An Open and Portable Platform for Learning Data Security in Mobile Cloud Computing

Author(s):  
Lei Li ◽  
Kai Qian ◽  
Ragid Hasan ◽  
Qian Chen ◽  
Dalei Wu ◽  
...  

Cloud Computing is a very viable data storage structure where the users can store and access the data from anywhere. Cloud computing use is increasing at a very rapid pace nowadays. But as cloud allows us data accessibility quite easily data security is a major concern and is an emerging area of study. Other issues related to cloud computing are data privacy and internet dependency. On the other cloud computing also has wide range of benefits over traditional storage and accessibility environment such as scalability, flexibility and resource utilization. We have worked in the area of mobile cloud computing to analyse and solve the problems of anomaly attacks. Our work focuses on preventing the adaptive anomaly attacks and some other security issues of cloud computing


2018 ◽  
Author(s):  
Mohammed-Ali Anwar

Mobile Cloud Computing (MCC) is a recent technological development, which has emerged from two popular technology trends; mobile computing and cloud. In essence it revolutionises the capabilities of mobile devices by integrating both storage and processing of the cloud environment with mobile computing and in doing so providing greater optimisation and operating power, allowing for transparent and seamless use of resources provided by the cloud. However, expanding the capability of resource constrained mobile devices in this manner comes at a price. There are many risks associated with the security of data within the cloud environment and as MCC essentially uses the cloud, it also inherits any security issues that are associated with cloud computing. The aim of this survey is to identify potential data security issues, and analyse and present some pioneering security mechanisms and finally suggest some future directions for better data security with MCC.


2017 ◽  
Vol 379 ◽  
pp. 42-61 ◽  
Author(s):  
Yinghui Zhang ◽  
Xiaofeng Chen ◽  
Jin Li ◽  
Duncan S. Wong ◽  
Hui Li ◽  
...  

IJARCCE ◽  
2015 ◽  
pp. 254-257 ◽  
Author(s):  
Chandni Patel ◽  
SameerSingh Chauhan ◽  
Bhavesh Patel

OALib ◽  
2016 ◽  
Vol 03 (04) ◽  
pp. 1-11 ◽  
Author(s):  
Mohammad Waseem ◽  
Abdullah Lakhan ◽  
Irfan Ali Jamali

Author(s):  
Seada Abdu Wakene ◽  
Sisay Muleta Hababa ◽  
Gutema Seboka Daba ◽  
K S Ananda Kumar

Mobile cloud computing (MCC) combines cloud computing and mobile computing to deliver vast computational resources to mobile consumers, network operators, and cloud computing providers. You may access your data from anywhere in the globe using any mobile device that is linked to the Internet. Cloud computing provides access to data in real-time whenever and wherever want. Any conventional mobile device can benefit from MCC's infrastructure, computational capacity, software, and platform services. Network security, web application security, data access, authentication, authorization, data confidentiality, and data breach are all concerns of MCC's security. Because mobile devices lack sufficient storage and processing power, their data storage capacity is limited. Users of mobile devices may inadvertently provide sensitive information over the network or through the application. Therefore, data security is the main concern for mobile device users. The objective of this paper is to find a solution that can enhance technical requirements with relation to user’s data security and privacy in mobile cloud computing. To achieve this improved blowfish encryption algorithm is used to encrypt each user’s data security and where the shared secret key is hash down using message digest called secured hash function. Hashing can increase the integrity and privacy of user data. The proposed algorithm is evaluated with a normal blowfish algorithm and 3DES with different parameters. Improved blowfish algorithm shows better performance than normal blowfish algorithm and 3DES. In this work, we have developed web-based application where the Amazon MySQL RDS database is used for data storage.


2012 ◽  
Vol 3 (5) ◽  
pp. 1-2
Author(s):  
Seema Hadk ◽  
◽  
Nehal Jain ◽  
Kanika Dhir ◽  
Purva Kale ◽  
...  

2019 ◽  
Vol 8 (2) ◽  
pp. 3405-3412 ◽  

Mobile Cloud computing is define as the new paradigm, and in this new paradigm computational power is on demand service and accessible through mobiles and tablets. When user decides to go towards cloud computing, there is a risk of losing control on his own data. So providing security of the data during transmission and when saved on the cloud storage is a major issue. Any application relying upon an emerging technology should consider the different possible threats. The principal reason why people are afraid of using Cloud technology is that data security and integrity among all other issues involved in Cloud technology constitute a great challenge. As data security issues, access control as well as key management are also a reason why Cloud technology is not widely adopted. In mobile cloud computing, the security related to data involving data integrity, confidentiality, availability and traceability is the most critical concern of cloud users. As now mobile cloud is changing how users used to work over the network, by helping them in terms of cost and reduction of tasks complexity. Hence, it is very important for the user to be ensured that the transmission of the data is secure, that the consistency as well as the storage of the data on the cloud provider side is secured. Hence the necessity for developing trust security model is demanding.


Sign in / Sign up

Export Citation Format

Share Document