Hybrid RSAECC Based Secure Communication in Mobile Cloud Environment

被引:5
作者
Sridhar, S. [1 ]
Smys, S. [2 ]
机构
[1] Alpha Coll Engn, Chennai, Tamil Nadu, India
[2] RVS Tech campus, Coimbatore, Tamil Nadu, India
关键词
Cloud security; RSA-ECC hybrid model; AES algorithm;
D O I
10.1007/s11277-019-06867-0
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Mobile computing gained much attention in current research arena due to the enhancement of services such as mobile learning, health care monitoring and e commerce. The experience and satisfaction which increases the user count in millions on every day. Advantage of using cloud computing for essential multipath communication creates path for multi homing architecture and multi path data transmission. While the technology develops the security breaches are also increases due to the increased number of users and loads. System has to be considered as stable and safe only if breaches are reduced. Based on the applications services has to be enhanced with reliability, less faults, and robustness makes end to end communication much better for the future. The proposed research work describes a secure cloud computing mobile environment which provides meritorious service to the users. Experimental results highlights the proposed model has 98.5% of success ratio on providing secure communication services to the users via cloud computing applications.
引用
收藏
页码:429 / 442
页数:14
相关论文
共 19 条
[11]   A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing [J].
Li, Ruixuan ;
Shen, Chenglin ;
He, Heng ;
Gu, Xiwu ;
Xu, Zhiyong ;
Xu, Cheng-Zhong .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (02) :344-357
[12]   An Effective High Threating Alarm Mining Method for Cloud Security Management [J].
Meng, Yongwei ;
Qin, Tao ;
Liu, Yukun ;
He, Chao .
IEEE ACCESS, 2018, 6 :22634-22644
[13]   Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges [J].
Sajid, Anam ;
Abbas, Haider ;
Saleem, Kashif .
IEEE ACCESS, 2016, 4 :1375-1384
[14]   Performance Evaluation of Mobile Applications in Mobile Cloud Environments [J].
Santana, N. A. ;
Lins, F. A. A. ;
Sousa, E. T. G. .
IEEE LATIN AMERICA TRANSACTIONS, 2016, 14 (11) :4597-4602
[15]   Analysis of Classical Encryption Techniques in Cloud Computing [J].
Shabir, Muhammad Yasir ;
Iqbal, Asif ;
Mahmood, Zahid ;
Ghafoor, AtaUllah .
TSINGHUA SCIENCE AND TECHNOLOGY, 2016, 21 (01) :102-113
[16]   The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog From a Security and Resilience Perspective [J].
Shirazi, Syed Noorulhassan ;
Gouglidis, Antonios ;
Farshad, Arsham ;
Hutchison, David .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (11) :2586-2595
[17]   Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing [J].
Thu Yein Win ;
Tianfield, Huaglory ;
Mair, Quentin .
IEEE TRANSACTIONS ON BIG DATA, 2018, 4 (01) :11-25
[18]   A New BRB Model for Cloud Security-State Prediction Based on the Large-Scale Monitoring Data [J].
Wei, Hang ;
Hu, Guan-Yu ;
Han, Xiaoxia ;
Qiao, Peili ;
Zhou, Zhiguo ;
Feng, Zhi-Chao ;
Yin, Xiao-Jing .
IEEE ACCESS, 2018, 6 :11907-11920
[19]   Correlation Keystroke Verification Scheme for User Access Control in Cloud Computing Environment [J].
Xi, Kai ;
Tang, Yan ;
Hu, Jiankun .
COMPUTER JOURNAL, 2011, 54 (10) :1632-1644