COMPARISON OF DATA SECURITY SCHEMES FRAMEWORK FOR MOBILE CLOUD COMPUTING

被引:0
|
作者
Chauhan, Sumant Raj [1 ]
Kumar, Pankaj [1 ]
Bali, Vikram [2 ]
机构
[1] NIILM Univ, NH-65,Ambala Rd, Kaithal 136027, Haryana, India
[2] JSS Acad Tech Educ, Noida, India
来源
关键词
cryptographic; Mobile Cloud; SaaS; PaaS; IaaS;
D O I
暂无
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Mobile Cloud compute is an up-and-coming technology which provide IT services and resources to the customers from side to side public network exclusively internet. Mobile cloud computing services and infrastructure are generally own by a moderator called cloud service providers. When using the secure mobile cloud storage space services on resources limited Mobile Devices, the confidentiality of sensitive data must be ensure before uploading the data on cloud storage servers. The composite security operations to ensure security are limited to implement due to the resource embarrassed mobile devices. Data protection is serious issues in mobile cloud compute environment. In this paper, we present a projected security framework for mobile cloud compute. In this structure the cryptographic methods as well as algorithms are used for encryption and decryption of mobile user data. This structure ensures the supplementary security and discretion of user's aware or considerable data. This paper introduces the scheme stream of projected security structure. This projected Security structure is for the principle to secure and offer privacy and reliability to user's not to be disclosed data in Mobile Cloud Environment.
引用
收藏
页码:767 / 774
页数:8
相关论文
共 50 条
  • [41] A Security Framework for Mobile Cloud Applications
    Popa, Daniela
    Cremene, Marcel
    Borda, Monica
    Boudaoud, Karima
    2013 ROEDUNET INTERNATIONAL CONFERENCE (ROEDUNET): NETWORKING IN EDUCATION, 11TH EDITION, 2013,
  • [42] A mobile cloud computing framework for execution of data as a service using cloudlet
    Yadav, Santosh K.
    Kumar, Rakesh
    KUWAIT JOURNAL OF SCIENCE, 2021, 48 (03)
  • [43] A framework for partitioning and execution of data stream applications in mobile cloud computing
    1600, Association for Computing Machinery, 2 Penn Plaza, Suite 701, New York, NY 10121-0701, United States (40):
  • [44] Comparison of Biometric and Non-Biometric Security Techniques in Mobile Cloud Computing
    Darve, Nileshree R.
    Theng, Deepti P.
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 213 - 216
  • [45] Intelligent and semantic threshold schemes for security in cloud computing
    Ogiela, Lidia
    Snasel, Vaclav
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (02):
  • [46] On the security of three public auditing schemes in cloud computing
    Ming, Yang
    Wang, Yumin
    International Journal of Network Security, 2015, 17 (06) : 795 - 802
  • [47] SECURITY FRAMEWORKS FOR MOBILE CLOUD COMPUTING: A SURVEY
    Kulkarni, Pallavi
    Khanai, Rajashri
    Bindagi, Gururaj
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 2507 - 2511
  • [48] Security Issues and Challenges of Mobile Cloud Computing
    Shahzad, Abid
    Hussain, Mureed
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2013, 6 (06): : 37 - 49
  • [49] Cloud Computing Data Storage Security framework relating to Data Integrity, Privacy and Trust
    Sirohi, Preeti
    Agarwal, Amit
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 115 - 118
  • [50] A Framework for Cloud Data Security
    Grover, Ankit
    Kaur, Banpreet
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1199 - 1203