Title: A smart scanning-based authentication framework for critical mobile cloud computing applications and services

Authors: Kamal Benzekki; Abdeslam El Fergougui; Abdelbaki El Alaoui El Belrhiti

Addresses: Laboratory of Computer Networks and Systems, Department of Mathematics and Computer Science, Faculty of Sciences, Moulay Ismail University, Meknes, Morocco ' Laboratory of Computer Networks and Systems, Department of Mathematics and Computer Science, Faculty of Sciences, Moulay Ismail University, Meknes, Morocco ' Laboratory of Computer Networks and Systems, Department of Mathematics and Computer Science, Faculty of Sciences, Moulay Ismail University, Meknes, Morocco

Abstract: In this paper we address the authentication process in the cloud environment for mobile devices, which appears to be a major field of study since it is the main entrance door to the offered services. Hence, we introduce a novel approach which is based on a smart Scan Decision-Maker algorithm that we have developed and is built on top of a context-aware authentication system and relies on a cloud-based malware scanning system (CloudAV). Our algorithm will form, in conjunction with the two adopted systems, a collaborative framework aiming, on the one hand, to provide an additional security layer so as to thwart advanced malware-based attacks that might bypass the authentication system and, on the other hand, to reduce the risk of online frauds and mitigate breaches of confidentiality in crucial business operations and critical services. As a part of proof-of-concept implementation, we have tested our algorithm in different scenarios.

Keywords: context-aware authentication; CloudAV; mobile computing; malware scanning; privacy protection; privacy preservation; cloud security; optimal scans; offloading; ubiquitous computing; smart scanning; mobile cloud computing; cloud services.

DOI: 10.1504/IJWMC.2016.078212

International Journal of Wireless and Mobile Computing, 2016 Vol.10 No.4, pp.325 - 334

Received: 07 Apr 2016
Accepted: 26 Apr 2016

Published online: 08 Aug 2016 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article