Towards efficient data access in mobile cloud computing using pre-fetching and caching

Author(s):  
Hou Zhijun ◽  
Robson E. De Grande ◽  
Azzedine Boukerche
2014 ◽  
Vol 2014 ◽  
pp. 1-27 ◽  
Author(s):  
Suleman Khan ◽  
Muhammad Shiraz ◽  
Ainuddin Wahid Abdul Wahab ◽  
Abdullah Gani ◽  
Qi Han ◽  
...  

Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs) have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC.


Author(s):  
A. Amali Mary Bastina ◽  
N. Rama

<div><p>The raise in the recent security incidents of cloud computing and its challenges is to secure the data. To solve this problem, the integration of mobile with cloud computing, Mobile biometric authentication in cloud computing is presented in this paper. To enhance the security, the biometric authentication is being used, since the Mobile cloud computing is popular among the mobile user. This paper examines how the mobile cloud computing (MCC) is used in security issue with finger biometric authentication model. Through this fingerprint biometric, the secret code is generated by entropy value. This enables the person to request for accessing the data in the desk computer. When the person requests the access to the authorized user through Bluetooth in mobile, the Authorized user sends the permit access through fingerprint secret code. Finally this fingerprint is verified with the database in the Desk computer. If it is matched, then the computer can be accessed by the requested person.</p></div>


Cloud computing provides various computing resources delivered as a service over a network, particularly the Internet. With the rapid development of mobile networking and computing, as well as other enabling technologies, cloud computing is extended into the mobile domain. Mobile cloud computing concerns the usage of cloud computing in combination with mobile devices and mobile networks, in which trust management plays an important role to establish trust relationships in order to offer trustworthy services. This chapter briefly introduces trust management technologies in cloud computing. The authors analyze the basic requirements of trust management in mobile cloud computing by introducing its architecture and distinct characteristics. They further propose a number of schemes in order to realize autonomic data access control based on trust evaluation in a mobile cloud computing environment. Furthermore, the authors discuss unsolved issues and future research challenges in the field of trust management in mobile cloud computing.


NCICCNDA ◽  
2018 ◽  
Author(s):  
Anusha R ◽  
S. Meenakshi Sundaram ◽  
Asha P ◽  
Bhargavi Y ◽  
Bindu Jayaram

Sign in / Sign up

Export Citation Format

Share Document