An enhanced secure authentication scheme with user anonymity in mobile cloud computing.
R. MadhusudhanK. S. SuvidhaPublished in: PKIA (2017)
Keyphrases
- cloud computing
- authentication scheme
- user authentication
- security issues
- middleware architecture
- computing resources
- data center
- cloud computing environment
- data management
- service providers
- security analysis
- smart card
- authentication protocol
- secure manner
- cloud storage
- identity management
- cloud computing platform
- public key
- secret key
- information security
- user experience
- mobile devices
- databases
- security mechanisms
- context aware
- cloud services
- end users
- private cloud
- mobile computing
- key management
- virtual machine
- mobile phone
- query processing
- database