USER AUTHENTICATION SCHEME FOR MOBILE CLOUD COMPUTING

Welcome to DSpace BU Repository

Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.

Show simple item record

dc.contributor.author Atif, Filza Reg # 43695
dc.contributor.author Toor, Bilal Ahmed Reg # 43757
dc.contributor.author Zahid, Osama Bin Reg # 43784
dc.date.accessioned 2023-03-20T06:01:27Z
dc.date.available 2023-03-20T06:01:27Z
dc.date.issued 2019
dc.identifier.uri http://hdl.handle.net/123456789/15241
dc.description Supervised by Dr. Ghulam Muhammad en_US
dc.description.abstract The key objective of this project is to develop an effective authentication scheme through which users can verify their identities on a mobile cloud computing platform the system and then the data that and gain the authentication necessary to concerns them. This report elaborates the various mechanisms considered and used access for the authentication scheme and the end result ol the research will be a demonstration of how the authentication scheme can be used to secure data in a mobile cloud computing environment while only giving access to users who can authenticate themselves. Authentication refers to the process of verifying the credibility and validity of a certain entity and, in this context of this project, data authentication refers to the process of verifying a user’s identity and, based off this verification, giving them access to the data that they require or is linked to their credentials. The project takes into consideration various different authentication schemes that have been already been developed such as 2FA (2 Factor Authentication), Multi Factor Authentication, OTP (One Time Password). In order to provide a high level of security to users, the goal is to research a single effective authentication scheme through which users can get access to all the mobile cloud computing services they require. Another significant benefit of this research is that, by removing unnecessary complexities from the authentication process and making it revolve around a singular key, authentication methods will require significantly less resources than they usually do thereby improving the speed at which users can authenticate themselves en_US
dc.language.iso en_US en_US
dc.publisher Bahria University Karachi Campus en_US
dc.relation.ispartofseries BSCS;MFN BSCS 212
dc.title USER AUTHENTICATION SCHEME FOR MOBILE CLOUD COMPUTING en_US
dc.type Project Reports en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account