2016
DOI: 10.1186/s13677-016-0068-6
|View full text |Cite
|
Sign up to set email alerts
|

MDA: message digest-based authentication for mobile cloud computing

Abstract: The emerging area of mobile cloud computing will influence the future of varied applications, such as electronic commerce and health informatics. It is expected to rise in popularity over other models in cloud computing. This is facilitated by its simplicity, accessibility and ease of use. With mobile cloud computing, resource-constrained mobile devices could capitalize on the computation/storage resources of cloud servers via communication networks. Despite the advantage of this innovative computing model, mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(17 citation statements)
references
References 40 publications
0
17
0
Order By: Relevance
“…The authors of ref. [28] recently proposed a message digest authentication scheme (MDA) that strategically incorporates hashing, in addition to traditional user ID and passwords, to achieve mutual authentication. MDA consists of three stages: registration, verification, and update.…”
Section: Password Based Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors of ref. [28] recently proposed a message digest authentication scheme (MDA) that strategically incorporates hashing, in addition to traditional user ID and passwords, to achieve mutual authentication. MDA consists of three stages: registration, verification, and update.…”
Section: Password Based Methodsmentioning
confidence: 99%
“…Approaches such as refs. [28,29], use password based authentication, which is the most widely used and accepted, due to its ease of use, its compatibility, scalability, as well as its low cost. To achieve secure, power-efficient and lightweight authentication for MCC mobile devices, dual-factor authentication protocol is introduced, in which two of the above methods are integrated ensuring minimum processing and energy consumption.…”
Section: An Overview Of MCC Authentication Protocolsmentioning
confidence: 99%
“…Also, the proposed scheme satisfies the generic attack like denial of service attack by specifying the active participants of each communication [21]. Man-in-themiddle attack is satisfying by every communication which is carrying the actual sender and the receiver identity [11,15]. It is carrying the server URI and the client URI in every step and also its getting verified by the server using the user's profile.…”
Section: Security Analysis and Verificationmentioning
confidence: 98%
“…Authentication is an essential security service in any system or network communications [8][9][10]. It is classified as user authentication, remote authentication, mutual authentication, message authentication, and implicit authentication [11,12]. The current authentication review shows the different attributes, based on password, hash value, identity, digital signature, hierarchical model, mobile number, group key, and biometric [13].…”
Section: Introductionmentioning
confidence: 99%
“…Although many authentication schemes have been proposed in recent years [4][5][6][7][8][9][10][11][12][13][14], most of them lack mutual authentication between MClient and CServers [15][16]. Moreover, the existing schemes are vulnerable to known attacks such as man-in-the-middle (MITM), playback, impersonation, and asynchronization [17][18][19].…”
Section: Introductionmentioning
confidence: 99%