A Multilevel Authentication based on the RFID technique for a Multiple Mobile cloud user in Cloud storage: A Survey

2015 ◽  
Vol 2 (8) ◽  
pp. 371-375
IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 30444-30457 ◽  
Author(s):  
Shangping Wang ◽  
Duo Zhang ◽  
Yaling Zhang ◽  
Lihua Liu

Author(s):  
Zhenyu Li ◽  
Xiaohui Wang ◽  
Ningjing Huang ◽  
Mohamed Ali Kaafar ◽  
Zhenhua Li ◽  
...  

Due to the huge increase in the utilization of cloud storage in recent days, it leads to a massive growth in data traffic from application based servers to applications like smart phones, which not only influences batteries and computational capacities but as well swamp down multi-hopping strategies during data transmission. To resolve this crisis, traffic redundancy elimination (TRE) is an effectual solution, where the chunks to be transmitted will be directly fetched out from the receivers’ cache. Moreover, prevailing solutions cannot be directly applied or it is not appropriate for smart phones owing to its energy overhead ad high computation that is imposed on the applications. In order to overcome this problem, in this investigation, a novel a Predictive Acknowledgement for Eliminating Traffic (PACKET) is proposed which comprises of three significant elements. Initially, every application possess a clone in cloud that are responsible for calculating intensive tasks like detecting redundancy and parsing traffic. Secondly, consider that every cloud user has some specific applications like Facebook to be used in regular day to day life, every clones of cloud has to selectively determine the applications that are most frequently utilized and also reduce the high redundancy ratio. Thirdly, some cloud users always possess certain common applications; the proposed PACKET clusters those clones to co-operatively perform redundancy detection so as to diminish cache resource consumption in cloud. The simulation is carried out in MATLAB environment; the traces of applications are collected from online available data and are utilized for simulation purpose. Experimental outcomes demonstrates that PACKET can attain much higher hit ratio, reduced E2E delay, increased E2E throughput, energy efficiency and effectual bandwidth utilization in contrast to existing approaches. The proposed PACKET shows better and efficient trade-off than prevailing techniques.


2020 ◽  
Vol 12 (2) ◽  
pp. 72-79
Author(s):  
Nina Fadilah Najwa ◽  
Muhammad Ariful Furqon ◽  
Eki Saputra

Mobile Cloud Computing provides cloud storage services to users inside a cloud. This study focuses on the factors that influence the adoption of mobile cloud storage usage in the higher education. The research methods used in this study include: (1) problem formulation; (2) literature search; and (3) formulation of factors for adopting mobile cloud computing (4) validation and reliability test. The results obtained is a conceptual model that can be tested empirically. The main five factors are: (1) knowledge sharing variables; (2) Perceived usefulness variable (3) trust variable; (4) the attitude towards variable; and (5) the variable of behavioral intention of use. Each variable formulated in the conceptual model will be developed into items that are measurement indicators. The research contribution is in the form of a research model that is useful for empirical research on the factors of adoption of the use of Mobile Cloud Computing in the education sector.


In the cryptocurrency era, Blockchain is one of the expeditiously growing information technologies that help in providing security to the data. Data tampering and authentication problems generally occur in centralized servers while sharing and storing the data. Blockchain provides the platform for big data and cloud storage in enhancing the security by evading from pernicious users. In this paper, we have discussed the exhaustive description of blockchain and its need, features and applications. Analysis of blockchain is done for different domains such as big data, cloud, internet of things and mobile cloud where the differences V’s are compared with big data and blockchain. SWOT (Strength Weakness Opportunities Threats) analysis is performed to address the merits and limitations in blockchain technology. The survey in aspects of data security, data storage, data sharing and data authentication through blockchain technology is done and the challenges are discussed to overcome the problem that leads in big data and cloud storage. The detailed comparative analysis proves that the blockchain technology overcomes the problems in big data storage and data security in cloud.


2018 ◽  
Vol 6 (2) ◽  
pp. 440-452 ◽  
Author(s):  
Abir Awad ◽  
Adrian Matthews ◽  
Yuansong Qiao ◽  
Brian Lee

Sign in / Sign up

Export Citation Format

Share Document