Cited 85 time in
Secure Authentication-Management human-centric Scheme for trusting personal resource information on mobile cloud computing with blockchain
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Kim, Hyun-Woo | - |
| dc.contributor.author | Jeong, Young-Sik | - |
| dc.date.accessioned | 2024-08-08T06:31:32Z | - |
| dc.date.available | 2024-08-08T06:31:32Z | - |
| dc.date.issued | 2018-05-11 | - |
| dc.identifier.issn | 2192-1962 | - |
| dc.identifier.issn | 2192-1962 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/19128 | - |
| dc.description.abstract | The recent advances in information technology for mobile devices have increased the work efficiency of users, the mobility of compact mobile devices, and the convenience of location independence. However, mobile devices have limited computing power and storage capacity, so mobile cloud computing is being researched to overcome these limitations in mobile devices. Mobile cloud computing is divided into two methods: the use of external cloud services and the use of mobile resource management without a cloud server (MRM), which integrates the computing and storage resources of nearby mobile devices. Because mobile devices can freely participate in MRM, it is critical to have authentication technology to determine the correctness of information regarding resources. Conventional technologies require strong authentication techniques because they have vulnerabilities that can easily be tampered with via man-in-the-middle (MITM) attacks. This paper proposes the Secure Authentication Management human-centric Scheme (SAMS) to authenticate mobile devices using blockchain for trusting resource information in the mobile devices that are participating in the MRM resource pool. The SAMS forms a blockchain based on the resource information of the subordinate client nodes around the master node in the MRM. Devices in the MRM that have not been authorized through the SAMS cannot access or falsify data. To verify the SAMS for application with MRM, it was tested for data falsification by a malicious user accessing the SAMS, and the results show that data falsification is impossible. | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | SPRINGER HEIDELBERG | - |
| dc.title | Secure Authentication-Management human-centric Scheme for trusting personal resource information on mobile cloud computing with blockchain | - |
| dc.type | Article | - |
| dc.publisher.location | 독일 | - |
| dc.identifier.doi | 10.1186/s13673-018-0136-7 | - |
| dc.identifier.scopusid | 2-s2.0-85046897697 | - |
| dc.identifier.wosid | 000431928400001 | - |
| dc.identifier.bibliographicCitation | HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, v.8, no.1 | - |
| dc.citation.title | HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES | - |
| dc.citation.volume | 8 | - |
| dc.citation.number | 1 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | Y | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.subject.keywordPlus | STORAGE | - |
| dc.subject.keywordPlus | VIRTUALIZATION | - |
| dc.subject.keywordPlus | INTERNET | - |
| dc.subject.keywordPlus | SYSTEM | - |
| dc.subject.keywordPlus | THINGS | - |
| dc.subject.keywordAuthor | Human-centric Authentication Management | - |
| dc.subject.keywordAuthor | Mobile cloud computing | - |
| dc.subject.keywordAuthor | Blockchain | - |
| dc.subject.keywordAuthor | Resource management for human-centric | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
