Multimedia Data Encryption Technique for Mobile Cloud Computing
Keywords:
Cloud Computing, Mobile Cloud Computing, Mobile Device, Security, Encryption, Decryption, Key Management.Abstract
Mobile devices and its applications make a new era for storing important data with in mobile device as well as on a cloud; it can be easily to share data, with others. Mobile Cloud computing paradigm is being used because of its low up-front cost. In recent years, even personal computer user, mobile phone users are storing their data at Cloud. Most of the mobile user stored there important information into their personal Mobile Devices. The securities of such a system against potential intruders as well as cloud service provider are the major target for most of the attackers. There is threat to the data in transit and data at cloud due to different possible attacks. By designing a provision which help to those mobile user to secure their data at transit as well as stored at locally on the same device by using Cryptography Encryption Technique, which helps to Store and Backup their personal data in secure Encrypted form with the help of Mobile Cloud Computing Mechanism.
References
- Amit Banerjee, Mahamudul Hasan, Md. Auhidur Rahman, and Rajesh Chapagain, “CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing”, IEEE Access, Volume: 5, Pages: 17678-17691, Year: 2017.
- Z. Sanaei, S. Abolfazli, A. Gani, and R. Buyya, “Heterogeneity in mobile cloud computing: Taxonomy and open challenges”, IEEE Communication surveys, Volume: 16, Issue: 1, Pages: 369-392, Year: 2014.
- H. T. Dinh, C. Lee, D. Niyato, and P. Wang, “A survey of mobile cloud computing: architecture, applications, and approaches”, Wireless Communication and Mobile Computer, Volume: 13, Issue: 18, Pages: 1587-1611, Year: 2013.
- Amar.R.Buchade, Rajesh Ingle, “Key Management for Cloud Data Storage: Methods and Comparisons” 2014 Fourth International Conference on Advanced Computing Communication Technologies, Pages: 263 - 270, Cited by: Papers (2), Year: 2014.
- U. T. Mattsson, “A practical implementation of transparent encryption and Separation of duties in enterprise databases: Protection against external and Internal attacks on databases,” in Proc. 7th IEEE Int. Conf. E-Commerce Technol. (CEC), Pages: 559-565, Year: Jul. 2005.
- C. Wang, G. Wang, Y. Sun, and W. Chen, “ARM realization of storage device encryption based on chaos and AES algorithm,” in Proc. 4th Int. Workshop Chaos-Fractals Theory. Appl. (IWCFTA), Pages: 183-187, Year: 2011.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.