015) Mobile device data security: a cryptographic approach by outsourcing mobile data to cloud. Procedia Comput Sci 47:480–485CrossRef
124.
Zurück zum Zitat Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Nyberg K (ed) Advances in Cryptology–EUROCRYPT’98. Springer, Berlin, pp 127–144 Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Nyberg K (ed) Advances in Cryptology–EUROCRYPT’98. Springer, Berlin, pp 127–144
125.
Zurück zum Zitat Green M, Ateniese G (2007) Identity-based proxy reencryption. In: Katz J (ed) Applied Cryptography and Network Security. Springer, Berlin, pp 288–306CrossRef Green M, Ateniese G (2007) Identity-based proxy reencryption. In: Katz J (ed) Applied Cryptography and Network Security. Springer, Berlin, pp 288–306CrossRef
126.
Zurück zum Zitat Jia W et al (2011) SDSM: a secure data service mechanism in mobile cloud computing. In: Proceedings of the IEEE Conference on Computer Communications Workshops. Shanghai, China, pp 1060–1065 Jia W et al (2011) SDSM: a secure data service mechanism in mobile cloud computing. In: Proceedings of the IEEE Conference on Computer Communications Workshops. Shanghai, China, pp 1060–1065
127.
Zurück zum Zitat Tysowski PK, Hasan MA (2011) Re-encryption-based key management towards secure and scalable mobile applications in clouds. In: IACR Cryptology ePrint Archive 668 Tysowski PK, Hasan MA (2011) Re-encryption-based key management towards secure and scalable mobile applications in clouds. In: IACR Cryptology ePrint Archive 668
128.
Zurück zum Zitat Khan AN, Kiah MM, Ali M, Shamshirband S (2015) A cloud-manager-based re-encryption scheme for mobile users in cloud environment: a hybrid approach. J Grid Comput 13(4):651–675CrossRef Khan AN, Kiah MM, Ali M, Shamshirband S (2015) A cloud-manager-based re-encryption scheme for mobile users in cloud environment: a hybrid approach. J Grid Comput 13(4):651–675CrossRef
129.
Zurück zum Zitat Bellare M, Goldreich O, Goldwasser S (1994) Incremental cryptography: the case of hashing and signing. Advances in Cryptology-CRYPTO’94. Springer, Berlin, pp 216–233 Bellare M, Goldreich O, Goldwasser S (1994) Incremental cryptography: the case of hashing and signing. Advances in Cryptology-CRYPTO’94. Springer, Berlin, pp 216–233
130.
Zurück zum Zitat Bellare M, Goldreich O, Goldwasser S (1995) Incremental cryptography and application to virus protection. In: Proceedings of the 27th Annual ACM Symposium on Theory of Computing. ACM, Riva, pp 45–56 Bellare M, Goldreich O, Goldwasser S (1995) Incremental cryptography and application to virus protection. In: Proceedings of the 27th Annual ACM Symposium on Theory of Computing. ACM, Riva, pp 45–56
131.
Zurück zum Zitat Bellare M, Micciancio D (1997) A new paradigm for collision-free hashing: incrementality at reduced cost. Advances in Cryptology-EUROCRYPT’97. Springer, Berlin, pp 163–192 Bellare M, Micciancio D (1997) A new paradigm for collision-free hashing: incrementality at reduced cost. Advances in Cryptology-EUROCRYPT’97. Springer, Berlin, pp 163–192
132.
Zurück zum Zitat Itani W, Kayssi A, Chehab A (2010) Energy-efficient incremental integrity for securing storage in mobile cloud computing. In: Proceedings of the International Conference on Energy Aware Computing (ICEAC ’10). IEEE, Cairo, pp 1–2CrossRef Itani W, Kayssi A, Chehab A (2010) Energy-efficient incremental integrity for securing storage in mobile cloud computing. In: Proceedings of the International Conference on Energy Aware Computing (ICEAC ’10). IEEE, Cairo, pp 1–2CrossRef
133.
Zurück zum Zitat Khan AN et al (2014) Incremental proxy re-encryption scheme for mobile cloud computing environment. J Supercomput 68(2):624–651CrossRef Khan AN et al (2014) Incremental proxy re-encryption scheme for mobile cloud computing environment. J Supercomput 68(2):624–651CrossRef
134.
