{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:50:17Z","timestamp":1762005017700,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,5,11]],"date-time":"2018-05-11T00:00:00Z","timestamp":1525996800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2018,5,11]],"date-time":"2018-05-11T00:00:00Z","timestamp":1525996800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Hum. Cent. Comput. Inf. Sci."],"published-print":{"date-parts":[[2018,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The recent advances in information technology for mobile devices have increased the work efficiency of users, the mobility of compact mobile devices, and the convenience of location independence. However, mobile devices have limited computing power and storage capacity, so mobile cloud computing is being researched to overcome these limitations in mobile devices. Mobile cloud computing is divided into two methods: the use of external cloud services and the use of mobile resource management without a cloud server (MRM), which integrates the computing and storage resources of nearby mobile devices. Because mobile devices can freely participate in MRM, it is critical to have authentication technology to determine the correctness of information regarding resources. Conventional technologies require strong authentication techniques because they have vulnerabilities that can easily be tampered with via man-in-the-middle (MITM) attacks. This paper proposes the Secure Authentication Management human-centric Scheme (SAMS) to authenticate mobile devices using blockchain for trusting resource information in the mobile devices that are participating in the MRM resource pool. The SAMS forms a blockchain based on the resource information of the subordinate client nodes around the master node in the MRM. Devices in the MRM that have not been authorized through the SAMS cannot access or falsify data. To verify the SAMS for application with MRM, it was tested for data falsification by a malicious user accessing the SAMS, and the results show that data falsification is impossible.<\/jats:p>","DOI":"10.1186\/s13673-018-0136-7","type":"journal-article","created":{"date-parts":[[2018,4,25]],"date-time":"2018-04-25T12:08:07Z","timestamp":1524658087000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":66,"title":["Secure Authentication-Management human-centric Scheme for trusting personal resource information on mobile cloud computing with blockchain"],"prefix":"10.1186","volume":"8","author":[{"given":"Hyun-Woo","family":"Kim","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7421-1105","authenticated-orcid":false,"given":"Young-Sik","family":"Jeong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,11]]},"reference":[{"issue":"1","key":"136_CR1","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s11227-013-0970-3","volume":"66","author":"YS Jeong","year":"2013","unstructured":"Jeong YS, Kim HW, Jang HJ (2013) Adaptive resource management scheme for monitoring of CPS. J Supercomput 66(1):57\u201369","journal-title":"J Supercomput"},{"issue":"3","key":"136_CR2","doi-asserted-by":"publisher","first-page":"1194","DOI":"10.1007\/s11227-011-0667-4","volume":"66","author":"JM Gil","year":"2013","unstructured":"Gil JM, Park JH, Jeong YS (2013) Data center selection based on neuro-fuzzy inference systems in cloud computing environments. J Supercomput 66(3):1194\u20131214","journal-title":"J Supercomput"},{"issue":"4","key":"136_CR3","first-page":"48","volume":"4","author":"SK Sonkar","year":"2015","unstructured":"Sonkar SK, Kharat MU (2015) A survey on resource management in cloud computing environment. Int J Adv Trends Comput Sci Eng 4(4):48\u201351","journal-title":"Int J Adv Trends Comput Sci Eng"},{"key":"136_CR4","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MC.2010.98","volume":"43","author":"K Kumar","year":"2010","unstructured":"Kumar K, Lu YH (2010) Cloud computing for mobile users: can offloading computation save energy. IEEE Comput 43:51\u201356","journal-title":"IEEE Comput"},{"issue":"1","key":"136_CR5","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/s11227-014-1174-1","volume":"69","author":"Z Sun","year":"2014","unstructured":"Sun Z, Fox G, Gu W, Li Z (2014) A parallel clustering method combined information bottleneck theory and centroid-based clustering. J Supercomput 69(1):452\u2013467","journal-title":"J Supercomput"},{"key":"136_CR6","doi-asserted-by":"crossref","unstructured":"Kim HW, Byun H, Song EH, Jeong YS. Sustainable operation algorithm for high availability with integrated desktop storage based on virtualization. In: Proceedings of the 2015 international symposium on real-time natural user interface and natural user experience, Hanoi, Vietnam, 18\u201320; 