Skip to main content

Cloud in Mobile Platforms: Managing Authentication/Authorization

  • Conference paper
  • First Online:
New Knowledge in Information Systems and Technologies (WorldCIST'19 2019)

Abstract

This work presents the solution used within STMicroelectronics to grant security in Mobile Cloud computing (MCC), where Cloud computing paradigma meets the mobile environment, the enabling technology to provide access network services anyplace, anytime and anywhere. We first illustrate the scenario, then MCC main issues are introduced, and the corresponding solution in the STMicroelectronics case is shown and briefly discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Node.js is an open-source, cross-platform JavaScript run-time environment for executing JavaScript code server-side. See [14].

References

  1. MongoDB. https://www.mongodb.com. Accessed 29 Aug 2017

  2. Mongoose. http://mongoosejs.com/. Accessed 15 Sept 2017

  3. Bokhari, M.U., Makki, Q., Tamandani, Y.K.: A survey on cloud computing. In: Aggarwal, V.B., Bhatnagar, V., Mishra, D.K. (eds.) Big Data Analytics, pp. 149–164. Springer, Singapore (2018)

    Google Scholar 

  4. Buzzanca, M., Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G.: Direct trust assignment using social reputation and aging. J. Ambient Intell. Hum. Comput. 8(2), 167–175 (2017). https://doi.org/10.1007/s12652-016-0413-0

    Article  Google Scholar 

  5. Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G.: Gain the best reputation in trust networks. In: Brazier, F.M.T., Nieuwenhuis, K., Pavlin, G., Warnier, M., Badica, C. (eds.) Intelligent Distributed Computing V, pp. 213–218. Springer, Heidelberg (2012)

    Chapter  MATH  Google Scholar 

  6. Chow, R., Jakobsson, M., Masuoka, R., Molina, J., Niu, Y., Shi, E., Song, Z.: Authentication in the clouds: a framework and its application to mobile users. In: Proceedings of the CCSW 2010, pp. 1–6. ACM, New York (2010). http://doi.acm.org/10.1145/1866835.1866837

  7. Dey, S., Sampalli, S., Ye, Q.: Message digest as authentication entity for mobile cloud computing. In: 2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC), pp. 1–6, December 2013

    Google Scholar 

  8. Dolui, K., Datta, S.K.: Comparison of edge computing implementations: fog computing, cloudlet and mobile edge computing. In: 2017 Global Internet of Things Summit (GIoTS), pp. 1–6, June 2017

    Google Scholar 

  9. García-Valls, M., Dubey, A., Botti, V.: Introducing the new paradigm of social dispersed computing: applications, technologies and challenges. J. Syst. Archit. 91, 83–102 (2018). http://www.sciencedirect.com/science/article/pii/S1383762118301036

    Article  Google Scholar 

  10. Jeong, Y.S., Park, J.S., Park, J.H.: An efficient authentication system of smart device using multi factors in mobile cloud service architecture. Int. J. Commun. Syst. 28(4), 659–674 (2015). http://dx.doi.org/10.1002/dac.2694

    Article  Google Scholar 

  11. Laravel. https://laravel.com/. Accessed 30 Aug 2017

  12. Laravel Socialite. https://github.com/laravel/socialite. Accessed 7 July 2017

  13. Laszka, A., Dubey, A., Walker, M., Schmidt, D.: Providing privacy, safety, and security in IoT-based transactive energy systems using distributed ledgers. In: Proceedings of the Seventh International Conference on the Internet of Things, IoT 2017, pp. 13:1–13:8. ACM, New York (2017). http://doi.acm.org/10.1145/3131542.3131562

  14. Node.js. https://nodejs.org. Accessed 5 Sept 2017

  15. Noip. https://www.noip.com/. Accessed 15 Sept 2017

  16. OAuth2orize. https://github.com/jaredhanson/oauth2orize. Accessed 5 Sept 2017

  17. Oh, D.S., Kim, B.H., Lee, J.K.: A study on authentication system using QR code for mobile cloud computing environment, pp. 500–507. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22333-4_65

    Google Scholar 

  18. Omri, F., Hamila, R., Foufou, S., Jarraya, M.: Cloud-ready biometric system for mobile security access, pp. 192–200. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-30567-2_16

    Chapter  Google Scholar 

  19. Rassan, I.A., AlShaher, H.: Securing mobile cloud computing using biometric authentication (SMCBA). In: Proceedings of CSCI 2014, pp. 157–161. IEEE Computer Society, Washington, DC (2014). http://dx.doi.org/10.1109/CSCI.2014.33

  20. Salesforce.com, inc., SalesForce. https://www.salesforce.com. Accessed 5 July 2017

  21. Sanaei, Z., Abolfazli, S., Gani, A., Buyya, R.: Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Commun. Surv. Tutor. 16(1), 369–392 (2014)

    Article  Google Scholar 

  22. Schwab, D., Yang, L.: Entity authentication in a mobile-cloud environment. In: Proceedings of CSIIRW ’13 (CSIIRW 2013), pp. 42:1–42:4. ACM, New York (2013). http://doi.acm.org/10.1145/2459976.2460024

  23. STMicroelectronics. http://www.st.com/

  24. Todorov, D.: Mechanics of User Identification and Authentication: Fundamentals of Identity Management. CRC Press, Boca Raton (2007)

    Book  Google Scholar 

Download references

Acknowledgement

This work was partially supported by the ‘Piano per la Ricerca 2016/2018 DIEEI Università degli Studi di Catania’.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alessandro Longheu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Carchiolo, V., Longheu, A., Malgeri, M., Iannello, S., Marroccia, M., Randazzo, A. (2019). Cloud in Mobile Platforms: Managing Authentication/Authorization. In: Rocha, Á., Adeli, H., Reis, L., Costanzo, S. (eds) New Knowledge in Information Systems and Technologies. WorldCIST'19 2019. Advances in Intelligent Systems and Computing, vol 931. Springer, Cham. https://doi.org/10.1007/978-3-030-16184-2_35

Download citation

Publish with us

Policies and ethics