Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 146 , Downloads: 100 | CTR: 68 % | Weekly Popularity: ⮙1

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 10, October 2015

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

In recent societies, the number of mobile users has tremendously risen in recent years. The paper provides security and use for mobile users to access different mobile cloud computing services from multiple service providers using only a single private key. In this paper, we propose a new short signature scheme from the bilinear pairings. However, our scheme is represented from Inverse Computational Diffie-Hellman Problem (Inv-CDHP) based on bilinear pairing and does not require any hash function. We give the exact security proofs for the new signature scheme and the ring signature scheme in the model.

Keywords: Cloud computing, Bilinear pairings, Authentication scheme, Mobile cloud computing services, Short signature

Edition: Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Share this Article

How to Cite this Article?

Chaitali P. Kathar, Vidya Dhamdhere, "Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB159075, Volume 4 Issue 10, October 2015, 1548 - 1550

146 PDF Views | 100 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud computing'

Views: 204 , Downloads: 175 | CTR: 86 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Views: 134 , Downloads: 97 | CTR: 72 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 594 - 596

A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud

K. Sreelatha

Share this Article

Views: 192 , Downloads: 98 | CTR: 51 % | Weekly Popularity: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and Its Types in Mobile Network

Palak Jain

Share this Article

Views: 152 , Downloads: 98 | CTR: 64 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Views: 153 , Downloads: 98 | CTR: 64 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Similar Articles with Keyword 'Bilinear pairings'

Views: 146 , Downloads: 100 | CTR: 68 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this Article

Views: 139 , Downloads: 120 | CTR: 86 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 10, October 2017

Pages: 1642 - 1645

Novel Framework of Identity Based Encryption with CRA

Latha M R, Dr.Shiva Murthy G, Ramakrishna Prasad A.L

Share this Article

Views: 179 , Downloads: 143 | CTR: 80 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1108 - 1112

A Survey on Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

Pallavi S. Kaulage, S. N. Kini

Share this Article

Similar Articles with Keyword 'Authentication scheme'

Views: 146 , Downloads: 100 | CTR: 68 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this Article

Views: 137 , Downloads: 102 | CTR: 74 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2137 - 2139

A Review of the Graphical Password Based Authentication Schemes

Shraddha S. Banne, Prof. Kishor N. Shedge

Share this Article

Views: 130 , Downloads: 102 | CTR: 78 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2223 - 2228

Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Vaishali Kisanrao Gulhane, S. N. Shelke

Share this Article

Views: 138 , Downloads: 105 | CTR: 76 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 7, July 2014

Pages: 2387 - 2389

Cryptanalysis of Identity Transmission Authentication System

Sattar J. Aboud

Share this Article

Views: 143 , Downloads: 105 | CTR: 73 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1979 - 1982

Palm Vein Authentication: A Review

Gitanjali Sikka, Er. Vikas Wasson

Share this Article
Top