Skip to main content
Log in

Hybrid RSAECC Based Secure Communication in Mobile Cloud Environment

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Mobile computing gained much attention in current research arena due to the enhancement of services such as mobile learning, health care monitoring and e commerce. The experience and satisfaction which increases the user count in millions on every day. Advantage of using cloud computing for essential multipath communication creates path for multi homing architecture and multi path data transmission. While the technology develops the security breaches are also increases due to the increased number of users and loads. System has to be considered as stable and safe only if breaches are reduced. Based on the applications services has to be enhanced with reliability, less faults, and robustness makes end to end communication much better for the future. The proposed research work describes a secure cloud computing mobile environment which provides meritorious service to the users. Experimental results highlights the proposed model has 98.5% of success ratio on providing secure communication services to the users via cloud computing applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

[Source: Gartner CIO Survey]

Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Win, T. Y., Tianfield, H., & Mair, Q. (2018). Big data based security analytics for protecting virtualized infrastructures in cloud computing. IEEE Transactions on Big Data,4(1), 11–25.

    Article  Google Scholar 

  2. Chen, J., & Zhu, Q. (2017). Security as a service for cloud-enabled internet of controlled things under advanced persistent threats: A contract design approach. IEEE Transactions on Information Forensics and Security,12(11), 2736–2750.

    Article  Google Scholar 

  3. Meng, Y., Qin, T., Liu, Y., & He, C. (2018). An effective high threating alarm mining method for cloud security management. IEEE Access,6(1), 22634–22644.

    Article  Google Scholar 

  4. Shirazi, S. N., Gouglidis, A., Farshad, A., & Hutchison, D. (2017). The extended cloud: Review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE Journal on Selected Areas in Communications,35(11), 2586–2595.

    Article  Google Scholar 

  5. Gope, P., & Das, A. K. (2017). Robust anonymous mutual authentication scheme for n-times ubiquitous mobile cloud computing services. IEEE Internet of Things Journal,4(5), 1764–1772.

    Article  Google Scholar 

  6. Li, R., Shen, C., He, H., Gu, X., Xu, Z., & Xu, C.-Z. (2018). A lightweight secure data sharing scheme for mobile cloud computing. IEEE Transactions on Cloud Computing,6(2), 344–357.

    Article  Google Scholar 

  7. Sajid, A., Abbas, H., & Saleem, K. (2016). Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges. IEEE Access,4(1), 1375–1384.

    Article  Google Scholar 

  8. Wei, H., Hu, G.-Y., Han, X., Qiao, P., Zhou, Z., Feng, Z.-C., et al. (2018). A new BRB model for cloud security-state prediction based on the large-scale monitoring data. IEEE Access,6(1), 11907–11920.

    Article  Google Scholar 

  9. Ali, M., Bilal, K., Khan, S. U., Veeravalli, B., Li, K., & Zomaya, A. Y. (2018). DROPS: Division and replication of data in cloud for optimal performance and security. IEEE Transactions on Cloud Computing,6(2), 303–315.

    Article  Google Scholar 

  10. de Santana, N. A., Lins, F. A. A., & de Sousa, E. T. G. (2016). Performance evaluation of mobile applications in mobile cloud environments. IEEE Latin America Transactions,14(11), 4597–4602.

    Article  Google Scholar 

  11. Gope, P., & Das, A. K. (2017). Robust anonymous mutual authentication scheme for n-times ubiquitous mobile cloud computing services. IEEE Internet of Things Journal,4(5), 1764–1772.

    Article  Google Scholar 

  12. Kumar, N., Iqbal, R., Misra, S., Rodrigues, J. J. P. C., & Obaidat, M. S. (2018). Bayesian cooperative coalition game as a service for RFID-based secure QoS management in mobile cloud. IEEE Transactions on Emerging Topics in Computing,6(1), 58–71.

    Article  Google Scholar 

  13. Li, H., Liu, D., Dai, Y., Luan, T. H., & Yu, S. (2018). Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Transactions on Emerging Topics in Computing,6(1), 97–109.

    Article  Google Scholar 

  14. Li, J., Huang, L., Zhou, Y., He, S., & Ming, Z. (2018). Computation partitioning for mobile cloud computing in a big data environment. IEEE Transactions on Industrial Informatics,13(4), 2009–2018.

    Article  Google Scholar 

  15. Shabir, M. Y., Iqbal, A., Mahmood, Z., & Ghafoor, A. (2016). Analysis of classical encryption techniques in cloud computing. Tsinghua Science and Technology,21(1), 102–113.

    Article  Google Scholar 

  16. Xi, K., Tang, Y., & Hu, J. (2011). Correlation keystroke verification scheme for user access control in cloud computing environment. The Computer Journal,54(10), 1632–1644.

    Article  Google Scholar 

  17. Chillotti, I., Gama, N., Georgieva, M., Izabachne, M. (2016). Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds. In ASIACRYPT 2016 (vol. 10031, pp. 3–33). LNCS, Springer.

  18. Jiang, Q., Ma, J., & Wei, F. (2018). On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal,12(2), 2039–2042.

    Article  Google Scholar 

  19. Kulshreshtha, V., Verma, S., Rama, C., & Challa, K. (2014). A comprehensive evaluation of cryptographic algorithms in cloud computing. IEEE Institute of Electrical and Electronics Engineers,1, 1.

    Google Scholar 

  20. El Makkaoui, K., Ezzati, A., & Cloud-RSA, Beni-Hssane A. (2017). An enhanced homomorphic encryption scheme. Europe and MENA cooperation advances in information and communication technologies (Vol. 1, pp. 471–480). Berlin: Springer.

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Sridhar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sridhar, S., Smys, S. Hybrid RSAECC Based Secure Communication in Mobile Cloud Environment. Wireless Pers Commun 111, 429–442 (2020). https://doi.org/10.1007/s11277-019-06867-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06867-0

Keywords

Navigation