A Survey on Security and Privacy Challenges in Mobile Grid Computing
نویسنده
چکیده
The security is essential for all the applications on network. For providing the security to many applications on the network, number of mechanism are used. Grid computing is believed to be ultimate solution for meeting the increasing computation needs of the organizations. At present major focus in Grid computing is to improve the performance of the grid. However, user running an application on a remote machine in the grid-computing network requires assurance about privacy and integrity of his data. Mobile Grid Computing(MGC) is the combination of Grid Computing and Mobile Networks to bring benefits for mobile users, network operators, as well as grid computing providers. Here we have to explore the security problems in grid computing and the steps that can be taken to solve them. The ultimate goal of MGC is to enable execution of rich mobile applications of mobile devices. The prominent feature of the MGC is the collaboration of multiple entities to perform collaborative tasks using mobile devices. Currently, most of the security solutions for mobile grid environment use static set of algorithms and protocols. The NTRU algorithm is concluded as a best and fast algorithm for providing security on the clouds. NTRU is a public key cryptosystem, which provides best security to cloud computing by encrypting and decrypting the data. KeywordsMobile Grid Computing, Authentication, Secure Communication, Android Platform, Encryption, Decryption, NTRU, AES and throughput
منابع مشابه
A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کامل