A Categorized Multiuser Data Share Environment In A Mobile Cloud Computing Model

G. Subramanyam, T.Naga Raju


With a specific end goal to give protected and secure operation, a hierarchical access control method using modified hierarchical attribute-based encryption (M-HABE) and a changed three-layer structure is proposed in this work. In a particular portable distributed computing model, colossal information which might be from a wide range of cell phones, for example, advanced mobile phones, worked telephones and PDAs and so can be controlled and observed by the framework, and the information can be touchy to unapproved outsider and imperative to legitimate clients also. The novel plan essentially concentrates on the information preparing, putting away and getting to, which is intended to guarantee the clients with lawful experts to get relating grouped information and to limit unlawful clients and unapproved legitimate clients access the information, which makes it extremely appropriate for the mobile cloud computing standards.


N. Fernando, S. W. Loke, and W. Rahayu, “Mobile cloud computing: A survey,” Future Generation Computer Systems, vol. 29, no. 1, pp. 84–106, 2013.

S. Abolfazli, Z. Sanaei, E. Ahmed, A. Gani, and R. Buyya, “Cloud based augmentation for mobile devices: motivation, taxonomies, and open challenges,” Communications Surveys & Tutorials, IEEE, vol. 16, no. 1, pp. 337–368, 2014.

R. Kumar and S. Rajalakshmi, “Mobile cloud computing: Standard approach to protecting and securing of mobile cloud ecosystems,” in Computer Sciences and Applications (CSA), 2013 International Conference on. IEEE, 2013, pp. 663–669.

J. Carolan, S. Gaede, J. Baty, G. Brunette, A. Licht, J. Remmell, L. Tucker, and J. Weise, “Introduction to cloud computing architecture,” White Paper, 1st edn. Sun Micro Systems Inc, 2009.

E. E. Marinelli, “Hyrax: cloud computing on mobile devices using mapreduce,” DTIC Document, Tech. Rep., 2009.

Q. Han, S. Liang, and H. Zhang, “Mobile cloud sensing, big data, and 5g networks make an intelligent and smart world,” Network, IEEE, vol. 29, no. 2, pp. 40–45, 2015.

I. Stojmenovic, “Access control in distributed systems: Merging theory with practice,” in Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. IEEE, 2011, pp. 1–2.

G. Wang, Q. Liu, and J. Wu, “Hierarchical attribute-based encryption for fine-grained access control in cloud storage services,” in Proceedings of the 17th ACM conference on Computer and communications security. ACM, 2010, pp. 735–737.

C. Gentry and A. Silverberg, “Hierarchical id-based cryptography,” in Advances in cryptologyASIACRYPT 2002. Springer, 2002, pp. 548–566.

J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute based encryption,” in Security and Privacy, 2007. SP’07. IEEE Symposium on. IEEE, 2007, pp. 321–334.

A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in cryptology. Springer, 1985, pp. 47–53.

M. Zhou, R. Zhang, W. Xie, W. Qian, and A. Zhou, “Security and privacy in cloud computing: A survey,” in Semantics Knowledge and Grid (SKG), 2010 Sixth International Conference on. IEEE, 2010, pp. 105–112.

B. Grobauer, T. Walloschek, and E. St¨ocker, “Understanding cloud computing vulnerabilities,” Security & privacy, IEEE, vol. 9, no. 2, pp. 50–57, 2011.

S. Ghemawat, H. Gobioff, and S.-T. Leung, “The google file system,” in ACM SIGOPS operating systems review, vol. 37, no. 5. ACM, 2003, pp. 29–43.

M. Zhou, R. Zhang, W. Xie, W. Qian, and A. Zhou, “Security and privacy in cloud computing: A survey,” in Semantics Knowledge and Grid (SKG), 2010 Sixth International Conference on. IEEE, 2010, pp. 105–112.

Full Text: PDF [Full Text]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.