Detailed Information

Cited 71 time in webofscience Cited 85 time in scopus
Metadata Downloads

Secure Authentication-Management human-centric Scheme for trusting personal resource information on mobile cloud computing with blockchain

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Hyun-Woo-
dc.contributor.authorJeong, Young-Sik-
dc.date.accessioned2024-08-08T06:31:32Z-
dc.date.available2024-08-08T06:31:32Z-
dc.date.issued2018-05-11-
dc.identifier.issn2192-1962-
dc.identifier.issn2192-1962-
dc.identifier.urihttps://scholarworks.dongguk.edu/handle/sw.dongguk/19128-
dc.description.abstractThe recent advances in information technology for mobile devices have increased the work efficiency of users, the mobility of compact mobile devices, and the convenience of location independence. However, mobile devices have limited computing power and storage capacity, so mobile cloud computing is being researched to overcome these limitations in mobile devices. Mobile cloud computing is divided into two methods: the use of external cloud services and the use of mobile resource management without a cloud server (MRM), which integrates the computing and storage resources of nearby mobile devices. Because mobile devices can freely participate in MRM, it is critical to have authentication technology to determine the correctness of information regarding resources. Conventional technologies require strong authentication techniques because they have vulnerabilities that can easily be tampered with via man-in-the-middle (MITM) attacks. This paper proposes the Secure Authentication Management human-centric Scheme (SAMS) to authenticate mobile devices using blockchain for trusting resource information in the mobile devices that are participating in the MRM resource pool. The SAMS forms a blockchain based on the resource information of the subordinate client nodes around the master node in the MRM. Devices in the MRM that have not been authorized through the SAMS cannot access or falsify data. To verify the SAMS for application with MRM, it was tested for data falsification by a malicious user accessing the SAMS, and the results show that data falsification is impossible.-
dc.language영어-
dc.language.isoENG-
dc.publisherSPRINGER HEIDELBERG-
dc.titleSecure Authentication-Management human-centric Scheme for trusting personal resource information on mobile cloud computing with blockchain-
dc.typeArticle-
dc.publisher.location독일-
dc.identifier.doi10.1186/s13673-018-0136-7-
dc.identifier.scopusid2-s2.0-85046897697-
dc.identifier.wosid000431928400001-
dc.identifier.bibliographicCitationHUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, v.8, no.1-
dc.citation.titleHUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES-
dc.citation.volume8-
dc.citation.number1-
dc.type.docTypeArticle-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.subject.keywordPlusSTORAGE-
dc.subject.keywordPlusVIRTUALIZATION-
dc.subject.keywordPlusINTERNET-
dc.subject.keywordPlusSYSTEM-
dc.subject.keywordPlusTHINGS-
dc.subject.keywordAuthorHuman-centric Authentication Management-
dc.subject.keywordAuthorMobile cloud computing-
dc.subject.keywordAuthorBlockchain-
dc.subject.keywordAuthorResource management for human-centric-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Advanced Convergence Engineering > Department of Computer Science and Artificial Intelligence > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jeong, Young Sik photo

Jeong, Young Sik
College of Advanced Convergence Engineering (Department of Computer Science and Artificial Intelligence)
Read more

Altmetrics

Total Views & Downloads

BROWSE