Abstract
Mobile Cloud Computing (MCC) is cloud computing in which at least some of the devices like mobiles, PDA etc., are involved. This paper drives over several authentication techniques and methods for MCC. An analysis of the existing works are carried out. This Paper also analyses the attacks and Issues that occur during authentication in the mobile cloud environment. A framework called the Mobile Cloud Authenticator (MCA) is proposed for authenticating the mobile users in the mobile cloud environment. The overall framework of MCA consists of three major entities namely, Cloud users, Mobile network and Cloud. There is a system called Unified Cloud Authenticator (UCA) which is placed in between the mobile network and Cloud Service Provider (CSP). It authenticates both users and CSP. The UCA contains Authentication Server (AS), hashing machine, connection manager, user manager and service manager. The operational procedure of UCA has three phases namely registration phase, authentication phase and verification phase. This paper explains the overall framework of MCA and the functions of UCA in detail.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.