Zurück zum Zitat Wang C, Huaizhi Y (2010) Study of cloud computing security based on private face recognition. In: Proceedings of the International Conference on Computational Intelligence and Software Engineering (CiSE). Wuhan, China, pp 1–5 Wang C, Huaizhi Y (2010) Study of cloud computing security based on private face recognition. In: Proceedings of the International Conference on Computational Intelligence and Software Engineering (CiSE). Wuhan, China, pp 1–5
135.
Zurück zum Zitat Derawi MO, Yang B, Busch C (2011) Fingerprint recognition with embedded cameras on mobile phones. In: Prasad R (ed) Security and Privacy in Mobile Information and Communication Systems. Springer, Berlin, pp 136–147 Derawi MO, Yang B, Busch C (2011) Fingerprint recognition with embedded cameras on mobile phones. In: Prasad R (ed) Security and Privacy in Mobile Information and Communication Systems. Springer, Berlin, pp 136–147
136.
Zurück zum Zitat Omri F, Foufou S, Hamila R, Jarraya M (2013) Cloud-based mobile system for biometrics authentication. In: Proceedings of the 13th IEEE International Conference on ITS Telecommunications (ITST). Tampere, Finland, pp 325–330 Omri F, Foufou S, Hamila R, Jarraya M (2013) Cloud-based mobile system for biometrics authentication. In: Proceedings of the 13th IEEE International Conference on ITS Telecommunications (ITST). Tampere, Finland, pp 325–330
137.
Zurück zum Zitat Pawle A, Pawar P (2013) Face recognition system (FRS) on cloud computing for user authentication. Int J Soft Comput Eng 3(4):189–192 Pawle A, Pawar P (2013) Face recognition system (FRS) on cloud computing for user authentication. Int J Soft Comput Eng 3(4):189–192
138.
Zurück zum Zitat Rassan IA, AlShaher H (2014) Securing mobile cloud computing using biometric authentication (SMCBA). In: Proceedings of the 2014 International Conference on Computational Science and Computational Intelligence (CSCI’14). IEEE, Las Vegas, pp 157–161 Rassan IA, AlShaher H (2014) Securing mobile cloud computing using biometric authentication (SMCBA). In: Proceedings of the 2014 International Conference on Computational Science and Computational Intelligence (CSCI’14). IEEE, Las Vegas, pp 157–161
139.
Zurück zum Zitat Bommagani AS, Valenti MC, Ross A (2014) A framework for secure cloud-empowered mobile biometrics. In: Proceedings of the 2014 Military Communications Conference (MILCOM). IEEE, Baltimore, pp 255–261CrossRef Bommagani AS, Valenti MC, Ross A (2014) A framework for secure cloud-empowered mobile biometrics. In: Proceedings of the 2014 Military Communications Conference (MILCOM). IEEE, Baltimore, pp 255–261CrossRef
140.
Zurück zum Zitat Viola P, Jones M (2001) Rapid object detection using a boosted cascade of simple features. In: Proceedings of the 2001 IEEE Conference on Computer Vision and Pattern Recognition, Kauai, Hawaii, USA, pp I-511–I-518 Viola P, Jones M (2001) Rapid object detection using a boosted cascade of simple features. In: Proceedings of the 2001 IEEE Conference on Computer Vision and Pattern Recognition, Kauai, Hawaii, USA, pp I-511–I-518
141.
Zurück zum Zitat Ahonen T, Hadid A, Pietikainen M (2006) Face description with local binary patterns: application to face recognition. IEEE Trans Pattern Anal Mach Intell 28(12):2037–2041MATHCrossRef Ahonen T, Hadid A, Pietikainen M (2006) Face description with local binary patterns: application to face recognition. IEEE Trans Pattern Anal Mach Intell 28(12):2037–2041MATHCrossRef
142.
Zurück zum Zitat Fan CI, Lin YH, Hsu RH (2006) Remote password authentication scheme with smart cards and biometrics. In: Proceedings of 49th Annual IEEE Global Telecommunications Conference (GLOBECOM). California, USA, San Francisco, pp 1–5 Fan CI, Lin YH, Hsu RH (2006) Remote password authentication scheme with smart cards and biometrics. In: Proceedings of 49th Annual IEEE Global Telecommunications Conference (GLOBECOM). California, USA, San Francisco, pp 1–5
143.
