Dynamic reciprocal authentication protocol for mobile cloud computing

A combination of mobile and cloud computing delivers many advantages such as mobility, resources, and accessibility through seamless data transmission via the Internet anywhere at any time. However, data transmission through vulnerable channels poses security threats such as man-in-the-middle, playb...

Full description

Saved in:
Bibliographic Details
Main Authors: Ahmed, Abdulghani Ali, Kwan, Wendy, Kabir, M. N., Sadiq, Ali Safaa
Format: Article
Language:English
Published: IEEE 2021
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/29305/1/Dynamic%20Reciprocal%20Authentication%20Protocol%20for%20Mobile%20Cloud%20Computing.pdf
http://umpir.ump.edu.my/id/eprint/29305/
https://doi.org/10.1109/JSYST.2020.3012986
https://doi.org/10.1109/JSYST.2020.3012986
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Malaysia Pahang Al-Sultan Abdullah
Language: English
id my.ump.umpir.29305
record_format eprints
spelling my.ump.umpir.293052023-05-10T06:59:42Z http://umpir.ump.edu.my/id/eprint/29305/ Dynamic reciprocal authentication protocol for mobile cloud computing Ahmed, Abdulghani Ali Kwan, Wendy Kabir, M. N. Sadiq, Ali Safaa QA75 Electronic computers. Computer science QA76 Computer software A combination of mobile and cloud computing delivers many advantages such as mobility, resources, and accessibility through seamless data transmission via the Internet anywhere at any time. However, data transmission through vulnerable channels poses security threats such as man-in-the-middle, playback, impersonation, and asynchronization attacks. To address these threats, we define an explicit security model that can precisely measure the practical capabilities of an adversary. A systematic methodology consisting of 16 evaluation criteria is used for comparative evaluation, thereby leading other approaches to be evaluated through a common scale. Finally, we propose a dynamic reciprocal authentication protocol to secure data transmission in mobile cloud computing (MCC). In particular, our proposed protocol develops a secure reciprocal authentication method, which is free of Diffie–Hellman limitations, and has immunity against basic or sophisticated known attacks. The protocol utilizes multifactor authentication of usernames, passwords, and a one-time password (OTP). The OTP is automatically generated and regularly updated for every connection. The proposed protocol is implemented and tested using Java to demonstrate its efficiency in authenticating communications and securing data transmitted in the MCC environment. Results of the evaluation process indicate that compared with the existing works, the proposed protocol possesses obvious capabilities in security and in communication and computation costs. IEEE 2021-03 Article PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/29305/1/Dynamic%20Reciprocal%20Authentication%20Protocol%20for%20Mobile%20Cloud%20Computing.pdf Ahmed, Abdulghani Ali and Kwan, Wendy and Kabir, M. N. and Sadiq, Ali Safaa (2021) Dynamic reciprocal authentication protocol for mobile cloud computing. IEEE Systems Journal, 15 (1). 727 -737. ISSN 1932-8184. (Published) https://doi.org/10.1109/JSYST.2020.3012986 https://doi.org/10.1109/JSYST.2020.3012986
institution Universiti Malaysia Pahang Al-Sultan Abdullah
building UMPSA Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Pahang Al-Sultan Abdullah
content_source UMPSA Institutional Repository
url_provider http://umpir.ump.edu.my/
language English
topic QA75 Electronic computers. Computer science
QA76 Computer software
spellingShingle QA75 Electronic computers. Computer science
QA76 Computer software
Ahmed, Abdulghani Ali
Kwan, Wendy
Kabir, M. N.
Sadiq, Ali Safaa
Dynamic reciprocal authentication protocol for mobile cloud computing
description A combination of mobile and cloud computing delivers many advantages such as mobility, resources, and accessibility through seamless data transmission via the Internet anywhere at any time. However, data transmission through vulnerable channels poses security threats such as man-in-the-middle, playback, impersonation, and asynchronization attacks. To address these threats, we define an explicit security model that can precisely measure the practical capabilities of an adversary. A systematic methodology consisting of 16 evaluation criteria is used for comparative evaluation, thereby leading other approaches to be evaluated through a common scale. Finally, we propose a dynamic reciprocal authentication protocol to secure data transmission in mobile cloud computing (MCC). In particular, our proposed protocol develops a secure reciprocal authentication method, which is free of Diffie–Hellman limitations, and has immunity against basic or sophisticated known attacks. The protocol utilizes multifactor authentication of usernames, passwords, and a one-time password (OTP). The OTP is automatically generated and regularly updated for every connection. The proposed protocol is implemented and tested using Java to demonstrate its efficiency in authenticating communications and securing data transmitted in the MCC environment. Results of the evaluation process indicate that compared with the existing works, the proposed protocol possesses obvious capabilities in security and in communication and computation costs.
format Article
author Ahmed, Abdulghani Ali
Kwan, Wendy
Kabir, M. N.
Sadiq, Ali Safaa
author_facet Ahmed, Abdulghani Ali
Kwan, Wendy
Kabir, M. N.
Sadiq, Ali Safaa
author_sort Ahmed, Abdulghani Ali
title Dynamic reciprocal authentication protocol for mobile cloud computing
title_short Dynamic reciprocal authentication protocol for mobile cloud computing
title_full Dynamic reciprocal authentication protocol for mobile cloud computing
title_fullStr Dynamic reciprocal authentication protocol for mobile cloud computing
title_full_unstemmed Dynamic reciprocal authentication protocol for mobile cloud computing
title_sort dynamic reciprocal authentication protocol for mobile cloud computing
publisher IEEE
publishDate 2021
url http://umpir.ump.edu.my/id/eprint/29305/1/Dynamic%20Reciprocal%20Authentication%20Protocol%20for%20Mobile%20Cloud%20Computing.pdf
http://umpir.ump.edu.my/id/eprint/29305/
https://doi.org/10.1109/JSYST.2020.3012986
https://doi.org/10.1109/JSYST.2020.3012986
_version_ 1822921673960062976