Bhatia et al., 2017 - Google Patents
Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issuesBhatia et al., 2017
- Document ID
- 18182862796347036464
- Author
- Bhatia T
- Verma A
- Publication year
- Publication venue
- The Journal of Supercomputing
External Links
Snippet
The incessant spurt of research activities to augment capabilities of resource-constrained mobile devices by leveraging heterogeneous cloud resources has created a new research impetus called mobile cloud computing. However, this rapid relocation to the cloud has …
- 238000011160 research 0 title abstract description 27
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Bhatia et al. | Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues | |
| Abdullah et al. | Blockchain based approach to enhance big data authentication in distributed environment | |
| Kaur et al. | A secure two‐factor authentication framework in cloud computing | |
| Kim et al. | A security analysis of blockchain-based did services | |
| Lim et al. | Security issues and future challenges of cloud service authentication | |
| Tirfe et al. | A survey on trends of two-factor authentication | |
| Singh | The role of multi-factor authentication and encryption in securing data access of cloud resources in a multitenant environment | |
| CN115001841A (en) | Identity authentication method, identity authentication device and storage medium | |
| Schwarz et al. | Feido: Recoverable fido2 tokens using electronic ids | |
| Nimmy et al. | A novel multi-factor authentication protocol for smart home environments | |
| KR20220038115A (en) | Systems and Methods for Biometric Protocol Standards | |
| KR20180080183A (en) | Systems and methods for biometric protocol standards | |
| US20250021982A1 (en) | Digital ecosystem with de-centralized secure transactions and edge ai technology to enable privacy preserved zero-id transactions | |
| Quan et al. | A secure user authentication protocol for sensor network in data capturing | |
| Khan et al. | A brief review on cloud computing authentication frameworks | |
| Wee et al. | Excavating vulnerabilities lurking in multi-factor authentication protocols: A systematic security analysis | |
| Yang et al. | Context-aware phishing-resistant authentication for federated identity in Internet of Things platforms | |
| Vemulapalli et al. | Security frameworks in mobile cloud computing | |
| CN106576050B (en) | Three-tier security and computing architecture | |
| Rajamanickam et al. | EAPIOD: ECC based authentication protocol for insider attack protection in IoD scenario | |
| Sudha et al. | A survey on different authentication schemes in cloud computing environment | |
| Haqani et al. | A decentralised blockchain-based secure authentication scheme for IoT devices | |
| Binu et al. | A strong single sign-on user authentication scheme using mobile token without verifier table for cloud based services | |
| Binu et al. | A mobile based remote user authentication scheme without verifier table for cloud based services | |
| Hasan et al. | Authentication techniques in cloud and mobile cloud computing |