Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.
dc.contributor.author | Atif, Filza Reg # 43695 | |
dc.contributor.author | Toor, Bilal Ahmed Reg # 43757 | |
dc.contributor.author | Zahid, Osama Bin Reg # 43784 | |
dc.date.accessioned | 2023-03-20T06:01:27Z | |
dc.date.available | 2023-03-20T06:01:27Z | |
dc.date.issued | 2019 | |
dc.identifier.uri | http://hdl.handle.net/123456789/15241 | |
dc.description | Supervised by Dr. Ghulam Muhammad | en_US |
dc.description.abstract | The key objective of this project is to develop an effective authentication scheme through which users can verify their identities on a mobile cloud computing platform the system and then the data that and gain the authentication necessary to concerns them. This report elaborates the various mechanisms considered and used access for the authentication scheme and the end result ol the research will be a demonstration of how the authentication scheme can be used to secure data in a mobile cloud computing environment while only giving access to users who can authenticate themselves. Authentication refers to the process of verifying the credibility and validity of a certain entity and, in this context of this project, data authentication refers to the process of verifying a user’s identity and, based off this verification, giving them access to the data that they require or is linked to their credentials. The project takes into consideration various different authentication schemes that have been already been developed such as 2FA (2 Factor Authentication), Multi Factor Authentication, OTP (One Time Password). In order to provide a high level of security to users, the goal is to research a single effective authentication scheme through which users can get access to all the mobile cloud computing services they require. Another significant benefit of this research is that, by removing unnecessary complexities from the authentication process and making it revolve around a singular key, authentication methods will require significantly less resources than they usually do thereby improving the speed at which users can authenticate themselves | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Bahria University Karachi Campus | en_US |
dc.relation.ispartofseries | BSCS;MFN BSCS 212 | |
dc.title | USER AUTHENTICATION SCHEME FOR MOBILE CLOUD COMPUTING | en_US |
dc.type | Project Reports | en_US |