Loading…

New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing

A phishing attack is one of the severe threats to the smartphone users. As per the recent lookout report, mobile phishing attack is increasing 85% year to year and going to become a significant threat to the smartphone users. This social engineering attack attempts to get the user’s password by disg...

Full description

Saved in:
Bibliographic Details
Published in:Security and communication networks 2019-01, Vol.2019 (2019), p.1-11
Main Authors: E, Munivel, A, Kannammal
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c360t-94f0c48f41c0825fd4a0e4b8ff33bf660f783f0f7909b8fd45a3bf8ff7a568683
cites cdi_FETCH-LOGICAL-c360t-94f0c48f41c0825fd4a0e4b8ff33bf660f783f0f7909b8fd45a3bf8ff7a568683
container_end_page 11
container_issue 2019
container_start_page 1
container_title Security and communication networks
container_volume 2019
creator E, Munivel
A, Kannammal
description A phishing attack is one of the severe threats to the smartphone users. As per the recent lookout report, mobile phishing attack is increasing 85% year to year and going to become a significant threat to the smartphone users. This social engineering attack attempts to get the user’s password by disguising as trusted service provider. Most of the smartphone users are using the Internet services outside of the traditional firewall. Cloud-based documents are one of the primary targets of this phishing attack in mobile cloud computing. Also, most smartphone users are using the cloud storage in their device. To secure against this password attack in a mobile cloud environment, we propose a new authentication scheme to provide novel security to the mobile cloud services. This scheme will verify the user and service provider without transmitting the password using the Zero-knowledge proof based authentication protocol. Moreover, the proposed scheme will provide mutual authentication between the communication entities. The effectiveness of proposed scheme would be verified using protocol verification tool called Scyther.
doi_str_mv 10.1155/2019/5141395
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2455786813</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2455786813</sourcerecordid><originalsourceid>FETCH-LOGICAL-c360t-94f0c48f41c0825fd4a0e4b8ff33bf660f783f0f7909b8fd45a3bf8ff7a568683</originalsourceid><addsrcrecordid>eNqF0M1LwzAYBvAgCs7pzbMEPGpd3ibpx3GU-QHzA6ZHKVmarJlbM5uU4X9vZocevSThyY-85EHoHMgNAOejmEA-4sCA5vwADSCneUQgjg9_z8CO0YlzS0ISYCkboPcntcXjzteq8UYKb2yDZ7JWa4W9xTMlu1ZhsRCmcR4HhV9q42rTLPDYeyE_sGl-4kc7NyuFi5XtKlzY9abzAZ2iIy1WTp3t9yF6u528FvfR9PnuoRhPI0kT4qOcaSJZphlIksVcV0wQxeaZ1pTOdZIQnWZUhzUneUgrxkXIw3UqeJIlGR2iy_7dTWs_O-V8ubRd24SRZcw4T4MBGtR1r2RrnWuVLjetWYv2qwRS7gosdwWW-wIDv-p5-G4ltuY_fdFrFYzS4k_HQFgC9BvZjnlQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455786813</pqid></control><display><type>article</type><title>New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing</title><source>ProQuest - Publicly Available Content Database</source><source>Wiley Open Access</source><creator>E, Munivel ; A, Kannammal</creator><contributor>Cimato, Stelvio ; Stelvio Cimato</contributor><creatorcontrib>E, Munivel ; A, Kannammal ; Cimato, Stelvio ; Stelvio Cimato</creatorcontrib><description>A phishing attack is one of the severe threats to the smartphone users. As per the recent lookout report, mobile phishing attack is increasing 85% year to year and going to become a significant threat to the smartphone users. This social engineering attack attempts to get the user’s password by disguising as trusted service provider. Most of the smartphone users are using the Internet services outside of the traditional firewall. Cloud-based documents are one of the primary targets of this phishing attack in mobile cloud computing. Also, most smartphone users are using the cloud storage in their device. To secure against this password attack in a mobile cloud environment, we propose a new authentication scheme to provide novel security to the mobile cloud services. This scheme will verify the user and service provider without transmitting the password using the Zero-knowledge proof based authentication protocol. Moreover, the proposed scheme will provide mutual authentication between the communication entities. The effectiveness of proposed scheme would be verified using protocol verification tool called Scyther.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2019/5141395</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Authentication ; Cloud computing ; Communication ; Digital signatures ; Mobile computing ; Passwords ; Phishing ; Registration ; Security services ; Smart cards ; Smartphones ; Third party</subject><ispartof>Security and communication networks, 2019-01, Vol.2019 (2019), p.1-11</ispartof><rights>Copyright © 2019 Munivel E and Kannammal A.</rights><rights>Copyright © 2019 Munivel E and Kannammal A. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c360t-94f0c48f41c0825fd4a0e4b8ff33bf660f783f0f7909b8fd45a3bf8ff7a568683</citedby><cites>FETCH-LOGICAL-c360t-94f0c48f41c0825fd4a0e4b8ff33bf660f783f0f7909b8fd45a3bf8ff7a568683</cites><orcidid>0000-0001-7994-1038</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2455786813?