EconPapers    
Economics at your fingertips  
 

An improved authentication protocol for distributed mobile cloud computing services

Hoda Jannati and Behnam Bahrak

International Journal of Critical Infrastructure Protection, 2017, vol. 19, issue C, 59-67

Abstract: Cloud computing is a popular network access model for the transparent and ubiquitous sharing of services and computing resources among customers by service providers. In the critical infrastructure domain, cloud computing is used by governments for applications such as revenue collection to improve operations and achieve cost savings. Although cloud computing systems promise convenience, they threaten the privacy of users who transfer their applications to the cloud. In order to prevent illegal access, it is imperative that cloud providers implement secure authentication schemes.

Keywords: Mobile Cloud Services; Mutual Authentication; Bilinear Pairing; User Anonymity; User Untraceability (search for similar items in EconPapers)
Date: 2017
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (1)

Downloads: (external link)
http://www.sciencedirect.com/science/article/pii/S1874548216300026
Full text for ScienceDirect subscribers only

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:eee:ijocip:v:19:y:2017:i:c:p:59-67

DOI: 10.1016/j.ijcip.2017.10.003

Access Statistics for this article

International Journal of Critical Infrastructure Protection is currently edited by Leon Strous

More articles in International Journal of Critical Infrastructure Protection from Elsevier
Bibliographic data for series maintained by Catherine Liu ().

 
Page updated 2025-03-19
Handle: RePEc:eee:ijocip:v:19:y:2017:i:c:p:59-67