2015, pp 123\u2013128","DOI":"10.1007\/978-3-662-47487-7_19"},{"issue":"4","key":"136_CR7","first-page":"7","volume":"4","author":"FB Degefa","year":"2013","unstructured":"Degefa FB, Won D (2013) Extended key management scheme for dynamic group in multi-cast communication. J Converg 4(4):7\u201313","journal-title":"J Converg"},{"issue":"22","key":"136_CR8","first-page":"1","volume":"3","author":"MI Malkawi","year":"2013","unstructured":"Malkawi MI (2013) The art of software systems development: reliability, availability, maintainability, performance (RAMP). Humancentric Comput Inf Sci 3(22):1\u201317","journal-title":"Humancentric Comput Inf Sci"},{"issue":"6","key":"136_CR9","doi-asserted-by":"publisher","first-page":"7568","DOI":"10.3390\/su7067568","volume":"7","author":"Hyun-Woo Kim","year":"2015","unstructured":"Kim Hyun-Woo, Park JH, Majigsuren D, Jeong YS (2015) Efficient sustainable operation mechanism of distributed desktop integration storage based on virtualization with ubiquitous computing. Sustainability 7(6):7568\u20137580","journal-title":"Sustainability"},{"issue":"2","key":"136_CR10","doi-asserted-by":"publisher","first-page":"347","DOI":"10.3745\/JIPS.2012.8.2.347","volume":"8","author":"EH Song","year":"2012","unstructured":"Song EH, Kim HW, Jeong YS (2012) Visual monitoring system of multi-hosts behavior for trustworthiness with mobile cloud. J Inf Process Syst 8(2):347\u2013358","journal-title":"J Inf Process Syst"},{"issue":"2","key":"136_CR11","doi-asserted-by":"publisher","first-page":"287","DOI":"10.3745\/JIPS.2013.9.2.287","volume":"9","author":"SH Lee","year":"2013","unstructured":"Lee SH, Lee IY (2013) A secure index management scheme for providing data sharing in cloud storage. J Inf Process Syst 9(2):287\u2013300","journal-title":"J Inf Process Syst"},{"issue":"4","key":"136_CR12","first-page":"1405","volume":"2","author":"N Shrivastava","year":"2013","unstructured":"Shrivastava N, Kumar G (2013) A survey on cost effective multi-cloud storage in cloud computing. Int J Adv Res Comput Eng Technol 2(4):1405","journal-title":"Int J Adv Res Comput Eng Technol"},{"issue":"12","key":"136_CR13","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MSPEC.2016.7761864","volume":"53","author":"M Peck","year":"2016","unstructured":"Peck M (2016) A block chain currency that beats bitcoin on privacy. IEEE Spectr 53(12):11\u201313","journal-title":"IEEE Spectr"},{"key":"136_CR14","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the internet of things. IEEE Access 4:2292\u20132303","journal-title":"IEEE Access"},{"key":"136_CR15","unstructured":"Kim SY, Roh HC, Park CH, Park SH. Analysis of metadata server on clustered file systems. In: Proceedings of the Korea computer congress 2009, KCC, vol 36, No. 1, Seoul, Korea, 1\u20133; 2009, pp 64\u201369"},{"issue":"2","key":"136_CR16","first-page":"547","volume":"2","author":"PE Gaonkar","year":"2013","unstructured":"Gaonkar PE, Bojewar S, Das JA (2013) A survey: data storage technologies. Int J Eng Sci Innov Technol 2(2):547\u2013554","journal-title":"Int J Eng Sci Innov Technol"},{"issue":"11","key":"136_CR17","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/353360.353362","volume":"43","author":"GA Gibson","year":"2000","unstructured":"Gibson GA, Van Meter R (2000) Network attached storage architecture. Commun ACM 43(11):37\u201345","journal-title":"Commun ACM"},{"issue":"6","key":"136_CR18","doi-asserted-by":"publisher","first-page":"1847","DOI":"10.1016\/j.jnca.2012.07.009","volume":"35","author":"B Dong","year":"2012","unstructured":"Dong B, Zheng Q, Tian F, Chao K, Ma R, Anane R (2012) An optimized approach for storing and accessing small files on cloud storage. J Netw Comput Appl 35(6):1847\u20131862","journal-title":"J Netw Comput Appl"},{"key":"136_CR19","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1016\/j.asoc.2014.04.027","volume":"22","author":"M Chattopadhyay","year":"2014","unstructured":"Chattopadhyay M, Dan P, Mazumdar S (2014) Comparison of visualization of optimal clustering using self-organizing map and growing hierarchical self-organizing map in cellular manufacturing system. Appl Soft Comput 22:528\u2013543","journal-title":"Appl Soft Comput"},{"issue":"5","key":"136_CR20","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1016\/j.ijhcs.2014.02.001","volume":"72","author":"JS Silva","year":"2014","unstructured":"Silva JS, Campos JC, Harrison MD (2014) Prototyping and analysing ubiquitous computing environments using multiple layers. Int J HumanComput Stud 72(5):488\u2013506","journal-title":"Int J HumanComput Stud"},{"key":"136_CR21","doi-asserted-by":"publisher","first-page":"8079","DOI":"10.3390\/su6118079","volume":"6","author":"JH Park","year":"2014","unstructured":"Park