For mobile services in the cloud of things: a model-driven development pattern

被引:0
作者
Sree N.S. [1 ]
Lakshmi P.P. [1 ]
Prince Mary S. [1 ]
机构
[1] Department of Computer Science and Engineering, Sathyabama University
关键词
authentication; cloud; end user; privacy; security; services; storage;
D O I
10.1504/ijcc.2022.128696
中图分类号
学科分类号
摘要
Cloud computing has recent advances when it comes to storing and processing the information in a server, away from the end user. Numerous users are using the services offered by cloud for various applications. Some use cloud platforms to build their own applications while some use the entire application running on the cloud. An enormous amount of information is being processed; the cloud environment needs to be secured in all the aspects. Any data leaks could lead to serious problems. To overcome this challenge, a mobile-driven model for securing the information in the cloud using the secured key is proposed. The key is shared only to the authenticated user and not with unauthorised ones. The services are available only when the user is verified with the unique password generated for him. Various parameters were evaluated for the proposed model and were observed that it performed better than the traditional models. The computation speed was minimal with highly secured key generation. Copyright © 2022 Inderscience Enterprises Ltd.
引用
收藏
页码:511 / 517
页数:6
相关论文
共 16 条
[1]  
Al Zain M.A., Pardede E., Soh B., Thom J.A., Cloud computing security: from single to multi-clouds, 2012 45th Hawaii International Conference on System Sciences, HICSS, pp. 5490-5499, (2012)
[2]  
An efficient utilization of spectrum in wireless mobility by retransmission mechanism, Journal of Scientific & Industrial Research (JSIR), (2015)
[3]  
Security in the Cloud, (2008)
[4]  
Cusumano M., Cloud computing and SaaS as new computing platforms, Communications of the ACM, 53, 4, pp. 27-29, (2010)
[5]  
Hay B., Nance K., Bishop M., Storm clouds rising: security challenges for IaaS cloud computing, 2011 44th Hawaii International Conference on System Sciences (HICSS), pp. 1-7, (2011)
[6]  
Jayanthiladevi A., Kadharnawaz G.M., An efficient utilization of spectrum in seamless mobility by using retransmission rerouting mechanism in mobile IP, (2015)
[7]  
Kandukuri B.R., Rakshit A., Cloud security issues, IEEE International Conference on Services Computing, 2009. SCC’09, pp. 517-520, (2009)
[8]  
Kavis M.J., Architecting the Cloud: Design Decisions for Cloud Computing Service Models (SaaS, PaaS, and IaaS), (2014)
[9]  
Lalitha T., Devi A.J., Security in wireless sensor networks: key management module in EECBKM, 2014 World Congress on Computing and Communication Technologies, pp. 306-308, (2014)
[10]  
Li J., Li Y.K., Chen X., Lee P.P., Lou W., A hybrid cloud approach for securely authorized deduplication, IEEE Transactions on Parallel and Distributed Systems, 26, 5, pp. 1206-1216, (2015)