Research Article

New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing

Table 1

Notation and Description.

NotationDescription

ā€‰Concatenation
ā€‰XOR Operation
h(U)Hash Value of User ID
h(PW)Hash Value of Password
UMobile Cloud User
SCloud Service Provider
ASAuthentication Server
UidClient URI with Mobile No
sk(U)Private Key of User
pk(U)Public Key of User
sk(S)Private Key of CSP
pk(S)Public Key of CSP
NsFresh Authentication ID
RRandom Value Gen by User
Na, Nu1, Nu2, Nu3Fresh Nonce
h()Hash Function