Evolving Cryptographic Approach for Enhancing Security of Resource Constrained Mobile Device Outsourced Data in Cloud Computing

Authors

  • K. Kaviya  MSc. Software Systems, Coimbatore Institute of Technology, Coimbatore, Tamil Nadu, India
  • K. K. Shanthini  MSc. Software Systems, Coimbatore Institute of Technology, Coimbatore, Tamil Nadu, India
  • Dr. M. Sujithra  Assistant Professor, Coimbatore Institute of Technology, Coimbatore, Tamil Nadu, India

DOI:

https://doi.org//10.32628/CSEIT195111

Keywords:

Mobile Cloud Computing, Blowfish, AES, Security, Privacy, Mobile Device.

Abstract

Mobile cloud computing in the increasing popularity among users of mobile device enables to store their data in cloud. Security is the major concern when the sensitive information is stored and transferred across the internet. It is essential to make sure that the data is secured and protected. In this paper, we discussed the problem of privacy of data with reducing the resources usage. Moreover, mobile cloud computing has limitations in resources such as power energy, processor, Memory and storage. Cryptography ensures the confidentiality, authentication, availability, and integrity of the data. This is done through cryptographic algorithms such as Data Encryption Standard (DES), Blowfish and Advanced Encryption Standard (AES). The experimental results evaluated and compared the performance of the encryption algorithms. The performance metrics used are encryption and decryption time, CPU and Memory utilization. Evaluation results showed a significant improvement in reducing the resources, amongst all the techniques, choosing a suitable encryption algorithm based on different parameters that are best fit to the future user requirements is considered.

References

  1. Gurpreet Kaur and Manish Mahajan (2013), Analyzing Data Security for Cloud Computing Using Cryptography Algorithms‖, International Journal of Engineering Research and Application, Vol.-3,782-786.
  2. Sujithra, M., G. Padmavathi, and Sathya Narayanan. Mobile Device Data Security: A Cryptographic Approach by Outsourcing Mobile Data to Cloud. In: Procedia Computer Science 47; 2015.p. 480-485.
  3. Paresh D.Sharma, Prof. Hitesh Gupta(February 2014) An Implementation for Conserving Privacy based on Encryption Process to Secured Cloud Computing Environment‖ IJESRT Sharma, 3(2).
  4. D. S. A. Elminaam, H. M. A. Kader, and M. M. Hadhoud, "Evaluating the performance of symmetric encryption algorithms," International Journal of Computer Theory and Engineering, vol. 10, no. 3, pp. 343-351, 2009.
  5. M. Sujithra, and G. Padmavathi, "Ensuring Security on mobile device data with two phase RSA algorithms over cloud storage", Journal of Theoretical and Applied Information Technology, Vol.80. No.2 ISSN: 1992-8645, October 2015.
  6. HealeyM(2010) Why IT needs to push data sharing efforts. Information Week. Source: http://www.informationweek.com/services/integration/why-it-needs-to-push-data-sharing-effort/225700544. Accessed on Oct 2012
  7. D. Elminaam, H. M. A. Kader, and M. M. Hadhoud, "Performance evaluation of symmetric encryption algorithms," International Journal of Computer Science and Network Security, vol. 8, no. 12, pp. 280-286, 2008.
  8. Shanthni KK., Kaviya K and Sujithra M.2018, A Survey on Cloud Computing: Data Security Challenges and Their DefensiveMechanisms. Int J Recent Sci Res. 9(5), pp. 26497-26500. DOI: http://dx.doi.org/10.24327/ijrsr.2018.0905.2070
  9. D. Salama, A. Minaam, H. M. Abdual-kader, and M. M. Hadhoud, "Evaluating the effects of symmetric cryptography algorithms on power consumption for different data types," International Journal of Network Security, vol. 11, no. 2, pp. 78-87, 2010.
  10. L Krithikashree ; S. Manisha ; M Sujithra," Audit Cloud: Ensuring Data Integrity for Mobile Devices in Cloud Storage",Published in: 2018 9th International conference on Computing, Communication and Networking Technologies (ICCCNT), IEEE , DOI: 10.1109/ICCCNT.2018.8493963

Downloads

Published

2019-01-30

Issue

Section

Research Articles

How to Cite

[1]
K. Kaviya, K. K. Shanthini, Dr. M. Sujithra, " Evolving Cryptographic Approach for Enhancing Security of Resource Constrained Mobile Device Outsourced Data in Cloud Computing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 1, pp.101-106, January-February-2019. Available at doi : https://doi.org/10.32628/CSEIT195111