Applying Different Cryptographic Algorithms for Mobile Cloud Computing

  • Sung-Min JungEmail author
  • Nam-Uk Kim
  • Seung-Hyun Lee
  • Dong-Young Lee
  • Tai-Myoung Chung
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 274)


Cloud computing is new paradigm to use computing resources that are delivered as services over a network. It optimizes the usage of IT resources such as CPU, storage, and network. Many services related of cloud computing are popular to end users and it is becoming more important these days. There are many smart phones, smart pads and other mobile devices and end users can access to cloud computing environment through these mobile devices. Thus, they can use powerful computing resources on their physical devices. This environment indicates mobile cloud computing in this paper. There are two devices such as a physical device in real world and a virtual device in cloud computing environment. Service providers should use strong cryptographic algorithms to guarantee secure communication between a physical device and a virtual device. However, the strong cryptographic algorithms waste time to process each tasks and it causes network congestion. The network congestion occurs when a physical device is processing too many data packets. Also, it cannot be guaranteed its network quality of service. We need to consider the network quality of service to avoid this congestion. We should try to reduce the execution time to guarantee quality of service. We propose suitable method that the cryptographic algorithms with different key lengths at various environment.


Cloud computing QoS management Cryptographic algorithm 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Montero, R.S., Llorente, I.M., Foster, I.: Virtual Infrastructure Management in Private and Hybrid Clouds. IEEE Internet Computing 13(5), 14–22 (2009)CrossRefGoogle Scholar
  2. 2.
    Buyya, M.R., Pandey, S., Vecchiola, C.: Cloudbus toolkit for market-oriented cloud computing. In: Proceedings 1st International Conference on Cloud Computing (CloudCom 2009), pp. 3–27 (2009)Google Scholar
  3. 3.
    Appisty Inc.: Cloud Platforms vs. Cloud Infrastructure, White Paper (2009)Google Scholar
  4. 4.
    Kim, N.-U., Eom, J.-H., Kim, S.-H., Chung, T.-M.: The Architecture of User-end Client for Mobile Clout Service. In: Lee, G., Howard, D., Ślęzak, D., Hong, Y.S. (eds.) ICHIT 2012. CCIS, vol. 310, pp. 699–706. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  5. 5.
    Kim, T.K., Lim, H.J., Chung, T.M.: Service Negotiation Model for response Time in Distributes Networks. Computing and Informatics, 395–405 (2004)Google Scholar
  6. 6.
    Grobauer, B., Walloschek, T., Stocker, E.: Understanding Cloud Computing Vulnerabilities. IEEE Security & Privacy 9(2), 50–57 (2011)CrossRefGoogle Scholar
  7. 7.
    Kang, K.D., Son, S.H.: Dynamic Security and QoS Adaptation in Real-Time Embedded Systems. In: 26th IEEE Real-Time Systems Symposium, WIP Session, Miami, Florida (2005)Google Scholar
  8. 8.
    Kumar, K., Lu, Y.-H.: Yung-Hsiang Lu: Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? Computer 43(4), 51–56 (2010)CrossRefGoogle Scholar
  9. 9.
    Simoens, P., De Turck, F., Dhoedt, B., Demeester, P.: Remote Display Solutions for Mobile Cloud Computing. Computer 44(8), 46–53 (2011)CrossRefGoogle Scholar
  10. 10.
    Zhang, P., Yan, Z.: A QoS-aware system for mobile cloud computing. In: 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), pp. 15–17 (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Sung-Min Jung
    • 1
    Email author
  • Nam-Uk Kim
    • 1
  • Seung-Hyun Lee
    • 1
  • Dong-Young Lee
    • 2
  • Tai-Myoung Chung
    • 1
  1. 1.Dept. of Electrical and Computer EngineeringSungkyunkwan UniversityGyeonggi-doKorea
  2. 2.Dept. of Information and CommunicationMyongji CollegeSeoulKorea

Personalised recommendations