Secure Authentication Scheme with Privacy Preservation Policy on Mobile Cloud Computing Environment
K. Naveen Prasad1, K.R. Harsha Kashyap2, Kunal Sutradhar3, Tejas Kumar4, S. Arun Kumar5

1K. Naveen Prasad, SRM Institute of Science and Technology, Chennai (T.N), India.
2K.R. Harsha Kashyap, SRM Institute of Science and Technology, Chennai (T.N), India.
3Kunal Sutradhar, SRM Institute of Science and Technology, Chennai (T.N), India.
4Tejas Kumar, SRM Institute of Science and Technology, Chennai (T.N), India.
5S. Arun Kumar, Assistant Professor, SRM Institute of Science and Technology, Chennai (T.N), India.
Manuscript received on 03 June 2019 | Revised Manuscript received on 28 June 2019 | Manuscript Published on 04 July 2019 | PP: 374-378 | Volume-8 Issue-1S4 June 2019 | Retrieval Number: A10670681S419/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: With the exponential augmentation of the mobile phones and the snappy headway of conveyed processing, another figuring perspective called compact disseminated registering (MCC) is progressed to unwind the confinement of the PDA’s accumulating, correspondence, and count. Through mobile phones, customers can value diverse dispersed figuring organizations in the midst of their transportability. Nevertheless, it is difficult to ensure security and guarantee assurance because of the straightforwardness of remote correspondence in the new preparing perspective. Starting late, Tsai and Lo proposed a security careful approval (PAA) plan to deal with the conspicuous confirmation issue in MCC benefits and exhibited that their arrangement could contradict various sorts of existing attacks. Tragically, we found that Tsai and Lo’s arrangement can’t maintain a strategic distance from the expert association emulate strike, i.e., an adversary can copy the authority coop to the customer. Similarly, the adversary can isolate the customer’s certified identity in the midst of executing the master center emulate strike. To address the above issues, in this paper, we manufacture another PAA scheme for MCC benefits by using a character based imprint plot. Security examination shows that the proposed PAA contrive can address the authentic security issues existing in Tsai and Lo’s arrangement and can meet security essentials for MCC organizations. The execution appraisal shows that the proposed PAA scheme has less count and correspondence costs differentiated and Tsai and Lo’s PAA plot.
Keywords: CNN, DAP3D-Net, Computer Vision.
Scope of the Article: Cloud Computing