Authentication in Mobile Cloud Computing

Article Fingerprint
Research ID Y6868

Abstract

Today the capabilities of mobile devices have improved real world user friendly applications, storage and feature  support. The storage capacity can tremendously be increased with the use of cloud computing. Cloud computing is a flexible, cost effective and proven delivery platform for providing services. Mobile cloud computing means the availability of cloud computing services in a mobile environment. There are various authentication techniques being used like password, log off system, Biometric techniques. This process serves as a protection against different sorts of attacks where the goal is to confirm the identity of a user and the user requests services from cloud servers. Multiple authentication technologies have been put forward so far that confirm user identity before giving the permit to access resources. Authentication in cloud was fully explained in this paper together with the existing methods and the factors with its limitations.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

Not applicable

Data Availability

The datasets used in this study are openly available at [repository link] and the source code is available on GitHub at [GitHub link].

Funding

This work did not receive any external funding.

Cite this article

Generating citation...

Related Research

  • Classification

    C.2.1

  • Version of record

    v1.0

  • Issue date

    NA

  • Language

    English

Iconic historic building with domed tower in London, UK.
Open Access
Research Article
CC-BY-NC 4.0
LJRCST Volume 19 LJRCST Volume 19 Issue 3, Pg. 23-29