Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Cloud computing is an emerging concept combining many fields of computing. The motive of mobile cloud computing is to deliver the services, software and processing capacity over the Internet so far to reduce the computation cost and increase the storage capacity. The goal of this paper is to implement a user authentication algorithm, which can be used in cloud storage to verify the authenticity of the user. In this paper we build a secure mobile cloud-based algorithm, where the user's mobile phone is used as an authentication device, presenting a onetime encrypted password for the user and password is decrypted using proposed algorithm in user's mobile application.

Keywords: virtual machine, thin client, fat client, OTP component, cloud, IaaS, PaaS, SaaS

Edition: Volume 3 Issue 7, July 2014

Pages: 598 - 602

Share this Article

How to Cite this Article?

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath, "Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20141108, Volume 3 Issue 7, July 2014, 598 - 602

48 PDF Views | 33 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'virtual machine'

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment ? A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1690 - 1694

Analytics of Application Resource Utilization within the Virtual Machine

Priyanka H

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3092 - 3094

Performance Monitoring and Improvement by VMM in Cloud System

Shafali Gupta, Payal Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1011 - 1013

Transplantation of Native Android Apps onto J2ME Platform

Revati M. Wahul, Meenakshi Chandak, Neha Pandit, Kalyani Mote

Share this Article

Similar Articles with Keyword 'thin client'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 1, January 2020

Pages: 758 - 760

Green ICT Sustainability and It's Impacts-Next Wave in Computing

D S Kushwaha, Ankur Singh

Share this Article

Similar Articles with Keyword 'cloud'

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment ? A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Research Paper, Computer Science & Engineering, United States of America, Volume 9 Issue 7, July 2020

Pages: 1269 - 1271

Microservices: Using Distributed Tracing for Monitoring & Troubleshooting

Aditya Shrivatri

Share this Article

Masters Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 130 - 134

Implementation of Client-Side Deduplication on Encrypted Data with Public Auditing in Cloud Storage

Lekhashree N R, Shashidhara M S, Santhosh S

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1016 - 1018

Detecting the Plant Diseases and Issues by Image Processing Technique and Broadcasting

K. R. Gokulakrishnan, Kapilya

Share this Article

Similar Articles with Keyword 'IaaS'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 944 - 947

Security Issues and Risks in Cloud Computing

Garima Singh, Apoorv Vikram Singh

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 675 - 679

Design and Implementation of Audit Cloud for Consistency in Cloud Computing

D. Veerabhadraiah, M. Revathi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1129 - 1135

Mobile Cloud Computing Applied in Social TV

K Ramu, A Jyothi

Share this Article

Similar Articles with Keyword 'PaaS'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 944 - 947

Security Issues and Risks in Cloud Computing

Garima Singh, Apoorv Vikram Singh

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 675 - 679

Design and Implementation of Audit Cloud for Consistency in Cloud Computing

D. Veerabhadraiah, M. Revathi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1129 - 1135

Mobile Cloud Computing Applied in Social TV

K Ramu, A Jyothi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1534 - 1537

A Synopsis on Point to Point Sharing Using Cloud Based Mobile Community-Based System (Cloud MoV System)

N. Shaleen Saroj, K. Lakshmi, Dr. S. Prem Kumar

Share this Article

Similar Articles with Keyword 'SaaS'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 944 - 947

Security Issues and Risks in Cloud Computing

Garima Singh, Apoorv Vikram Singh

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 675 - 679

Design and Implementation of Audit Cloud for Consistency in Cloud Computing

D. Veerabhadraiah, M. Revathi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1678 - 1681

Integrity Attestation and Auto-correction of Services for SaaS Clouds

Amulya Rachna, John Prakash Veigas

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1721 - 1723

A Survey and Implementation of Trusted Multi Level SAAS (Security as a Service) Cloud

Papineni. Kalpana, K. Narayana Rao

Share this Article
Top