File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Towards secure and cost-effective fuzzy access control in mobile cloud computing

TitleTowards secure and cost-effective fuzzy access control in mobile cloud computing
Authors
KeywordsSecure
SME
Mobile cloud
B2C
Cost-effective
Fuzzy access-control
Issue Date2017
Citation
Soft Computing, 2017, v. 21, n. 10, p. 2643-2649 How to Cite?
Abstract© 2015, Springer-Verlag Berlin Heidelberg. In this article, we suggest a secure and cost-effective fuzzy access control protocol in mobile cloud computing. It is especially designed for small and medium enterprises (SMEs) providing business-to-customers services. Our protocol allows the SME to outsource its services to a cloud to reduce the running cost. At the same time, it does not require any communication between the cloud and the SME during user authentication stage. That is, SME can be offline after users have been registered. Users directly deal with the cloud for gaining access. This helps the SME to save a lot of resources, including a large bandwidth connecting with the cloud and a strong firewall system. Meanwhile, the user database never leaves the SME. In addition, our protocol can withstand common attacks such as dictionary attacks for server and phishing attacks for client. Our security protection is especially important for mobile users as mobile devices are easily exposed to such attacks. Furthermore, our protocol provides user traceability to SME and it is very efficient for mobile devices.
Persistent Identifierhttp://hdl.handle.net/10722/280570
ISSN
2021 Impact Factor: 3.732
2020 SCImago Journal Rankings: 0.626
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorWu, Wei-
dc.contributor.authorHu, Shun-
dc.contributor.authorYang, Xu-
dc.contributor.authorLiu, Joseph K.-
dc.contributor.authorAu, Man Ho-
dc.date.accessioned2020-02-17T14:34:22Z-
dc.date.available2020-02-17T14:34:22Z-
dc.date.issued2017-
dc.identifier.citationSoft Computing, 2017, v. 21, n. 10, p. 2643-2649-
dc.identifier.issn1432-7643-
dc.identifier.urihttp://hdl.handle.net/10722/280570-
dc.description.abstract© 2015, Springer-Verlag Berlin Heidelberg. In this article, we suggest a secure and cost-effective fuzzy access control protocol in mobile cloud computing. It is especially designed for small and medium enterprises (SMEs) providing business-to-customers services. Our protocol allows the SME to outsource its services to a cloud to reduce the running cost. At the same time, it does not require any communication between the cloud and the SME during user authentication stage. That is, SME can be offline after users have been registered. Users directly deal with the cloud for gaining access. This helps the SME to save a lot of resources, including a large bandwidth connecting with the cloud and a strong firewall system. Meanwhile, the user database never leaves the SME. In addition, our protocol can withstand common attacks such as dictionary attacks for server and phishing attacks for client. Our security protection is especially important for mobile users as mobile devices are easily exposed to such attacks. Furthermore, our protocol provides user traceability to SME and it is very efficient for mobile devices.-
dc.languageeng-
dc.relation.ispartofSoft Computing-
dc.subjectSecure-
dc.subjectSME-
dc.subjectMobile cloud-
dc.subjectB2C-
dc.subjectCost-effective-
dc.subjectFuzzy access-control-
dc.titleTowards secure and cost-effective fuzzy access control in mobile cloud computing-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1007/s00500-015-1964-2-
dc.identifier.scopuseid_2-s2.0-84949754628-
dc.identifier.volume21-
dc.identifier.issue10-
dc.identifier.spage2643-
dc.identifier.epage2649-
dc.identifier.eissn1433-7479-
dc.identifier.isiWOS:000400234600019-
dc.identifier.issnl1432-7643-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats