Designing a trivial information relaying scheme for assuring safety in mobile cloud computing environment
- 2 Downloads
Due to increased attraction in cloud computing, mobile devices could store or acquire private and confidential information from everywhere at any point in time. In parallel, the information safety issues over mobile computing become rigorous and retard increased advancements in the mobile cloud. Crucial analysis were performed to enhance the safety in cloud computing. Most of them are not appropriate for mobile cloud computing due to limited energy resource, thus mobile devices are unable to perform assessments and complex tasks. The crucial requirement of mobile cloud application is to provide solution with minimum computational overhead. Thus the aim of the research is to design a trivial information relaying scheme (TIRS) for mobile cloud computing. The proposed scheme implements Ciphertext Policy Attribute-based Encryption (CP-ABE) to alter the general framework of access governance hierarchy to make it appropriate for mobile cloud environment. The TIRS displaces immense segments of the assessment concentrated access governance hierarchy modifications in CP-ABE from smart devices to the peripheral proxy servers. Furthermore, TIRS initiates element portrayal field to plan indolent cancellation which is a thriving dispute for CP-ABE system. The experimental analysis depicts that TIRS successfully minimize the overheads during user relaying information over the mobile cloud environment.
KeywordsMobile cloud Ciphertext policy-attribute based encryption Trivial information relaying scheme Energy Computational overheads Proxy servers
- 3.Bagiwa, I. L., Ghani, I., Younas, M., & Bello, M. (2016). Systematic literature review on cloud adoption. International Journal of Internet, Broadcasting and Communication, 8(2), 1–22.Google Scholar
- 5.Benítez-Guerrero, E., Arabnia, H. R., Hashemi, R. R., Vert, G., Chen-namaneni, A., & Solo, A. M. G. (2010). Context-aware mobile information systems: Data management issues and opportunities. In IKE (pp. 127–133).Google Scholar
- 7.Ravi, L., Subramaniyaswamy, V., Devarajan, M., Ravichandran, K. S., Arunkumar, S., Indragandhi, V., et al. (2019). SECRECSY: A secure framework for enhanced privacy-preserving location recommendations in cloud environment. Wireless Personal Communications. https://doi.org/10.1007/s11277-019-06500-0.Google Scholar
- 11.Nafea, I., & Younas, M. (2014). Improving the performance and reliability of mobile commerce in developing countries. In International conference on mobile web and information systems (pp. 114–125). Cham: Springer.Google Scholar
- 15.Grønli, T. M., Ghinea, G., Younas, M., & Hansen, J. (2015). Automatic configuration of mobile applications using context-aware cloud-based services. In F. Xhafa, L. Barolli, A. Barolli, & P. Papajorgji (Eds.), Modeling and processing for next-generation big-data technologies (pp. 367–383). Cham: Springer.CrossRefGoogle Scholar
- 18.Geeta, C. M., Raghavendra, S., Buyya, R., & Venugopal, K. R. (2018). Data auditing and security in cloud computing: Issues, challenges and future directions. International Journal of Computer, 28(1), 8–57.Google Scholar
- 19.Bandal, P., Dhane, A., Chavan, S., & Nikam, N. (2018). Key exchange privacy preserving technique in cloud computing. International Research Journal of Engineering and Technology, 5(3), 3113–3117.Google Scholar
- 20.Farràs, O., Ribes-González, J., & Ricci, S. (2018). Privacy-preserving data splitting: A combinatorial approach. arXiv preprint arXiv:1801.05974.
- 24.Chaudhary, S., & Joshi, N. K. (2018). Secured blended approach for cryptographic algorithm in cloud computing. International Journal of Pure and Applied Mathematics, 118(20), 297–304.Google Scholar
- 25.Liu, G., Yang, G., Wang, H., Dai, H., & Zhou, Q. (2018). QSDB: An encrypted database model for privacy-preserving in cloud computing. KSII Transactions on Internet & Information Systems, 12(7), 3375–3400.Google Scholar
- 27.Thillaiarasu, N., Pandian, S. C., Balaji, G. N., Shierly, R. B., Divya, A., & Prabha, G. D. (2018). Enforcing confidentiality and authentication over public cloud using hybrid cryptosystems. In International conference on intelligent data communication technologies and internet of things (pp. 1495–1503). Cham: Springer.Google Scholar
- 29.Alshikhsaleh, M., & Zohdy, M. (2018). Privacy-preserving multi keyword search in cloud computing. International Journal of Advancements, Research, Innovations in Information Technology, 4(2), 1079–1084.Google Scholar