Zurück zum Zitat Khan MK, Kumari S, Gupta MK (2014) More efficient key-hash based fingerprint remote authentication scheme using mobile device. Computing 96(9):793–816MathSciNetCrossRef Khan MK, Kumari S, Gupta MK (2014) More efficient key-hash based fingerprint remote authentication scheme using mobile device. Computing 96(9):793–816MathSciNetCrossRef
144.
Zurück zum Zitat Wu F, Xu L, Kumari S, Li X (2015) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks. Comput Electr Eng 45(7):274–285CrossRef Wu F, Xu L, Kumari S, Li X (2015) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks. Comput Electr Eng 45(7):274–285CrossRef
146.
Zurück zum Zitat Wen J, Zhang M, Li X (2005) The study on the application of BAN logic in formal analysis of authentication protocols. In: Proceedings of the 7th International Conference on Electronic Commerce. Xi’an, China, pp 744–747 Wen J, Zhang M, Li X (2005) The study on the application of BAN logic in formal analysis of authentication protocols. In: Proceedings of the 7th International Conference on Electronic Commerce. Xi’an, China, pp 744–747
147.
Zurück zum Zitat Xi K et al (2011) A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment. Secur Commun Netw 4(5):487–499CrossRef Xi K et al (2011) A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment. Secur Commun Netw 4(5):487–499CrossRef
149.
Zurück zum Zitat Wang Y, Hu J, Phillips D (2007) A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular point detection and fingerprint indexing. IEEE Trans Pattern Anal Mach Intell 29(4):573–585CrossRef Wang Y, Hu J, Phillips D (2007) A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular point detection and fingerprint indexing. IEEE Trans Pattern Anal Mach Intell 29(4):573–585CrossRef
150.
Zurück zum Zitat Wang YA, Hu J (2011) Global ridge orientation modeling for partial fingerprint identification. IEEE Trans Pattern Anal Mach Intell 33(1):72–87CrossRef Wang YA, Hu J (2011) Global ridge orientation modeling for partial fingerprint identification. IEEE Trans Pattern Anal Mach Intell 33(1):72–87CrossRef
151.
Zurück zum Zitat Wang P, Ku CC Wang TC (2011) A new fingerprint authentication scheme based on secret-splitting for cloud computing security. Recent Application in Biometrics. InTech Open Access Publisher, Europe, pp 183–196 Wang P, Ku CC Wang TC (2011) A new fingerprint authentication scheme based on secret-splitting for cloud computing security. Recent Application in Biometrics. InTech Open Access Publisher, Europe, pp 183–196
152.
Zurück zum Zitat Bhatia T, Verma AK (2014) Biometric authentication for cloud computing. In: Deka GS (ed) Handbook of Research on Securing Cloud-Based Databases with Biometric Applications. IGI Global, pp 209–235 Bhatia T, Verma AK (2014) Biometric authentication for cloud computing. In: Deka GS (ed) Handbook of Research on Securing Cloud-Based Databases with Biometric Applications. IGI Global, pp 209–235
153.
Zurück zum Zitat Chen CL, Lee CC, Hsu CY (2012) Mobile device integration of a fingerprint biometric remote authentication scheme. Int J Commun Syst 25(5):585–597CrossRef Chen CL, Lee CC, Hsu CY (2012) Mobile device integration of a fingerprint biometric remote authentication scheme. Int J Commun Syst 25(5):585–597CrossRef
154.
Zurück zum Zitat Cheng H et al (2012) Identity based encryption and biometric authentication scheme for secure data access in cloud computing. Chin J Electron 21(2):254–259 Cheng H et al (2012) Identity based encryption and biometric authentication scheme for secure data access in cloud computing. Chin J Electron 21(2):254–259
155.
Zurück zum Zitat Shor PW (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev 41(2):303–332MathSciNetMATHCrossRef Shor PW (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev 41(2):303–332MathSciNetMATHCrossRef
156.
Zurück zum Zitat Bernstein DJ, Buchmann J, Dahmen E (2009) Post-quantum cryptography. Springer Science & Business Media, BerlinMATHCrossRef Bernstein DJ, Buchmann J, Dahmen E (2009) Post-quantum cryptography. Springer Science & Business Media, BerlinMATHCrossRef
Metadaten
Titel
Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues
verfasst von
Tarunpreet Bhatia
A. K. Verma
Publikationsdatum
09.01.2017
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 6/2017
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-016-1945-y

Weitere Artikel der Ausgabe 6/2017

The Journal of Supercomputing 6/2017 Zur Ausgabe

Premium Partner