IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 9 - Issue 2, February 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Security Of Data In Mobile Cloud Computing And Its Significance

[Full Text]

 

AUTHOR(S)

Hanamantraya, Dr.A.C.Subhajini

 

KEYWORDS

Cloud Security, LECCSAM, Mobile cloud computing, SMC

 

ABSTRACT

MCC is one of the promising advancements for changing the world that gives pooled cloud assets toward unlimited capacity, utility and versatility to serve different mobile gadgets through Ethernet or Internet whenever and place in heterogeneous environments. So as to have top to bottom comprehension of MCC, one ought to have clear comprehension of cloud computing and its services. The fundamental objective of this work was to propose a security structure so as to verify the client’s private information utilized by a segment based mobile cloud application. The security system proposed is called Secure Mobile-Cloud (SMC) and its functionalities are: To allow the clients to pick the security level they need to apply to their information. To adjust the security level and accordingly the security services to the client prerequisites. To adjust the security services connected to the mobile gadget vitality utilization.

 

REFERENCES

[1] AppBrain. (2014). Number of Android applications. Available: http://www.appbrain.com/stats/number-of-android-apps
[2] B. Chor, A. Fiat, and M. Naor, “Tracing traitors,” in CRYPTO‟94. London, UK: Springer-Verlag, 1994, pp. 257–270.
[3] B. Waters, “Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization”, http://eprint.iacr.org/2008/290.
[4] C. Lynch and F. O. Reilly, “Processor choice for wireless sensor networks,” in REALWSN„05: Workshop on Real-World Wireless Sensor Networks, 2005, pp. 1–5.
[5] D. Boneh, X. Boyen, and H. Shacham, “Short group signatures,” in CRYPTO‟04. LNCS 3152, 2004, pp. 41–55.
[6] D. Crockford. (2014). Introducing JSON. Available: http://json.org/
[7] Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS’09, Chicago, pp. 235–245. ACM, New York (2009). doi:10.1145/1653662.1653691
[8] F. Bao, R. H. Deng, X. Ding, and Y. Yang. Private query on encrypted data in multi-user settings. In ISPEC‟08, pages 71–85, Berlin, Heidelberg, 2008. Springer- Verlag.
[9] Gartner. (April 2013). Gartner Says By 2016, 40 Percent of Mobile Application Development Projects Will Leverage Cloud Mobile Back-End Services. Available: http://www.gartner.com/newsroom/id/2463615
[10] Google App Engine, Online at http://code.google.com/appengine/.
[11] H. Harney, A. Colgrove, and P. D. McDaniel, “Principles of policy in secure groups,” in Proc. of NDSS‟01, 2001.
[12] H. Lin, Z. Cao, X. Liang and J. Shao. “Secure threshold multi authority attribute based encryption without a central authority”, In Proc. of INDOCRYPT‟ 08 , Kharagpur, India, 2008.
[13] Juniper Research, “Mobile Cloud Applications & Services: Monetising Enterprise & Consumer Markets 2009-2014,” Juniper Research, Tech. Rep., 2010.
[14] K. Sangani, "Rolling out the mobile future," Engineering & Technology, vol. 7, pp. 80-81, 2012.
[15] L. Ballard, M. Green, B. Medeiros, F. Monrose. “Correlation-Resistant Storage via Keyword-Searchable Encryption”. http://eprint.iacr.org/2005/417