International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 101 | Views: 271

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 10, October 2015 | Popularity: 6.1 / 10


     

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere


Abstract: In recent societies, the number of mobile users has tremendously risen in recent years. The paper provides security and use for mobile users to access different mobile cloud computing services from multiple service providers using only a single private key. In this paper, we propose a new short signature scheme from the bilinear pairings. However, our scheme is represented from Inverse Computational Diffie-Hellman Problem (Inv-CDHP) based on bilinear pairing and does not require any hash function. We give the exact security proofs for the new signature scheme and the ring signature scheme in the model.


Keywords: Cloud computing, Bilinear pairings, Authentication scheme, Mobile cloud computing services, Short signature


Edition: Volume 4 Issue 10, October 2015


Pages: 1548 - 1550



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Chaitali P. Kathar, Vidya Dhamdhere, "Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication", International Journal of Science and Research (IJSR), Volume 4 Issue 10, October 2015, pp. 1548-1550, https://www.ijsr.net/getabstract.php?paperid=SUB159075, DOI: https://www.doi.org/10.21275/SUB159075



Similar Articles

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya, R. Sathya

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2223 - 2228

Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Vaishali Kisanrao Gulhane, S. N. Shelke

Share this Article

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2137 - 2139

A Review of the Graphical Password Based Authentication Schemes

Shraddha S. Banne, Prof. Kishor N. Shedge

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, China, Volume 4 Issue 11, November 2015

Pages: 1446 - 1450

Mutual Authentication Cloud Computing Platform based on TPM

Lei Peng, Yanli Xiao

Share this Article



Top