scholarly journals Develope An Certificate Authority Based Encryption Cryptography Model For Mobile Applications In Cloud Computing

Author(s):  
Mahalakshmi M ◽  
Kalyanasundaran S.

The backbone of this research is to design and developed an effective cloud environment for pretending and protection of portable client device information put away in the cloud. Portable gadgets, for example, advanced mobile phones or tablets that are fundamentally more restricted than PCs as far as memory, processors, secured operating system, and accessible system data transmission bandwidth because of that all information migrate in to cloud environment. A portable client may go about as an information owner will demand key from the cloud administrator, scrambles the information and afterward it transfers the information in the cloud. In the cloud secured encryption is finished. Certificate Authority Based Encryption (CABE) approach is utilized for security and adaptability. Frequent monitoring is accomplished for Privacy, Security, trustworthiness and accessibility.

Author(s):  
Reza Rawassizadeh ◽  
Amin Anjomshoaa ◽  
A Min Tjoa

There are many mobile applications currently available on the market, which have been developed specifically for smart phones. The operating system of these smart phones is flexible enough to facilitate the high level application development. Similar to other pervasive devices, mobile phones suffer from limited amount of resources. These resources vary from the power (battery) consumption to the network bandwidth consumption. In this research the mobile resources are identified and classified. Furthermore, a monitoring approach to measure resource utilization is proposed. This monitoring tool generates traces about the resource usage which is followed by a benchmarking model which studies monitoring traces and enables users to extract qualitative information about the application from quantitative trace of resource usage.


2019 ◽  
Vol 8 (S2) ◽  
pp. 46-51
Author(s):  
S. Abdul Saleem ◽  
N. Ramya

Cloud computing is an emerging patterning that provides computing, communication and storage resources-as-service over a network. In existing system, data stored in a cloud is unsafe due to the eaves dropping and hacking process. To overcome the drawbacks of earlier approaches, Division and Replication of Data in the Cloud for Optimal Performance and Security (DROPS) methodology is used. The node selection is ensured by means of Graph Topology Grid Algorithm and also data is encrypted here for security. In this process, the common data are divided into multiple nodes and replicate the fragmented data over the cloud nodes. Each data is stored in a different node as fragments in individual locations. In case of any attackers attack a node, no meaningful information will expose to them. The controlled replication of the file fragments is ensured and each of the fragments is replicated only once for the purpose of improved security and minimal retrieval time. In this survey, various relevant approaches were studied and analyzed. Furthermore the DROPS with Graph Topology Grid Algorithm give the better way of security in cloud environment over the earlier approaches.


Author(s):  
Addepalli V. N. Krishna ◽  
Balamurugan M.

In the existent system, data is encrypted and stored when passed to the cloud. During any operations on the data, it is decrypted and then the computation is done. This decrypted data is vulnerable and prone to be misused. After the computations are done, the data and the result are encrypted and stored back in the cloud. This creates an overhead to the system as well as increases time complexity. With this chapter, the authors aim to reduce the overhead of the systems to perform repeated encryptions and decryptions. This can be done by allowing the computations to happen directly on the encrypted text. The result obtained by performing computations on encrypted data will be the same as the ones done on the original plain text. This new security solution is fully fit for processing and retrieval of encrypted data, effectively leading to the broad applicable project, the security of data transmission, and the storage of data. The work is secured further with additional concepts like probabilistic and time stamp-based encryption processes.


Author(s):  
Addepalli V. N. Krishna ◽  
Balamurugan M.

In the existent system, data is encrypted and stored when passed to the cloud. During any operations on the data, it is decrypted and then the computation is done. This decrypted data is vulnerable and prone to be misused. After the computations are done, the data and the result are encrypted and stored back in the cloud. This creates an overhead to the system as well as increases time complexity. With this chapter, the authors aim to reduce the overhead of the systems to perform repeated encryptions and decryptions. This can be done by allowing the computations to happen directly on the encrypted text. The result obtained by performing computations on encrypted data will be the same as the ones done on the original plain text. This new security solution is fully fit for processing and retrieval of encrypted data, effectively leading to the broad applicable project, the security of data transmission, and the storage of data. The work is secured further with additional concepts like probabilistic and time stamp-based encryption processes.


