A Secure Mobile Cloud Storage Environment using Encryption Algorithm

نویسندگان

  • Nitin Nagar
  • Ugrasen Suman
چکیده

Cloud computing frameworks such as, Google App Engine, Amazon Web Services, Windows Azure, and open source frameworks such as OpenStack have become increasingly popular among practitioners. Also, the growth in usage and deployment of smartphone platforms and applications worldwide is increasing rapidly. Mobile cloud computing promotes use of cloud based services in a mobile environment. Data and complex computing modules are processed in clouds and mobile devices do not need a powerful configuration such as CPU speed, and memory capacity. Mobile devices are unable to utilize resources, communication delay, and unexpected mobile vulnerabilities or attacks. These challenges have great effect in the improvement of service qualities of mobile cloud. In this paper, the survey of different vulnerability and attacks on mobile cloud computing identified and also design a secure mobile cloud storage environment through encryption algorithm. The proposed work focuses on solution for the threats that are the major issues for MCC adoption.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

Survey on Cryptographic Algorithms for Outsourcing Mobile Data to Cloud

Mobile devices are fast becoming a key computing platform and an essential part of human life as the most effective and suitable statement tools not bounded by time and place. Mobile Cloud Computing refers to an infrastructure where data storage space can happen away from mobile device i.e. on a cloud. To ensure the correctness of users' data in the cloud, the framework essentially focuses on t...

متن کامل

DACD: Delegated Access Control of Data in Cloud computing environment

Cloud computing provides a service based on internet for several shared resources and system software across various environment. For secure cloud storage the process of encryption of the data to the users for various needs has been brought by the delegated access control method. Generally storage in public cloud requires high communication, heavy load due to maximum storage and high computatio...

متن کامل

Towards Secure Communication for Highly Scalable Mobile Applications in Cloud Computing Systems

Cloud computing is a distributed computing model in which clients pay for computing and data storage resources of a third-party cloud provider. Cloud applications can scale up or down almost instantly to meet real-time computational demands. Despite the economic advantages of a pay-on-demand business model, security remains a paramount concern. Cloud applications by nature must store and retain...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016