Hybrid RSAECC Based Secure Communication in Mobile Cloud Environment

被引:5
作者
Sridhar, S. [1 ]
Smys, S. [2 ]
机构
[1] Alpha Coll Engn, Chennai, Tamil Nadu, India
[2] RVS Tech campus, Coimbatore, Tamil Nadu, India
关键词
Cloud security; RSA-ECC hybrid model; AES algorithm;
D O I
10.1007/s11277-019-06867-0
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Mobile computing gained much attention in current research arena due to the enhancement of services such as mobile learning, health care monitoring and e commerce. The experience and satisfaction which increases the user count in millions on every day. Advantage of using cloud computing for essential multipath communication creates path for multi homing architecture and multi path data transmission. While the technology develops the security breaches are also increases due to the increased number of users and loads. System has to be considered as stable and safe only if breaches are reduced. Based on the applications services has to be enhanced with reliability, less faults, and robustness makes end to end communication much better for the future. The proposed research work describes a secure cloud computing mobile environment which provides meritorious service to the users. Experimental results highlights the proposed model has 98.5% of success ratio on providing secure communication services to the users via cloud computing applications.
引用
收藏
页码:429 / 442
页数:14
相关论文
共 19 条
[1]   DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security [J].
Ali, Mazhar ;
Bilal, Kashif ;
Khan, Samee U. ;
Veeravalli, Bharadwaj ;
Li, Keqin ;
Zomaya, Albert Y. .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (02) :303-315
[2]   Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: A Contract Design Approach [J].
Chen, Juntao ;
Zhu, Quanyan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) :2736-2750
[3]   Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds [J].
Chillotti, Ilaria ;
Gama, Nicolas ;
Georgieva, Mariya ;
Izabachene, Malika .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 :3-33
[4]  
El Makkaoui K, 2017, ADV INTELL SYST, V520, P471
[5]   Robust Anonymous Mutual Authentication Scheme for n-Times Ubiquitous Mobile Cloud Computing Services [J].
Gope, Prosanta ;
Das, Ashok Kumar .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05) :1764-1772
[6]   On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services [J].
Jiang, Qi ;
Ma, Jianfeng ;
Wei, Fushan .
IEEE SYSTEMS JOURNAL, 2018, 12 (02) :2039-2042
[7]  
Kulshreshtha V, 2014, IEEE I ELECT ELECT E, V1, P1
[8]   Bayesian Cooperative Coalition Game as a Service for RFID-Based Secure QoS Management in Mobile Cloud [J].
Kumar, Neeraj ;
Iqbal, Rahat ;
Misra, Sudip ;
Rodrigues, Joel J. P. C. ;
Obaidat, Mohammad S. .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2018, 6 (01) :58-71
[9]   Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds [J].
Li, Hongwei ;
Liu, Dongxiao ;
Dai, Yuanshun ;
Luan, Tom H. ;
Yu, Shui .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2018, 6 (01) :97-109
[10]   Computation Partitioning for Mobile Cloud Computing in a Big Data Environment [J].
Li, Jianqiang ;
Huang, Luxiang ;
Zhou, Yaoming ;
He, Suiqiang ;
Ming, Zhong .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (04) :2009-2018