Evolving Cryptographic Approach for Enhancing Security of Resource Constrained Mobile Device Outsourced Data in Cloud Computing

Authors(3) :-K. Kaviya, K. K. Shanthini, Dr. M. Sujithra

Mobile cloud computing in the increasing popularity among users of mobile device enables to store their data in cloud. Security is the major concern when the sensitive information is stored and transferred across the internet. It is essential to make sure that the data is secured and protected. In this paper, we discussed the problem of privacy of data with reducing the resources usage. Moreover, mobile cloud computing has limitations in resources such as power energy, processor, Memory and storage. Cryptography ensures the confidentiality, authentication, availability, and integrity of the data. This is done through cryptographic algorithms such as Data Encryption Standard (DES), Blowfish and Advanced Encryption Standard (AES). The experimental results evaluated and compared the performance of the encryption algorithms. The performance metrics used are encryption and decryption time, CPU and Memory utilization. Evaluation results showed a significant improvement in reducing the resources, amongst all the techniques, choosing a suitable encryption algorithm based on different parameters that are best fit to the future user requirements is considered.

Authors and Affiliations

K. Kaviya
MSc. Software Systems, Coimbatore Institute of Technology, Coimbatore, Tamil Nadu, India
K. K. Shanthini
MSc. Software Systems, Coimbatore Institute of Technology, Coimbatore, Tamil Nadu, India
Dr. M. Sujithra
Assistant Professor, Coimbatore Institute of Technology, Coimbatore, Tamil Nadu, India

Mobile Cloud Computing, Blowfish, AES, Security, Privacy, Mobile Device.

  1. Gurpreet Kaur and Manish Mahajan (2013), Analyzing Data Security for Cloud Computing Using Cryptography Algorithms?, International Journal of Engineering Research and Application, Vol.-3,782-786.
  2. Sujithra, M., G. Padmavathi, and Sathya Narayanan. Mobile Device Data Security: A Cryptographic Approach by Outsourcing Mobile Data to Cloud. In: Procedia Computer Science 47; 2015.p. 480-485.
  3. Paresh D.Sharma, Prof. Hitesh Gupta(February 2014) An Implementation for Conserving Privacy based on Encryption Process to Secured Cloud Computing Environment? IJESRT Sharma, 3(2).
  4. D. S. A. Elminaam, H. M. A. Kader, and M. M. Hadhoud, "Evaluating the performance of symmetric encryption algorithms," International Journal of Computer Theory and Engineering, vol. 10, no. 3, pp. 343-351, 2009.
  5. M. Sujithra, and G. Padmavathi, "Ensuring Security on mobile device data with two phase RSA algorithms over cloud storage", Journal of Theoretical and Applied Information Technology, Vol.80. No.2 ISSN: 1992-8645, October 2015.
  6. HealeyM(2010) Why IT needs to push data sharing efforts. Information Week. Source: http://www.informationweek.com/services/integration/why-it-needs-to-push-data-sharing-effort/225700544. Accessed on Oct 2012
  7. D. Elminaam, H. M. A. Kader, and M. M. Hadhoud, "Performance evaluation of symmetric encryption algorithms," International Journal of Computer Science and Network Security, vol. 8, no. 12, pp. 280-286, 2008.
  8. Shanthni KK., Kaviya K and Sujithra M.2018, A Survey on Cloud Computing: Data Security Challenges and Their DefensiveMechanisms. Int J Recent Sci Res. 9(5), pp. 26497-26500. DOI: http://dx.doi.org/10.24327/ijrsr.2018.0905.2070
  9. D. Salama, A. Minaam, H. M. Abdual-kader, and M. M. Hadhoud, "Evaluating the effects of symmetric cryptography algorithms on power consumption for different data types," International Journal of Network Security, vol. 11, no. 2, pp. 78-87, 2010.
  10. L Krithikashree ; S. Manisha ; M Sujithra," Audit Cloud: Ensuring Data Integrity for Mobile Devices in Cloud Storage",Published in: 2018 9th International conference on Computing, Communication and Networking Technologies (ICCCNT), IEEE , DOI: 10.1109/ICCCNT.2018.8493963

Publication Details

Published in : Volume 5 | Issue 1 | January-February 2019
Date of Publication : 2019-01-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 101-106
Manuscript Number : CSEIT195111
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

K. Kaviya, K. K. Shanthini, Dr. M. Sujithra, "Evolving Cryptographic Approach for Enhancing Security of Resource Constrained Mobile Device Outsourced Data in Cloud Computing", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 1, pp.101-106, January-February-2019. Available at doi : https://doi.org/10.32628/CSEIT195111
Journal URL : http://ijsrcseit.com/CSEIT195111

Article Preview

Follow Us

Contact Us