651. AMLT: A Mutual Authentication Scheme for Mobile Cloud Computing
- Author
-
Qiang Ye, Saurabh Dey, and Srinivas Sampalli
- Subjects
Password ,Authentication ,business.industry ,Computer science ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Mutual authentication ,Encryption ,Mobile cloud computing ,Symmetric-key algorithm ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Mobile technology ,business ,Computer network - Abstract
Mobile cloud computing has emerged as an appealing computing model that is expected to be widely deployed. In recent years, a noticeable amount of research efforts have been dedicated to mobile technologies and cloud computing to solve varied problems in interdisciplinary fields, such as health care, retail etc. Mobile cloud computing enables efficient real-time data gathering and remote processing, which minimize the probability of data loss and thereby improve the quality of processed information. However, due to the dynamic and heterogeneous topology of mobile cloud computing, oftentimes sensitive information transferred over mobile wireless technologies is susceptible to various types of attacks, which may reveal sensitive information or cause significant business loss. To establish secure data transfer sessions between communicating parties, one of the existing authentication schemes, such as token-based authentication and Secure Shell (SSH) password based authentication, could be used. However, the existing authentication schemes are either computationally expensive or unsuited for the mobile cloud computing environment in terms of security and resource utilization. In this paper, we present a mutual authentication scheme for mobile cloud computing, Authentication based on Message digest, Location, and Timestamp (AMLT). AMLT utilizes symmetric keys to reduce computational complexity and employs dynamic keys to minimize the predictability of encryption keys. In our research, the protocol analyzer Scyther is used to formally validate the security of AMLT.
- Published
- 2018
- Full Text
- View/download PDF