全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

Data Security of Mobile Cloud Computing on Cloud Server

DOI: 10.4236/oalib.1102377, PP. 1-11

Subject Areas: Mobile Computing Systems, Information and Communication: Security, Privacy, and Trust, Cloud Computing

Keywords: Amazon Cloud Server, Cloud Computing, Security, Data Security, AES Encryption, Eclipse IDE, JSON API

Full-Text   Cite this paper   Add to My Lib

Abstract

Mobile Cloud computing is a technology of delivering services, such as software, hardware (virtual as well) and bandwidth over the Internet. Mobile devices are enabled in order to explore, especially Smart phones. The mobile cloud computing technology is growing rapidly among the customers and many companies such as Apple, Google, Facebook and Amazon with rich users. Users can access their data at any time, at any place, even with any device including mobile devices by using the cloud storage services, although these properties offer flexibility and scalability in controlling data, however, at the same time it reminds us with new security threats. These security issues can be resolved by proper handling of data. The cloud server provider can secure the data by applying the encryption and decryption techniques while storing the data over the cloud. In this paper, we proposed some encryption and decryption methods for securing the data over the cloud so that an unauthorized person or machine cannot access the confidential data owing to encrypted form.

Cite this paper

Waseem, M. , Lakhan, A. and Jamali, I. A. (2016). Data Security of Mobile Cloud Computing on Cloud Server. Open Access Library Journal, 3, e2377. doi: http://dx.doi.org/10.4236/oalib.1102377.

References

[1]  Abrishami, S. and Naghibzadeha, M. (2012) Deadline-Constrained Workflow Scheduling Algorithms for Infrastructure as a Service Clouds.
[2]  Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I. and Zaharia, M. (2013) Above the Clouds: A Berkeley View of Mobile Cloud Computing. Technical Report, EECS Department University of California, Berkeley.
http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html
[3]  http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf
[4]  John, R. (2005) DoD Directive 3020.40, Mobile Cloud Computing Defense Critical Infrastructure Program. 19 Aug, p. 13.
http://www.dtic.mil/whs/directives/corres/pdf/302040p.pdf
[5]  Ouyang, X.Z. (2011) Cloud Computing in Mobile Communication Networks. Emerging Technologies of Future Multimedia Coding, Analysis and Transmission, No.1.
http://wwwen.zte.com.cn/endata/magazine/ztecommunications/2011
Year/no3/articles/201110/t20111029_260205.html

[6]  Li, X.P., Qian, L.H. and Yang, J. (2015) Workflow Scheduling with Deadline and Time Slots Constraints in Mobile Cloud Computing. IEEE 19th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Calabria, 6-8 May 2015, 606-613.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7231027
[7]  (2011) Adrian Otto’s Blog. What Is a Cloud Platform?
http://adrianotto.com/2011/02/cloud-platform/
[8]  Pooja, N.D. and Ramteke, P.L. (2013) Mobile Cloud Computing. International Journal of Science and Research.
[9]  Hampton, T.J. (2011) A Quick Guide to Cloud Terminology. 11 August.
http://www.thehostingnews.com/a-quick-guide-to-cloud-terminology.html
[10]  Lakhan, A. (2015) Security and Data Privacy Using Mobile Cloud Computing.
[11]  Rahman, M. and Hassan, R. (2015) Adaptive Workflow Scheduling for Dynamic Grid and Cloud Computing Environment.
[12]  Singh, R. (2015) Workflow Scheduling in Cloud Computing Using Spot Instance.
[13]  Kaur, N. (2015) Comparison of Workflow Scheduling Algorithms in Cloud Computing.
[14]  Kaur, A. (2015) A Review of Workflow Scheduling in Cloud Computing Environment.
[15]  Singh, L. and Singh, S. (2015) A Survey of Workflow Scheduling Algorithms and Research Issues.
[16]  Lakhan, A. and Hussain, F. (2015) Data Security and Privacy for Cross Platform Using Mobile Cloud Computing.
[17]  Lakhan, A.A. (2015) Integration of Dual Data Security Algorithm for Mobile Private Cloud Computing.

Full-Text


comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413