Downloads: 101 | Views: 271
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 10, October 2015 | Popularity: 6.1 / 10
Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication
Chaitali P. Kathar, Vidya Dhamdhere
Abstract: In recent societies, the number of mobile users has tremendously risen in recent years. The paper provides security and use for mobile users to access different mobile cloud computing services from multiple service providers using only a single private key. In this paper, we propose a new short signature scheme from the bilinear pairings. However, our scheme is represented from Inverse Computational Diffie-Hellman Problem (Inv-CDHP) based on bilinear pairing and does not require any hash function. We give the exact security proofs for the new signature scheme and the ring signature scheme in the model.
Keywords: Cloud computing, Bilinear pairings, Authentication scheme, Mobile cloud computing services, Short signature
Edition: Volume 4 Issue 10, October 2015
Pages: 1548 - 1550
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 1490 - 1494An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication
Mamta, Dr. Shiva Prakash
Downloads: 103
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2223 - 2228Survey on Wireless Sensor Network for Message Authentication and Source Privacy
Vaishali Kisanrao Gulhane, S. N. Shelke
Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2137 - 2139A Review of the Graphical Password Based Authentication Schemes
Shraddha S. Banne, Prof. Kishor N. Shedge
Downloads: 106
Research Paper, Computer Science & Engineering, China, Volume 4 Issue 11, November 2015
Pages: 1446 - 1450Mutual Authentication Cloud Computing Platform based on TPM
Lei Peng, Yanli Xiao