JH, Kim HW, Jeong YS (2014) Efficiency sustainability resource visual simulator for clustered desktop virtualization based on cloud infrastructure. Sustainability 6:8079\u20138091","journal-title":"Sustainability"},{"key":"136_CR22","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1016\/j.procs.2016.03.070","volume":"79","author":"A Nayak","year":"2016","unstructured":"Nayak A, Bansode R (2016) Analysis of knowledge based authentication system using persuasive cued click points. Proc Comput Sci 79:553\u2013560","journal-title":"Proc Comput Sci"},{"issue":"99","key":"136_CR23","first-page":"1","volume":"PP","author":"K Riesen","year":"2016","unstructured":"Riesen K, Hanne T, Schmidt R (2016) Sketch-based user authentication with a novel string edit distance model. IEEE Trans Syst Man Cybern Syst PP(99):1\u201313","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"issue":"7","key":"136_CR24","doi-asserted-by":"publisher","first-page":"2437","DOI":"10.1007\/s11227-015-1390-3","volume":"72","author":"HW Kim","year":"2016","unstructured":"Kim HW, Park JH, Jeong YS (2016) Human-centric stroage resource mechanism for big data on cloud service architecture. J Supercomput 72(7):2437\u20132452","journal-title":"J Supercomput"},{"key":"136_CR25","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.compeleceng.2014.11.001","volume":"42","author":"H Duan","year":"2015","unstructured":"Duan H, Yu S, Mei M, Zhan W, Li L (2015) CSTORE: a desktop-oriented distributed public cloud storage system. Comput Elect Eng 42:60\u201373","journal-title":"Comput Elect Eng"},{"key":"136_CR26","doi-asserted-by":"crossref","unstructured":"Shafer J, Rixner S, Cox AL. The hadoop distributed filesystem: balancing portability and performance. In: Proceedings of IEEE international symposium on performance analysis of system and software (ISPASS 2010), White Plains, New York, 28\u201330; 2010, pp 122\u2013133","DOI":"10.1109\/ISPASS.2010.5452045"},{"issue":"10","key":"136_CR27","doi-asserted-by":"publisher","first-page":"1869","DOI":"10.1134\/S0005117914100130","volume":"75","author":"NP Vasilyev","year":"2014","unstructured":"Vasilyev NP, Rovnyagin MM (2014) Hybrid clusters for budget supercomputers and cloud computing. Autom Remote Control 75(10):1869\u20131874","journal-title":"Autom Remote Control"},{"key":"136_CR28","unstructured":"Heo YA. A study on mobile resource management scheme based on collaborative architecture. Master Degree Thesis, Dongguk University; 2017"},{"issue":"2","key":"136_CR29","first-page":"226","volume":"12","author":"J Kar","year":"2016","unstructured":"Kar J, Mishra MR (2016) Mitigating threats and security metrics in cloud computing. J Inf Process Syst 12(2):226\u2013233","journal-title":"J Inf Process Syst"},{"issue":"14","key":"136_CR30","first-page":"1","volume":"5","author":"F Motavaselalhagh","year":"2015","unstructured":"Motavaselalhagh F, Esfahani FS, Arabnia HR (2015) Knowledge-based adaptable scheduler for SaaS providers in cloud computing. Humancentric Comput Inf Sci 5(14):1\u201319","journal-title":"Humancentric Comput Inf Sci"},{"issue":"3","key":"136_CR31","first-page":"18","volume":"6","author":"S Kim","year":"2015","unstructured":"Kim S, Lee H, Kwon H, Lee S (2015) Evaluation model of defense information systems use. J Converg 6(3):18\u201326","journal-title":"J Converg"},{"issue":"6","key":"136_CR32","first-page":"1","volume":"7","author":"WM Kang","year":"2017","unstructured":"Kang WM, Moon SY, Park JH (2017) An enhanced security framework for home appliances in smart home. Humancentric Comput Inf Sci 7(6):1\u201312","journal-title":"Humancentric Comput Inf Sci"},{"issue":"6","key":"136_CR33","first-page":"1613","volume":"13","author":"V Suryani","year":"2017","unstructured":"Suryani V, Sulistyo S, Widyawan W (2017) Internet of things (IoT) framework for granting trust among objects. J Inf Process Syst 13(6):1613\u20131627","journal-title":"J Inf Process Syst"}],"container-title":["Human-centric Computing and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-018-0136-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13673-018-0136-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-018-0136-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T08:29:13Z","timestamp":1627633753000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13673-018-0136-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,11]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["136"],"URL":"https:\/\/doi.org\/10.1186\/s13673-018-0136-7","relation":{},"ISSN":["2192-1962"],"issn-type":[{"type":"electronic","value":"2192-1962"}],"subject":[],"published":{"date-parts":[[2018,5,11]]},"assertion":[{"value":"28 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"11"}}