{"title":"Strong authentication for mobile cloud computing","authors":"Anis Ahmed-Nacer, Mehdi Ahmed-Nacer","doi":"10.1109/NOTERE.2016.7745824","DOIUrl":null,"url":null,"abstract":"Today authentication has become a major challenge in mobile cloud computing. Using a static password for authentication in cloud provider presents several security drawbacks: passwords can be forgotten, guessed, written down and stolen, eavesdropped or deliberately being told to other people. In this article, we propose a solution in order to improve authentication in mobile cloud computing and mainly resolves men in the middle attack. This solution is inspired by the authentication algorithms studied in 3G (the 3rd Generation) and TLS (Transport Layer Security) to secure the data exchanged in the network. These algorithms ensure a strong authentication before stating the communication. However, a sensitive data in the network can also be exchanged during the communication. To ensure a strong authentication during a communication, the multi-scale Situation Identification from Context (muSIC) system is used to detect the suspect behavior of the users.","PeriodicalId":225694,"journal":{"name":"2016 13th International Conference on New Technologies for Distributed Systems (NOTERE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 13th International Conference on New Technologies for Distributed Systems (NOTERE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NOTERE.2016.7745824","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Today authentication has become a major challenge in mobile cloud computing. Using a static password for authentication in cloud provider presents several security drawbacks: passwords can be forgotten, guessed, written down and stolen, eavesdropped or deliberately being told to other people. In this article, we propose a solution in order to improve authentication in mobile cloud computing and mainly resolves men in the middle attack. This solution is inspired by the authentication algorithms studied in 3G (the 3rd Generation) and TLS (Transport Layer Security) to secure the data exchanged in the network. These algorithms ensure a strong authentication before stating the communication. However, a sensitive data in the network can also be exchanged during the communication. To ensure a strong authentication during a communication, the multi-scale Situation Identification from Context (muSIC) system is used to detect the suspect behavior of the users.