2020 ◽  
Vol 12 (1) ◽  
pp. 62-66
Author(s):  
Hanun Asrohah ◽  
Milad Khusnu ◽  
Wibowo Teguh ◽  
Rhofita Ika

This research discussed the use of SPA-based mobile applications for academic activities at universities. This technology works using asynchronous JavaScript, which can be run by mobile devices and is not limited by the operating system used by mobile phones such as Android, iOS, and others. This way could be reduced the workload of the server because the data sent by a server is not significant compared with a web-based application.


Author(s):  
J. Arockia Mary ◽  
P. Xavier Jeba ◽  
P. Mercy

In mobile device, the resources such as computation, storage, power are limited. Quality of Experience (QoE) of user in these limited resource mobile device is not satisfied. Mobile cloud computing is a new computation paradigm to increase Quality of Service (QoS) of mobile applications by scheduling the offloaded tasks into the cloud. The scheduling of tasks is done in four architectures of mobile cloud computing. Two types of scheduling are done with lot of constraints such as data transmission, task dependency and cost etc. Different scheduling techniques are developed to improve the QoE of mobile users.


Author(s):  
Addepalli V. N. Krishna ◽  
Balamurugan M.

In the existent system, data is encrypted and stored when passed to the cloud. During any operations on the data, it is decrypted and then the computation is done. This decrypted data is vulnerable and prone to be misused. After the computations are done, the data and the result are encrypted and stored back in the cloud. This creates an overhead to the system as well as increases time complexity. With this chapter, the authors aim to reduce the overhead of the systems to perform repeated encryptions and decryptions. This can be done by allowing the computations to happen directly on the encrypted text. The result obtained by performing computations on encrypted data will be the same as the ones done on the original plain text. This new security solution is fully fit for processing and retrieval of encrypted data, effectively leading to the broad applicable project, the security of data transmission, and the storage of data. The work is secured further with additional concepts like probabilistic and time stamp-based encryption processes.


Ransom ware is the most dangerous malware which locks the entire system data (files/folders) of user and demands ransom form user in order to decrypt data. Ransomware attacks are increasing day by day. Mobile phones are used not only for communication purpose but users also store their personal data and many other things in their mobile phone. 80% to 87% mobile phones are using Android operating system. Attackers have also targeted android smartphones just like personal computers. Due to rapid increase in ransomware we need to develop effective solution. There are different approaches like static, dynamic and hybrid which are used to detect ransomware.


2014 ◽  
Vol 687-691 ◽  
pp. 2764-2767
Author(s):  
Qiang Li ◽  
Kui Yang ◽  
Li Ma

With the popularity of the cloud computing, network technology obtains unprecedented development and revolution. Cloud computing is the direction of cyberspace storage in the computer and internet filed. Big data and multi-dimensional storage and calculation along with the cloud computing. Therefore, internet data security is the key point. For example, based on the cloud environment, the big data transmission and storage requires encryption technology. This article will research the data security of cloud computing, design the service model of data security encryption, and realize data transmission and storage security service of computer and internet cloud environment.


Author(s):  
M. Chaitanya ◽  
K. Durga Charan

Load balancing makes cloud computing greater knowledgeable and could increase client pleasure. At reward cloud computing is among the all most systems which offer garage of expertise in very lowers charge and available all the time over the net. However, it has extra vital hassle like security, load administration and fault tolerance. Load balancing inside the cloud computing surroundings has a large impact at the presentation. The set of regulations relates the sport idea to the load balancing manner to amplify the abilties in the public cloud environment. This textual content pronounces an extended load balance mannequin for the majority cloud concentrated on the cloud segregating proposal with a swap mechanism to select specific strategies for great occasions.


Sign in / Sign up

Export Citation Format

Share Document