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,25751,27922,27923,37010,44588</link.rule.ids></links><search><contributor>Cimato, Stelvio</contributor><contributor>Stelvio Cimato</contributor><creatorcontrib>E, Munivel</creatorcontrib><creatorcontrib>A, Kannammal</creatorcontrib><title>New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing</title><title>Security and communication networks</title><description>A phishing attack is one of the severe threats to the smartphone users. As per the recent lookout report, mobile phishing attack is increasing 85% year to year and going to become a significant threat to the smartphone users. This social engineering attack attempts to get the user’s password by disguising as trusted service provider. Most of the smartphone users are using the Internet services outside of the traditional firewall. Cloud-based documents are one of the primary targets of this phishing attack in mobile cloud computing. Also, most smartphone users are using the cloud storage in their device. To secure against this password attack in a mobile cloud environment, we propose a new authentication scheme to provide novel security to the mobile cloud services. This scheme will verify the user and service provider without transmitting the password using the Zero-knowledge proof based authentication protocol. Moreover, the proposed scheme will provide mutual authentication between the communication entities. The effectiveness of proposed scheme would be verified using protocol verification tool called Scyther.</description><subject>Authentication</subject><subject>Cloud computing</subject><subject>Communication</subject><subject>Digital signatures</subject><subject>Mobile computing</subject><subject>Passwords</subject><subject>Phishing</subject><subject>Registration</subject><subject>Security services</subject><subject>Smart cards</subject><subject>Smartphones</subject><subject>Third party</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNqF0M1LwzAYBvAgCs7pzbMEPGpd3ibpx3GU-QHzA6ZHKVmarJlbM5uU4X9vZocevSThyY-85EHoHMgNAOejmEA-4sCA5vwADSCneUQgjg9_z8CO0YlzS0ISYCkboPcntcXjzteq8UYKb2yDZ7JWa4W9xTMlu1ZhsRCmcR4HhV9q42rTLPDYeyE_sGl-4kc7NyuFi5XtKlzY9abzAZ2iIy1WTp3t9yF6u528FvfR9PnuoRhPI0kT4qOcaSJZphlIksVcV0wQxeaZ1pTOdZIQnWZUhzUneUgrxkXIw3UqeJIlGR2iy_7dTWs_O-V8ubRd24SRZcw4T4MBGtR1r2RrnWuVLjetWYv2qwRS7gosdwWW-wIDv-p5-G4ltuY_fdFrFYzS4k_HQFgC9BvZjnlQ</recordid><startdate>20190101</startdate><enddate>20190101</enddate><creator>E, Munivel</creator><creator>A, Kannammal</creator><general>Hindawi Publishing Corporation</general><general>Hindawi</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0001-7994-1038</orcidid></search><sort><creationdate>20190101</creationdate><title>New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing</title><author>E, Munivel ; A, Kannammal</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c360t-94f0c48f41c0825fd4a0e4b8ff33bf660f783f0f7909b8fd45a3bf8ff7a568683</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Authentication</topic><topic>Cloud computing</topic><topic>Communication</topic><topic>Digital signatures</topic><topic>Mobile computing</topic><topic>Passwords</topic><topic>Phishing</topic><topic>Registration</topic><topic>Security services</topic><topic>Smart cards</topic><topic>Smartphones</topic><topic>Third party</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>E, Munivel</creatorcontrib><creatorcontrib>A, Kannammal</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Database‎ (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest - Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>E, Munivel</au><au>A, Kannammal</au><au>Cimato, Stelvio</au><au>Stelvio Cimato</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing</atitle><jtitle>Security and communication networks</jtitle><date>2019-01-01</date><risdate>2019</risdate><volume>2019</volume><issue>2019</issue><spage>1</spage><epage>11</epage><pages>1-11</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>A phishing attack is one of the severe threats to the smartphone users. As per the recent lookout report, mobile phishing attack is increasing 85% year to year and going to become a significant threat to the smartphone users. This social engineering attack attempts to get the user’s password by disguising as trusted service provider. Most of the smartphone users are using the Internet services outside of the traditional firewall. Cloud-based documents are one of the primary targets of this phishing attack in mobile cloud computing. Also, most smartphone users are using the cloud storage in their device. To secure against this password attack in a mobile cloud environment, we propose a new authentication scheme to provide novel security to the mobile cloud services. This scheme will verify the user and service provider without transmitting the password using the Zero-knowledge proof based authentication protocol. Moreover, the proposed scheme will provide mutual authentication between the communication entities. The effectiveness of proposed scheme would be verified using protocol verification tool called Scyther.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2019/5141395</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0001-7994-1038</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2019-01, Vol.2019 (2019), p.1-11
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_journals_2455786813
source ProQuest - Publicly Available Content Database; Wiley Open Access
subjects Authentication
Cloud computing
Communication
Digital signatures
Mobile computing
Passwords
Phishing
Registration
Security services
Smart cards
Smartphones
Third party
title New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T07%3A52%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=New%20Authentication%20Scheme%20to%20Secure%20against%20the%20Phishing%20Attack%20in%20the%20Mobile%20Cloud%20Computing&rft.jtitle=Security%20and%20communication%20networks&rft.au=E,%20Munivel&rft.date=2019-01-01&rft.volume=2019&rft.issue=2019&rft.spage=1&rft.epage=11&rft.pages=1-11&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2019/5141395&rft_dat=%3Cproquest_cross%3E2455786813%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c360t-94f0c48f41c0825fd4a0e4b8ff33bf660f783f0f7909b8fd45a3bf8ff7a568683%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2455786813&rft_id=info:pmid/&rfr_iscdi=true