Authentication in mobile cloud computing

A survey

Mojtaba Alizadeh, Saeid Abolfazli, Mazdak Zamani, Sabariah Baaaharun, Kouichi Sakurai

Research output: Contribution to journalReview article

59 Citations (Scopus)

Abstract

Mobile cloud computing (MCC) is the state-of-the-art mobile distributed computing model that incorporates multitude of heterogeneous cloud-based resources to augment computational capabilities of the plethora of resource-constraint mobile devices. In MCC, execution time and energy consumption are significantly improved by transferring execution of resource-intensive tasks such as image processing, 3D rendering, and voice recognition from the hosting mobile to the cloud-based resources. However, accessing and exploiting remote cloud-based resources is associated with numerous security and privacy implications, including user authentication and authorization. User authentication in MCC is a critical requirement in securing cloud-based computations and communications. Despite its critical role, there is a gap for a comprehensive study of the authentication approaches in MCC which can provide a deep insight into the state-of-the-art research. This paper presents a comprehensive study of authentication methods in MCC to describe MCC authentication and compare it with that of cloud computing. The taxonomy of the state-of-the-art authentication methods is devised and the most credible efforts are critically reviewed. Moreover, we present a comparison of the state-of-the-art MCC authentication methods considering five evaluation metrics. The results suggest the need for futuristic authentication methods that are designed based on capabilities and limitations of MCC environment. Finally, the design factors deemed could lead to effective authentication mechanisms are presented, and open challenges are highlighted based on the weaknesses and strengths of existing authentication methods.

Original languageEnglish
Pages (from-to)59-80
Number of pages22
JournalJournal of Network and Computer Applications
Volume61
DOIs
Publication statusPublished - Feb 1 2016

Fingerprint

Mobile cloud computing
Authentication
Distributed computer systems
Taxonomies
Cloud computing
Speech recognition
Mobile devices
Image processing
Energy utilization

All Science Journal Classification (ASJC) codes

  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications

Cite this

Authentication in mobile cloud computing : A survey. / Alizadeh, Mojtaba; Abolfazli, Saeid; Zamani, Mazdak; Baaaharun, Sabariah; Sakurai, Kouichi.

In: Journal of Network and Computer Applications, Vol. 61, 01.02.2016, p. 59-80.

Research output: Contribution to journalReview article

Alizadeh, Mojtaba ; Abolfazli, Saeid ; Zamani, Mazdak ; Baaaharun, Sabariah ; Sakurai, Kouichi. / Authentication in mobile cloud computing : A survey. In: Journal of Network and Computer Applications. 2016 ; Vol. 61. pp. 59-80.
@article{741bf8a7851144ecb36bf4c5729a5442,
title = "Authentication in mobile cloud computing: A survey",
abstract = "Mobile cloud computing (MCC) is the state-of-the-art mobile distributed computing model that incorporates multitude of heterogeneous cloud-based resources to augment computational capabilities of the plethora of resource-constraint mobile devices. In MCC, execution time and energy consumption are significantly improved by transferring execution of resource-intensive tasks such as image processing, 3D rendering, and voice recognition from the hosting mobile to the cloud-based resources. However, accessing and exploiting remote cloud-based resources is associated with numerous security and privacy implications, including user authentication and authorization. User authentication in MCC is a critical requirement in securing cloud-based computations and communications. Despite its critical role, there is a gap for a comprehensive study of the authentication approaches in MCC which can provide a deep insight into the state-of-the-art research. This paper presents a comprehensive study of authentication methods in MCC to describe MCC authentication and compare it with that of cloud computing. The taxonomy of the state-of-the-art authentication methods is devised and the most credible efforts are critically reviewed. Moreover, we present a comparison of the state-of-the-art MCC authentication methods considering five evaluation metrics. The results suggest the need for futuristic authentication methods that are designed based on capabilities and limitations of MCC environment. Finally, the design factors deemed could lead to effective authentication mechanisms are presented, and open challenges are highlighted based on the weaknesses and strengths of existing authentication methods.",
author = "Mojtaba Alizadeh and Saeid Abolfazli and Mazdak Zamani and Sabariah Baaaharun and Kouichi Sakurai",
year = "2016",
month = "2",
day = "1",
doi = "10.1016/j.jnca.2015.10.005",
language = "English",
volume = "61",
pages = "59--80",
journal = "Journal of Network and Computer Applications",
issn = "1084-8045",
publisher = "Academic Press Inc.",

