International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 101

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 10, October 2015


Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere


Abstract: In recent societies, the number of mobile users has tremendously risen in recent years. The paper provides security and use for mobile users to access different mobile cloud computing services from multiple service providers using only a single private key. In this paper, we propose a new short signature scheme from the bilinear pairings. However, our scheme is represented from Inverse Computational Diffie-Hellman Problem (Inv-CDHP) based on bilinear pairing and does not require any hash function. We give the exact security proofs for the new signature scheme and the ring signature scheme in the model.


Keywords: Cloud computing, Bilinear pairings, Authentication scheme, Mobile cloud computing services, Short signature


Edition: Volume 4 Issue 10, October 2015,


Pages: 1548 - 1550


How to Cite this Article?

Chaitali P. Kathar, Vidya Dhamdhere, "Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB159075, Volume 4 Issue 10, October 2015, 1548 - 1550

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Cloud computing'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Similar Articles with Keyword 'Bilinear pairings'

Downloads: 122

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 10, October 2017

Pages: 1642 - 1645

Novel Framework of Identity Based Encryption with CRA

Latha M R, Dr.Shiva Murthy G, Ramakrishna Prasad A.L

Share this Article

Downloads: 145

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1108 - 1112

A Survey on Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

Pallavi S. Kaulage, S. N. Kini

Share this Article

Similar Articles with Keyword 'Authentication scheme'

Downloads: 103

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2137 - 2139

A Review of the Graphical Password Based Authentication Schemes

Shraddha S. Banne, Prof. Kishor N. Shedge

Share this Article

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2223 - 2228

Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Vaishali Kisanrao Gulhane, S. N. Shelke

Share this Article

Similar Articles with Keyword 'Cloud'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Similar Articles with Keyword 'computing'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this Article

Similar Articles with Keyword 'Bilinear'

Downloads: 110

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1788 - 1790

Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data

Amruta N. Deshmukh, Komal B. Bijwe

Share this Article

Downloads: 120

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 438 - 440

Survey on Public Auditing and Data Dynamics in Cloud Data Storage

Snehal. P. Sawant, Aaradhana. A. Deshmukh

Share this Article

Similar Articles with Keyword 'pairings'

Downloads: 117

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1710 - 1715

Fingerprint Reorganization Using Minutiae Based Matching for Identification and Verification

Deepika Sahu, Rashmi Shrivas

Share this Article

Downloads: 122

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 10, October 2017

Pages: 1642 - 1645

Novel Framework of Identity Based Encryption with CRA

Latha M R, Dr.Shiva Murthy G, Ramakrishna Prasad A.L

Share this Article

Similar Articles with Keyword 'Authentication'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'scheme'

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Similar Articles with Keyword 'Mobile'

Downloads: 1

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 705 - 706

An Analysis on Voice Assistant

Shravankumar Jha

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Similar Articles with Keyword 'cloud'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article
Top