2019
DOI: 10.1155/2019/5141395
|View full text |Cite
|
Sign up to set email alerts
|

New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing

Abstract: A phishing attack is one of the severe threats to the smartphone users. As per the recent lookout report, mobile phishing attack is increasing 85% year to year and going to become a significant threat to the smartphone users. This social engineering attack attempts to get the user’s password by disguising as trusted service provider. Most of the smartphone users are using the Internet services outside of the traditional firewall. Cloud-based documents are one of the primary targets of this phishing attack in m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…• Phishing attack : It is a social engineering attack where an attacker is disguised trusted service provider, tries to steal confidential data like passwords, credit card numbers by tempting the recipient to click the malicious link and that clicking leads to the installation of malware [43][44].…”
Section: An Overview Of the Taxonomy Of Authentication Attacksmentioning
confidence: 99%
“…• Phishing attack : It is a social engineering attack where an attacker is disguised trusted service provider, tries to steal confidential data like passwords, credit card numbers by tempting the recipient to click the malicious link and that clicking leads to the installation of malware [43][44].…”
Section: An Overview Of the Taxonomy Of Authentication Attacksmentioning
confidence: 99%
“…III) Security between cloud network infrastructure and third-party authentication server. I) [6] In Mobile Cloud Computing, mobile devices i.e user equipment(UE) must be authenticated and registered to a cloud server to avoid the phishing attack on user communication between a mobile device and cloud server. We know that mobile devices are having IMSI (International Mobile Scriber Identity i.e.…”
Section: Proposed Model For a Different Levelmentioning
confidence: 99%