Multimedia Data Encryption Technique for Mobile Cloud Computing

Authors

  • Rishabh Shende  PG Scholar, Department of Computer Engineering, Pune Institute of Computer Technology, Pune, Maharashtra, India
  • Dr. R. B. Ingle  Professor, Department of Computer Engineering, Pune Institute of Computer Technology, Pune, Maharashtra, India

Keywords:

Cloud Computing, Mobile Cloud Computing, Mobile Device, Security, Encryption, Decryption, Key Management.

Abstract

Mobile devices and its applications make a new era for storing important data with in mobile device as well as on a cloud; it can be easily to share data, with others. Mobile Cloud computing paradigm is being used because of its low up-front cost. In recent years, even personal computer user, mobile phone users are storing their data at Cloud. Most of the mobile user stored there important information into their personal Mobile Devices. The securities of such a system against potential intruders as well as cloud service provider are the major target for most of the attackers. There is threat to the data in transit and data at cloud due to different possible attacks. By designing a provision which help to those mobile user to secure their data at transit as well as stored at locally on the same device by using Cryptography Encryption Technique, which helps to Store and Backup their personal data in secure Encrypted form with the help of Mobile Cloud Computing Mechanism.

References

  1. Amit Banerjee, Mahamudul Hasan, Md. Auhidur Rahman, and Rajesh Chapagain, “CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing”, IEEE Access, Volume: 5, Pages: 17678-17691, Year: 2017.
  2. Z. Sanaei, S. Abolfazli, A. Gani, and R. Buyya, “Heterogeneity in mobile cloud computing: Taxonomy and open challenges”, IEEE Communication surveys, Volume: 16, Issue: 1, Pages: 369-392, Year: 2014.
  3. H. T. Dinh, C. Lee, D. Niyato, and P. Wang, “A survey of mobile cloud computing: architecture, applications, and approaches”, Wireless Communication and Mobile Computer, Volume: 13, Issue: 18, Pages: 1587-1611, Year: 2013.
  4. Amar.R.Buchade, Rajesh Ingle, “Key Management for Cloud Data Storage: Methods and Comparisons” 2014 Fourth International Conference on Advanced Computing Communication Technologies, Pages: 263 - 270, Cited by: Papers (2), Year: 2014.
  5. U. T. Mattsson, “A practical implementation of transparent encryption and Separation of duties in enterprise databases: Protection against external and Internal attacks on databases,” in Proc. 7th IEEE Int. Conf. E-Commerce Technol. (CEC), Pages: 559-565, Year: Jul. 2005.
  6. C. Wang, G. Wang, Y. Sun, and W. Chen, “ARM realization of storage device encryption based on chaos and AES algorithm,” in Proc. 4th Int. Workshop Chaos-Fractals Theory. Appl. (IWCFTA), Pages: 183-187, Year: 2011.

Downloads

Published

2019-12-30

Issue

Section

Research Articles

How to Cite

[1]
Rishabh Shende, Dr. R. B. Ingle, " Multimedia Data Encryption Technique for Mobile Cloud Computing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 6, pp.42-47, November-December-2019.