2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2011
DOI: 10.1109/infcomw.2011.5928886
|View full text |Cite
|
Sign up to set email alerts
|

Secure data processing framework for mobile cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0
1

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 109 publications
(40 citation statements)
references
References 5 publications
0
39
0
1
Order By: Relevance
“…The TMZ system retains the value of R S , creates a random number challenge with a value of R M (4), generates SignM(R M || R S ) as the signature data of R M and R S (5) by using the private key that is saved in the secure zone securely, concatenates the data, attaches the CertM as the certificate of the TMZ system, and transmits the message M2 to the authentication server (6). It is the most important to keep the user's private key securely.…”
Section: Secure User Authentication Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The TMZ system retains the value of R S , creates a random number challenge with a value of R M (4), generates SignM(R M || R S ) as the signature data of R M and R S (5) by using the private key that is saved in the secure zone securely, concatenates the data, attaches the CertM as the certificate of the TMZ system, and transmits the message M2 to the authentication server (6). It is the most important to keep the user's private key securely.…”
Section: Secure User Authentication Methodsmentioning
confidence: 99%
“…Thus, the security requirements for mobile devices have been increasing in line with the progress of mobile cloud computing. Numerous studies about mobile security programs for trusted mobile cloud computing have been carried out [4][5][6][7], while virtualization technologies for cloud computing have attracted the attention of the IT industry and the business world.…”
Section: Introductionmentioning
confidence: 99%
“…In [63], Huang et al proposed secure data processing model for MobiCloud that provides enhanced security and privacy protection for mobile users with the help of multi-tenant secure data management, trust management, and a ESSI data processing model. To provide strong security services to the user, the storage domain module and cloud trusted domain module are physically isolated.…”
Section: Application Security Frameworkmentioning
confidence: 99%
“…It is the combination of cloud computing and mobile networks. For this the security related issues are then divided into two categories: cloud security and mobile network user's security; [19,20,21,22].…”
Section: Mobile Cloud Computing Securitymentioning
confidence: 99%