}

TY - JOUR

T1 - Authentication in mobile cloud computing

T2 - A survey

AU - Alizadeh, Mojtaba

AU - Abolfazli, Saeid

AU - Zamani, Mazdak

AU - Baaaharun, Sabariah

AU - Sakurai, Kouichi

PY - 2016/2/1

Y1 - 2016/2/1

N2 - Mobile cloud computing (MCC) is the state-of-the-art mobile distributed computing model that incorporates multitude of heterogeneous cloud-based resources to augment computational capabilities of the plethora of resource-constraint mobile devices. In MCC, execution time and energy consumption are significantly improved by transferring execution of resource-intensive tasks such as image processing, 3D rendering, and voice recognition from the hosting mobile to the cloud-based resources. However, accessing and exploiting remote cloud-based resources is associated with numerous security and privacy implications, including user authentication and authorization. User authentication in MCC is a critical requirement in securing cloud-based computations and communications. Despite its critical role, there is a gap for a comprehensive study of the authentication approaches in MCC which can provide a deep insight into the state-of-the-art research. This paper presents a comprehensive study of authentication methods in MCC to describe MCC authentication and compare it with that of cloud computing. The taxonomy of the state-of-the-art authentication methods is devised and the most credible efforts are critically reviewed. Moreover, we present a comparison of the state-of-the-art MCC authentication methods considering five evaluation metrics. The results suggest the need for futuristic authentication methods that are designed based on capabilities and limitations of MCC environment. Finally, the design factors deemed could lead to effective authentication mechanisms are presented, and open challenges are highlighted based on the weaknesses and strengths of existing authentication methods.

AB - Mobile cloud computing (MCC) is the state-of-the-art mobile distributed computing model that incorporates multitude of heterogeneous cloud-based resources to augment computational capabilities of the plethora of resource-constraint mobile devices. In MCC, execution time and energy consumption are significantly improved by transferring execution of resource-intensive tasks such as image processing, 3D rendering, and voice recognition from the hosting mobile to the cloud-based resources. However, accessing and exploiting remote cloud-based resources is associated with numerous security and privacy implications, including user authentication and authorization. User authentication in MCC is a critical requirement in securing cloud-based computations and communications. Despite its critical role, there is a gap for a comprehensive study of the authentication approaches in MCC which can provide a deep insight into the state-of-the-art research. This paper presents a comprehensive study of authentication methods in MCC to describe MCC authentication and compare it with that of cloud computing. The taxonomy of the state-of-the-art authentication methods is devised and the most credible efforts are critically reviewed. Moreover, we present a comparison of the state-of-the-art MCC authentication methods considering five evaluation metrics. The results suggest the need for futuristic authentication methods that are designed based on capabilities and limitations of MCC environment. Finally, the design factors deemed could lead to effective authentication mechanisms are presented, and open challenges are highlighted based on the weaknesses and strengths of existing authentication methods.

UR - http://www.scopus.com/inward/record.url?scp=84948845626&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84948845626&partnerID=8YFLogxK

U2 - 10.1016/j.jnca.2015.10.005

DO - 10.1016/j.jnca.2015.10.005

M3 - Review article

VL - 61

SP - 59

EP - 80

JO - Journal of Network and Computer Applications

JF - Journal of Network and Computer Applications

SN - 1084-8045

ER -