International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2014): 5.611 Volume 4 Issue 10, October 2015 www.ijsr.net Licensed Under Creative Commons Attribution CC BY Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication Chaitali P. Kathar 1 , Vidya Dhamdhere 2 1 Pune University, G.H.R.C.E.M, Wagholi, Pune, Maharashtra, India 2 Professor, Pune University, G.H.R.C.E.M, Wagholi, Pune, Maharashtra, India Abstract: In recent societies, the number of mobile users has tremendously risen in recent years. The paper provides security and use for mobile users to access different mobile cloud computing services from multiple service providers using only a single private key. In this paper, we propose a new short signature scheme from the bilinear pairings. However, our scheme is represented from Inverse Computational Diffie-Hellman Problem (Inv-CDHP) based on bilinear pairing and does not require any hash function. We give the exact security proofs for the new signature scheme and the ring signature scheme in the model. Keywords: Cloud computing, Bilinear pairings, Authentication scheme, Mobile cloud computing services, Short signature 1. Introduction The market of mobile phones has increased rapidly. According to the premier global market firm, the large worldwide Smartphone market increased by 42.5% year over year in the first quarter of 2013. The increse of mobility has changes our lives in an succeed way. Although there have been many papers discussing the complexity of every pairings and how to speed up the pairing computation [1,2], the computation of the pairing still remains time-consuming. A user authentication scheme for mobile users in distributed cloud services environment should maintain the following benefits. The authentication scheme is on some efficient cryptosystems to show mutual authentication and user anonymity without using SSL. A trusted third party is required for user registration and service provider registration, but it is not required to participate in user authentication session later. A user can access mobile services from multiple service providers with only one private key. The authentication scheme does not require large computation operations on users’ mobile devices. In Asiacrypt 2001, Boneh, Lynn, and Shacham [3], proposed a short signature scheme using bilinear pairing on certain elliptic and hyperelliptic curves. They proposed a new short signature scheme of the bilinear pairings that unlike BLS scheme, uses general cryptographic hash functions such as SHA-1 or MD5, and does not require any special hash functions. In 1984, Shamir asked for identity(ID)-based encryption and signature schemes to solve key management procedures of certificate-based public key infrastructures (PKIs). It is useful in situations where the validity of a signature must not be verifiable. For example, a software vendor might want to embed signatures into his products and allow only payed customers to check the authenticity of these products. 2. System View Cloud computing is an evolving paradigm with various momentums, but its unique aspects security and privacy challenges. It explores the roadblocks and its solutions to providing a trustworthy cloud computing environment. Despite increased usage of mobile computing, exploiting it is difficult due to its inherent problems such as resource scarcity, disconnections, frequent and mobility. Mobile cloud computing can solve these problems by executing mobile applications on resource providers to the mobile device. In this paper, they provide a survey of mobile cloud computing research, while the specific views in mobile cloud computing. They represent a taxonomy based on the key issues in this area, and discuss the different approaches taken to tackle these issues. They conclude the paper with a critical research of challenges that have not yet been met, and highlight directions for future work. Address the problem of QoS-guaranteed secured service provisioning in MCNs. They design maximization problem for quality-assured secured load sharing (QuaLShare) in MCN, and show its minimum solution using auction theory. In QuaLShare, the overloaded gateway finds the misbehaving gateways, prevents them from participated in the auction process. Theoretically, we characterize both the problem and the solution approaches in an MCN environment. Finally, they searched the existence of Nash Equilibrium of the scheme. They extend the solution for the case of multiple users, followed by theoretical analysis. Numerical analysis establishes the correctness of the proposed algorithms. There is various business view for the cloud computing application on mobile internet. But combined cloud computing technology into mobile internet gives birth to a series of security problems. One of the challenges is to construct the cloud computing secure architecture on mobile internet. After analyzing the cloud computing security risks and secure architectures, and taking into account the characteristics of mobile internet, this paper Paper ID: SUB159075 1548