Secure Mobile Multi Cloud Architecture for Authentication and Data Storage

2017 ◽  
Vol 7 (2) ◽  
pp. 62-76 ◽  
Author(s):  
Karim Zkik ◽  
Ghizlane Orhanou ◽  
Said El Hajji

The use of Cloud Computing in the mobile networks offer more advantages and possibilities to the mobile users such as storing, downloading and making calculation on data on demand and its offer more resources to these users such as the storage resources and calculation power. So, Mobile Cloud Computing allows users to fully utilize mobile technologies to store, to download, share and retrieve their personal data anywhere and anytime. As many recent researches show, the main problem of fully expansion and use of mobile cloud computing is security, and it's because the increasing flows and data circulation through internet that many security problems emerged and sparked the interest of the attackers. To face all this security problems, we propose in this paper an authentication and confidentiality scheme based on homomorphic encryption, and also a recovery mechanism to secure access for mobile users to the remote multi cloud servers. We also provide an implementation of our framework to demonstrate its robustness and efficiently, and a security analysis.

2019 ◽  
pp. 1108-1123
Author(s):  
Karim Zkik ◽  
Ghizlane Orhanou ◽  
Said El Hajji

The use of Cloud Computing in the mobile networks offer more advantages and possibilities to the mobile users such as storing, downloading and making calculation on data on demand and its offer more resources to these users such as the storage resources and calculation power. So, Mobile Cloud Computing allows users to fully utilize mobile technologies to store, to download, share and retrieve their personal data anywhere and anytime. As many recent researches show, the main problem of fully expansion and use of mobile cloud computing is security, and it's because the increasing flows and data circulation through internet that many security problems emerged and sparked the interest of the attackers. To face all this security problems, we propose in this paper an authentication and confidentiality scheme based on homomorphic encryption, and also a recovery mechanism to secure access for mobile users to the remote multi cloud servers. We also provide an implementation of our framework to demonstrate its robustness and efficiently, and a security analysis.


2017 ◽  
Vol 7 (2) ◽  
pp. 27-40 ◽  
Author(s):  
Mouhib Ibtihal ◽  
El Ouadghiri Driss ◽  
Naanani Hassan

The integration of cloud computing with mobile computing and internet has given birth to mobile cloud computing. This technology offers many advantages to users, like Storage capacity, Reliability, Scalability and Real time data availability. Therefore, it is s increasing fast and it is inevitably integrated into everyday life. In MCC, data processing and data storage can be migrated into the cloud servers. However, the confidentiality of images and data is most important in today's environment. In this paper, we mainly focus on secure outsourcing of images. For this purpose, we propose a secure architecture composed by two clouds a private cloud dedicated for encryption/decryption and a second public cloud dedicated for storage. We have implemented the first cloud using openstack while respecting the encryption as a service concept. As an encryption scheme, we have used paillier's homomorphic cryptosystem designed specifically for images. The test of the homomorphic property is done by applying the Watermarking algorithm DWT.


Cryptography ◽  
2020 ◽  
pp. 316-330 ◽  
Author(s):  
Mouhib Ibtihal ◽  
El Ouadghiri Driss ◽  
Naanani Hassan

The integration of cloud computing with mobile computing and internet has given birth to mobile cloud computing. This technology offers many advantages to users, like Storage capacity, Reliability, Scalability and Real time data availability. Therefore, it is s increasing fast and it is inevitably integrated into everyday life. In MCC, data processing and data storage can be migrated into the cloud servers. However, the confidentiality of images and data is most important in today's environment. In this paper, we mainly focus on secure outsourcing of images. For this purpose, we propose a secure architecture composed by two clouds a private cloud dedicated for encryption/decryption and a second public cloud dedicated for storage. We have implemented the first cloud using openstack while respecting the encryption as a service concept. As an encryption scheme, we have used paillier's homomorphic cryptosystem designed specifically for images. The test of the homomorphic property is done by applying the Watermarking algorithm DWT.


2020 ◽  
Author(s):  
Francis Tina

Cloud computing is a technology that was developed a decade ago to provide uninterrupted, scalable services to users and organizations. Cloud computing also became an attractive feature for mobile users due to the limited features of mobile devices. The combination of cloud technologies with mobile technologies gave a new area of computing called mobile cloud computing. This combined technology is used to augment the resources existing in smart devices. In recent times Fog computing, Edge computing and Clone Cloud computing techniques have become the latest trends after mobile cloud computing, which have all been developed to address the limitations in cloud computing. This paper reviews these recent technologies in detail. This paper also addresses the differences in these technologies and how each of them are effective to organizations and developers.


