[go: up one dir, main page]

Bhatia et al., 2017 - Google Patents

Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues

Bhatia et al., 2017

Document ID
18182862796347036464
Author
Bhatia T
Verma A
Publication year
Publication venue
The Journal of Supercomputing

External Links

Snippet

The incessant spurt of research activities to augment capabilities of resource-constrained mobile devices by leveraging heterogeneous cloud resources has created a new research impetus called mobile cloud computing. However, this rapid relocation to the cloud has …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Bhatia et al. Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues
Abdullah et al. Blockchain based approach to enhance big data authentication in distributed environment
Kaur et al. A secure two‐factor authentication framework in cloud computing
Kim et al. A security analysis of blockchain-based did services
Lim et al. Security issues and future challenges of cloud service authentication
Tirfe et al. A survey on trends of two-factor authentication
Singh The role of multi-factor authentication and encryption in securing data access of cloud resources in a multitenant environment
CN115001841A (en) Identity authentication method, identity authentication device and storage medium
Schwarz et al. Feido: Recoverable fido2 tokens using electronic ids
Nimmy et al. A novel multi-factor authentication protocol for smart home environments
KR20220038115A (en) Systems and Methods for Biometric Protocol Standards
KR20180080183A (en) Systems and methods for biometric protocol standards
US20250021982A1 (en) Digital ecosystem with de-centralized secure transactions and edge ai technology to enable privacy preserved zero-id transactions
Quan et al. A secure user authentication protocol for sensor network in data capturing
Khan et al. A brief review on cloud computing authentication frameworks
Wee et al. Excavating vulnerabilities lurking in multi-factor authentication protocols: A systematic security analysis
Yang et al. Context-aware phishing-resistant authentication for federated identity in Internet of Things platforms
Vemulapalli et al. Security frameworks in mobile cloud computing
CN106576050B (en) Three-tier security and computing architecture
Rajamanickam et al. EAPIOD: ECC based authentication protocol for insider attack protection in IoD scenario
Sudha et al. A survey on different authentication schemes in cloud computing environment
Haqani et al. A decentralised blockchain-based secure authentication scheme for IoT devices
Binu et al. A strong single sign-on user authentication scheme using mobile token without verifier table for cloud based services
Binu et al. A mobile based remote user authentication scheme without verifier table for cloud based services
Hasan et al. Authentication techniques in cloud and mobile cloud computing