Hybrid RSAECC Based Secure Communication in Mobile Cloud Environment

  • S. SridharEmail author
  • S Smys


Mobile computing gained much attention in current research arena due to the enhancement of services such as mobile learning, health care monitoring and e commerce. The experience and satisfaction which increases the user count in millions on every day. Advantage of using cloud computing for essential multipath communication creates path for multi homing architecture and multi path data transmission. While the technology develops the security breaches are also increases due to the increased number of users and loads. System has to be considered as stable and safe only if breaches are reduced. Based on the applications services has to be enhanced with reliability, less faults, and robustness makes end to end communication much better for the future. The proposed research work describes a secure cloud computing mobile environment which provides meritorious service to the users. Experimental results highlights the proposed model has 98.5% of success ratio on providing secure communication services to the users via cloud computing applications.


Cloud security RSA–ECC hybrid model AES algorithm 



  1. 1.
    Win, T. Y., Tianfield, H., & Mair, Q. (2018). Big data based security analytics for protecting virtualized infrastructures in cloud computing. IEEE Transactions on Big Data, 4(1), 11–25.CrossRefGoogle Scholar
  2. 2.
    Chen, J., & Zhu, Q. (2017). Security as a service for cloud-enabled internet of controlled things under advanced persistent threats: A contract design approach. IEEE Transactions on Information Forensics and Security, 12(11), 2736–2750.CrossRefGoogle Scholar
  3. 3.
    Meng, Y., Qin, T., Liu, Y., & He, C. (2018). An effective high threating alarm mining method for cloud security management. IEEE Access, 6(1), 22634–22644.CrossRefGoogle Scholar
  4. 4.
    Shirazi, S. N., Gouglidis, A., Farshad, A., & Hutchison, D. (2017). The extended cloud: Review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE Journal on Selected Areas in Communications, 35(11), 2586–2595.CrossRefGoogle Scholar
  5. 5.
    Gope, P., & Das, A. K. (2017). Robust anonymous mutual authentication scheme for n-times ubiquitous mobile cloud computing services. IEEE Internet of Things Journal, 4(5), 1764–1772.CrossRefGoogle Scholar
  6. 6.
    Li, R., Shen, C., He, H., Gu, X., Xu, Z., & Xu, C.-Z. (2018). A lightweight secure data sharing scheme for mobile cloud computing. IEEE Transactions on Cloud Computing, 6(2), 344–357.CrossRefGoogle Scholar
  7. 7.
    Sajid, A., Abbas, H., & Saleem, K. (2016). Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges. IEEE Access, 4(1), 1375–1384.CrossRefGoogle Scholar
  8. 8.
    Wei, H., Hu, G.-Y., Han, X., Qiao, P., Zhou, Z., Feng, Z.-C., et al. (2018). A new BRB model for cloud security-state prediction based on the large-scale monitoring data. IEEE Access, 6(1), 11907–11920.CrossRefGoogle Scholar
  9. 9.
    Ali, M., Bilal, K., Khan, S. U., Veeravalli, B., Li, K., & Zomaya, A. Y. (2018). DROPS: Division and replication of data in cloud for optimal performance and security. IEEE Transactions on Cloud Computing, 6(2), 303–315.CrossRefGoogle Scholar
  10. 10.
    de Santana, N. A., Lins, F. A. A., & de Sousa, E. T. G. (2016). Performance evaluation of mobile applications in mobile cloud environments. IEEE Latin America Transactions, 14(11), 4597–4602.CrossRefGoogle Scholar
  11. 11.
    Gope, P., & Das, A. K. (2017). Robust anonymous mutual authentication scheme for n-times ubiquitous mobile cloud computing services. IEEE Internet of Things Journal, 4(5), 1764–1772.CrossRefGoogle Scholar
  12. 12.
    Kumar, N., Iqbal, R., Misra, S., Rodrigues, J. J. P. C., & Obaidat, M. S. (2018). Bayesian cooperative coalition game as a service for RFID-based secure QoS management in mobile cloud. IEEE Transactions on Emerging Topics in Computing, 6(1), 58–71.CrossRefGoogle Scholar
  13. 13.
    Li, H., Liu, D., Dai, Y., Luan, T. H., & Yu, S. (2018). Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Transactions on Emerging Topics in Computing, 6(1), 97–109.CrossRefGoogle Scholar
  14. 14.
    Li, J., Huang, L., Zhou, Y., He, S., & Ming, Z. (2018). Computation partitioning for mobile cloud computing in a big data environment. IEEE Transactions on Industrial Informatics, 13(4), 2009–2018.CrossRefGoogle Scholar
  15. 15.
    Shabir, M. Y., Iqbal, A., Mahmood, Z., & Ghafoor, A. (2016). Analysis of classical encryption techniques in cloud computing. Tsinghua Science and Technology, 21(1), 102–113.CrossRefGoogle Scholar
  16. 16.
    Xi, K., Tang, Y., & Hu, J. (2011). Correlation keystroke verification scheme for user access control in cloud computing environment. The Computer Journal, 54(10), 1632–1644.CrossRefGoogle Scholar
  17. 17.
    Chillotti, I., Gama, N., Georgieva, M., Izabachne, M. (2016). Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds. In ASIACRYPT 2016 (vol. 10031, pp. 3–33). LNCS, Springer.Google Scholar
  18. 18.
    Jiang, Q., Ma, J., & Wei, F. (2018). On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal, 12(2), 2039–2042.CrossRefGoogle Scholar
  19. 19.
    Kulshreshtha, V., Verma, S., Rama, C., & Challa, K. (2014). A comprehensive evaluation of cryptographic algorithms in cloud computing. IEEE Institute of Electrical and Electronics Engineers, 1, 1.Google Scholar
  20. 20.
    El Makkaoui, K., Ezzati, A., & Cloud-RSA, Beni-Hssane A. (2017). An enhanced homomorphic encryption scheme. Europe and MENA cooperation advances in information and communication technologies (Vol. 1, pp. 471–480). Berlin: Springer.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Alpha College of EngineeringChennaiIndia
  2. 2.RVS Technical campusCoimbatoreIndia

Personalised recommendations