Author(s):  
RINKU V. RAJANKAR ◽  
R. W. JASUTKAR

Mobile cloud computing provides a solution to meet the increasing functionality demands of end-users, as all application logic is executed on distant servers and only user interface functionalities reside on the mobile device. As a result there is increasing demand of online personal data storage which should be used anywhere to provide a high performance, easy to use universal data access service thru various computing resources. In this paper we introduce multi-dimensional data structure to improve the accessibility of cloud .In the developing process of various servers proposed work make use of Microsoft’s latest windows Azure cloud computing platform.


Author(s):  
Khadija Akherfi ◽  
Hamid Harroud ◽  
Michael Gerndt

With the recent advances in cloud computing and the improvement in the capabilities of mobile devices in terms of speed, storage, and computing power, Mobile Cloud Computing (MCC) is emerging as one of important branches of cloud computing. MCC is an extension of cloud computing with the support of mobility. In this paper, the authors first present the specific concerns and key challenges in mobile cloud computing. They then discuss the different approaches to tackle the main issues in MCC that have been introduced so far, and finally focus on describing the proposed overall architecture of a middleware that will contribute to providing mobile users data storage and processing services based on their mobile devices capabilities, availability, and usage. A prototype of the middleware is developed and three scenarios are described to demonstrate how the middleware performs in adapting the provision of cloud web services by transforming SOAP messages to REST and XML format to JSON, in optimizing the results by extracting relevant information, and in improving the availability by caching. Initial analysis shows that the mobile cloud middleware improves the quality of service for mobiles, and provides lightweight responses for mobile cloud services.


Author(s):  
Jyoti Grover ◽  
Gaurav Kheterpal

Mobile Cloud Computing (MCC) has become an important research area due to rapid growth of mobile applications and emergence of cloud computing. MCC refers to integration of cloud computing into a mobile environment. Cloud providers (e.g. Google, Amazon, and Salesforce) support mobile users by providing the required infrastructure (e.g. servers, networks, and storage), platforms, and software. Mobile devices are rapidly becoming a fundamental part of human lives and these enable users to access various mobile applications through remote servers using wireless networks. Traditional mobile device-based computing, data storage, and large-scale information processing is transferred to “cloud,” and therefore, requirement of mobile devices with high computing capability and resources are reduced. This chapter provides a survey of MCC including its definition, architecture, and applications. The authors discuss the issues in MCC, existing solutions, and approaches. They also touch upon the computation offloading mechanism for MCC.


Cloud Computing is a very viable data storage structure where the users can store and access the data from anywhere. Cloud computing use is increasing at a very rapid pace nowadays. But as cloud allows us data accessibility quite easily data security is a major concern and is an emerging area of study. Other issues related to cloud computing are data privacy and internet dependency. On the other cloud computing also has wide range of benefits over traditional storage and accessibility environment such as scalability, flexibility and resource utilization. We have worked in the area of mobile cloud computing to analyse and solve the problems of anomaly attacks. Our work focuses on preventing the adaptive anomaly attacks and some other security issues of cloud computing


Author(s):  
T. Francis

Cloud computing is a technology that was developed a decade ago to provide uninterrupted, scalable services to users and organizations. Cloud computing has also become an attractive feature for mobile users due to the limited features of mobile devices. The combination of cloud technologies with mobile technologies resulted in a new area of computing called mobile cloud computing. This combined technology is used to augment the resources existing in Smart devices. In recent times, Fog computing, Edge computing, and Clone Cloud computing techniques have become the latest trends after mobile cloud computing, which have all been developed to address the limitations in cloud computing. This paper reviews these recent technologies in detail and provides a comparative study of them. It also addresses the differences in these technologies and how each of them is effective for organizations and developers.


Author(s):  
D. Jeya Mala

Mobile Cloud Computing (MCC) at its simplest form refers to an infrastructure where both the data storage and the data processing happen outside of the mobile device. In this chapter, a study on existing software architectures for MCC is outlined with their way of working. Also, a Nature inspired Artificial Bee Colony (ABC) based architecture has been proposed to provide reliable services from the cloud to the mobile requests. The proposed approach will definitely pave a way for timely services by using three different agents working in parallel, which mimics the behavior of honey bees namely Employed Bees, Onlooker Bees and Scout Bees. As the service discovery from the UDDI, Mobile profile Analysis and Allocation of Cloud resources for the requests are done by these software agents in a parallel execution, it achieves a green IT solution for MCC based software Development.


Sign in / Sign up

Export Citation Format

Share Document