Impact of Port Knocking Authentication on Security and Performance: A Mobile Cloud Computing Perspective

L. Boroumand, M Shiraz, A Gani, Rashid Khokhar

Research output: Book chapter/Published conference paperConference paperpeer-review

Abstract

Despite of complicated mobile applications which are using on the smart phones due to the latest developments in mobile computing technology, the latest smart-phones are still weak computing devices, which are constrained by limitations in memory capacity, processing potential and battery lifetime. Therefore, Mobile Cloud Computing (MCC) was introduced, which enables access to a pool of storage and computational resources of computational clouds for mobile devices. Nonetheless, security and privacy are important issues in employing the services of computational clouds for off-device storage and application processing services. Current authentication models employ third party security monitoring mechanism and implement complicated mechanism for ensuring security measures which results in resources intensive security mechanism. Therefore, lightweight authentication methods are required to ensure trustworthy and secure environment in MCC. This paper analysis the issues which are arise because of the length of knock sequence and indicates future direction to mitigate these issues to make the port knocking authentication suitable for the MCC.
Original languageEnglish
Title of host publicationICONI 2013
EditorsSeung Ryul Jeong
Publication statusPublished - 2013
EventInternational Conference on Internet - Thailand, Thailand
Duration: 12 Dec 201316 Dec 2013

Conference

ConferenceInternational Conference on Internet
Country/TerritoryThailand
Period12/12/1316/12/13

Fingerprint

Dive into the research topics of 'Impact of Port Knocking Authentication on Security and Performance: A Mobile Cloud Computing Perspective'. Together they form a unique fingerprint.

Cite this