Loading…
New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing
A phishing attack is one of the severe threats to the smartphone users. As per the recent lookout report, mobile phishing attack is increasing 85% year to year and going to become a significant threat to the smartphone users. This social engineering attack attempts to get the user’s password by disg...
Saved in:
Published in: | Security and communication networks 2019-01, Vol.2019 (2019), p.1-11 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c360t-94f0c48f41c0825fd4a0e4b8ff33bf660f783f0f7909b8fd45a3bf8ff7a568683 |
---|---|
cites | cdi_FETCH-LOGICAL-c360t-94f0c48f41c0825fd4a0e4b8ff33bf660f783f0f7909b8fd45a3bf8ff7a568683 |
container_end_page | 11 |
container_issue | 2019 |
container_start_page | 1 |
container_title | Security and communication networks |
container_volume | 2019 |
creator | E, Munivel A, Kannammal |
description | A phishing attack is one of the severe threats to the smartphone users. As per the recent lookout report, mobile phishing attack is increasing 85% year to year and going to become a significant threat to the smartphone users. This social engineering attack attempts to get the user’s password by disguising as trusted service provider. Most of the smartphone users are using the Internet services outside of the traditional firewall. Cloud-based documents are one of the primary targets of this phishing attack in mobile cloud computing. Also, most smartphone users are using the cloud storage in their device. To secure against this password attack in a mobile cloud environment, we propose a new authentication scheme to provide novel security to the mobile cloud services. This scheme will verify the user and service provider without transmitting the password using the Zero-knowledge proof based authentication protocol. Moreover, the proposed scheme will provide mutual authentication between the communication entities. The effectiveness of proposed scheme would be verified using protocol verification tool called Scyther. |
doi_str_mv | 10.1155/2019/5141395 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2455786813</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2455786813</sourcerecordid><originalsourceid>FETCH-LOGICAL-c360t-94f0c48f41c0825fd4a0e4b8ff33bf660f783f0f7909b8fd45a3bf8ff7a568683</originalsourceid><addsrcrecordid>eNqF0M1LwzAYBvAgCs7pzbMEPGpd3ibpx3GU-QHzA6ZHKVmarJlbM5uU4X9vZocevSThyY-85EHoHMgNAOejmEA-4sCA5vwADSCneUQgjg9_z8CO0YlzS0ISYCkboPcntcXjzteq8UYKb2yDZ7JWa4W9xTMlu1ZhsRCmcR4HhV9q42rTLPDYeyE_sGl-4kc7NyuFi5XtKlzY9abzAZ2iIy1WTp3t9yF6u528FvfR9PnuoRhPI0kT4qOcaSJZphlIksVcV0wQxeaZ1pTOdZIQnWZUhzUneUgrxkXIw3UqeJIlGR2iy_7dTWs_O-V8ubRd24SRZcw4T4MBGtR1r2RrnWuVLjetWYv2qwRS7gosdwWW-wIDv-p5-G4ltuY_fdFrFYzS4k_HQFgC9BvZjnlQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455786813</pqid></control><display><type>article</type><title>New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing</title><source>ProQuest - Publicly Available Content Database</source><source>Wiley Open Access</source><creator>E, Munivel ; A, Kannammal</creator><contributor>Cimato, Stelvio ; Stelvio Cimato</contributor><creatorcontrib>E, Munivel ; A, Kannammal ; Cimato, Stelvio ; Stelvio Cimato</creatorcontrib><description>A phishing attack is one of the severe threats to the smartphone users. As per the recent lookout report, mobile phishing attack is increasing 85% year to year and going to become a significant threat to the smartphone users. This social engineering attack attempts to get the user’s password by disguising as trusted service provider. Most of the smartphone users are using the Internet services outside of the traditional firewall. Cloud-based documents are one of the primary targets of this phishing attack in mobile cloud computing. Also, most smartphone users are using the cloud storage in their device. To secure against this password attack in a mobile cloud environment, we propose a new authentication scheme to provide novel security to the mobile cloud services. This scheme will verify the user and service provider without transmitting the password using the Zero-knowledge proof based authentication protocol. Moreover, the proposed scheme will provide mutual authentication between the communication entities. The effectiveness of proposed scheme would be verified using protocol verification tool called Scyther.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2019/5141395</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Authentication ; Cloud computing ; Communication ; Digital signatures ; Mobile computing ; Passwords ; Phishing ; Registration ; Security services ; Smart cards ; Smartphones ; Third party</subject><ispartof>Security and communication networks, 2019-01, Vol.2019 (2019), p.1-11</ispartof><rights>Copyright © 2019 Munivel E and Kannammal A.</rights><rights>Copyright © 2019 Munivel E and Kannammal A. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c360t-94f0c48f41c0825fd4a0e4b8ff33bf660f783f0f7909b8fd45a3bf8ff7a568683</citedby><cites>FETCH-LOGICAL-c360t-94f0c48f41c0825fd4a0e4b8ff33bf660f783f0f7909b8fd45a3bf8ff7a568683</cites><orcidid>0000-0001-7994-1038</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2455786813?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,25751,27922,27923,37010,44588</link.rule.ids></links><search><contributor>Cimato, Stelvio</contributor><contributor>Stelvio Cimato</contributor><creatorcontrib>E, Munivel</creatorcontrib><creatorcontrib>A, Kannammal</creatorcontrib><title>New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing</title><title>Security and communication networks</title><description>A phishing attack is one of the severe threats to the smartphone users. As per the recent lookout report, mobile phishing attack is increasing 85% year to year and going to become a significant threat to the smartphone users. This social engineering attack attempts to get the user’s password by disguising as trusted service provider. Most of the smartphone users are using the Internet services outside of the traditional firewall. Cloud-based documents are one of the primary targets of this phishing attack in mobile cloud computing. Also, most smartphone users are using the cloud storage in their device. To secure against this password attack in a mobile cloud environment, we propose a new authentication scheme to provide novel security to the mobile cloud services. This scheme will verify the user and service provider without transmitting the password using the Zero-knowledge proof based authentication protocol. Moreover, the proposed scheme will provide mutual authentication between the communication entities. The effectiveness of proposed scheme would be verified using protocol verification tool called Scyther.</description><subject>Authentication</subject><subject>Cloud computing</subject><subject>Communication</subject><subject>Digital signatures</subject><subject>Mobile computing</subject><subject>Passwords</subject><subject>Phishing</subject><subject>Registration</subject><subject>Security services</subject><subject>Smart cards</subject><subject>Smartphones</subject><subject>Third party</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNqF0M1LwzAYBvAgCs7pzbMEPGpd3ibpx3GU-QHzA6ZHKVmarJlbM5uU4X9vZocevSThyY-85EHoHMgNAOejmEA-4sCA5vwADSCneUQgjg9_z8CO0YlzS0ISYCkboPcntcXjzteq8UYKb2yDZ7JWa4W9xTMlu1ZhsRCmcR4HhV9q42rTLPDYeyE_sGl-4kc7NyuFi5XtKlzY9abzAZ2iIy1WTp3t9yF6u528FvfR9PnuoRhPI0kT4qOcaSJZphlIksVcV0wQxeaZ1pTOdZIQnWZUhzUneUgrxkXIw3UqeJIlGR2iy_7dTWs_O-V8ubRd24SRZcw4T4MBGtR1r2RrnWuVLjetWYv2qwRS7gosdwWW-wIDv-p5-G4ltuY_fdFrFYzS4k_HQFgC9BvZjnlQ</recordid><startdate>20190101</startdate><enddate>20190101</enddate><creator>E, Munivel</creator><creator>A, Kannammal</creator><general>Hindawi Publishing Corporation</general><general>Hindawi</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0001-7994-1038</orcidid></search><sort><creationdate>20190101</creationdate><title>New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing</title><author>E, Munivel ; A, Kannammal</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c360t-94f0c48f41c0825fd4a0e4b8ff33bf660f783f0f7909b8fd45a3bf8ff7a568683</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Authentication</topic><topic>Cloud computing</topic><topic>Communication</topic><topic>Digital signatures</topic><topic>Mobile computing</topic><topic>Passwords</topic><topic>Phishing</topic><topic>Registration</topic><topic>Security services</topic><topic>Smart cards</topic><topic>Smartphones</topic><topic>Third party</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>E, Munivel</creatorcontrib><creatorcontrib>A, Kannammal</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Database (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest - Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>E, Munivel</au><au>A, Kannammal</au><au>Cimato, Stelvio</au><au>Stelvio Cimato</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing</atitle><jtitle>Security and communication networks</jtitle><date>2019-01-01</date><risdate>2019</risdate><volume>2019</volume><issue>2019</issue><spage>1</spage><epage>11</epage><pages>1-11</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>A phishing attack is one of the severe threats to the smartphone users. As per the recent lookout report, mobile phishing attack is increasing 85% year to year and going to become a significant threat to the smartphone users. This social engineering attack attempts to get the user’s password by disguising as trusted service provider. Most of the smartphone users are using the Internet services outside of the traditional firewall. Cloud-based documents are one of the primary targets of this phishing attack in mobile cloud computing. Also, most smartphone users are using the cloud storage in their device. To secure against this password attack in a mobile cloud environment, we propose a new authentication scheme to provide novel security to the mobile cloud services. This scheme will verify the user and service provider without transmitting the password using the Zero-knowledge proof based authentication protocol. Moreover, the proposed scheme will provide mutual authentication between the communication entities. The effectiveness of proposed scheme would be verified using protocol verification tool called Scyther.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2019/5141395</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0001-7994-1038</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2019-01, Vol.2019 (2019), p.1-11 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_journals_2455786813 |
source | ProQuest - Publicly Available Content Database; Wiley Open Access |
subjects | Authentication Cloud computing Communication Digital signatures Mobile computing Passwords Phishing Registration Security services Smart cards Smartphones Third party |
title | New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T07%3A52%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=New%20Authentication%20Scheme%20to%20Secure%20against%20the%20Phishing%20Attack%20in%20the%20Mobile%20Cloud%20Computing&rft.jtitle=Security%20and%20communication%20networks&rft.au=E,%20Munivel&rft.date=2019-01-01&rft.volume=2019&rft.issue=2019&rft.spage=1&rft.epage=11&rft.pages=1-11&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2019/5141395&rft_dat=%3Cproquest_cross%3E2455786813%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c360t-94f0c48f41c0825fd4a0e4b8ff33bf660f783f0f7909b8fd45a3bf8ff7a568683%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2455786813&rft_id=info:pmid/&rfr_iscdi=true |