Enhanced Novel Technique for Mobile Cloud To Support Confidentiality and Security

R. Leela, T. Kishore

Abstract


In this work, a hierarchical access control method using a modified hierarchical attribute-based encryption (M-HABE) and a modified three-layer structure is proposed. Varying from the current ideal models, for example, the HABE algorithm and the first three-layer structure, the novel plan principally centres around the information handling, putting away and getting to, which is intended to guarantee the application clients with legitimate access experts to get relating detecting information and to confine restrict illegal and unapproved lawful clients access the information, the proposed promising worldview makes it to a great degree reasonable for the portable distributed computing based worldview. What ought to be underlined is that the most imperative feature of all in the proposed paper can be depicted as that the altered three-layer structure is intended for unravelling the security issues outlined previously.


References


N. Fernando, S. W. Loke, and W. Rahayu, “Mobile cloud computing: A survey,” Future Generation Computer Systems, vol. 29, no. 1, pp. 84–106, 2013.

S. Abolfazli, Z. Sanaei, E. Ahmed, A. Gani, and R. Buyya, “Cloud based augmentation for mobile devices: motivation, taxonomies, and open challenges,” Communications Surveys & Tutorials, IEEE, vol. 16, no. 1, pp. 337–368, 2014.

R. Kumar and S. Rajalakshmi, “Mobile cloud computing: Standard approach to protecting and securing of mobile cloud ecosystems,” in Computer Sciences and Applications (CSA), 2013 International Conference on. IEEE, 2013, pp. 663–669.

J. Carolan, S. Gaede, J. Baty, G. Brunette, A. Licht, J. Remmell, L. Tucker, and J. Weise, “Introduction to cloud computing architecture,” White Paper, 1st edn. Sun Micro Systems Inc, 2009.

E. E. Marinelli, “Hyrax: cloud computing on mobile devices using mapreduce,” DTIC Document, Tech. Rep., 2009.

Q. Han, S. Liang, and H. Zhang, “Mobile cloud sensing, big data, and 5g networks make an intelligent and smart world,” Network, IEEE, vol. 29, no. 2, pp. 40–45, 2015.

I. Stojmenovic, “Access control in distributed systems: Merging theory with practice,” in Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. IEEE, 2011, pp. 1–2.

G. Wang, Q. Liu, and J. Wu, “Hierarchical attribute-based encryption for fine-grained access control in cloud storage services,” in Proceedings of the 17th ACM conference on Computer and communications security. ACM, 2010, pp. 735–737.

C. Gentry and A. Silverberg, “Hierarchical id-based cryptography,” in Advances in cryptologyASIACRYPT 2002. Springer, 2002, pp. 548–566.

J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute based encryption,” in Security and Privacy, 2007. SP’07. IEEE Symposium on. IEEE, 2007, pp. 321–334.

A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in cryptology. Springer, 1985, pp. 47–53.

M. Zhou, R. Zhang, W. Xie, W. Qian, and A. Zhou, “Security and privacy in cloud computing: A survey,” in Semantics Knowledge and Grid (SKG), 2010 Sixth International Conference on. IEEE, 2010, pp. 105–112.

B. Grobauer, T. Walloschek, and E. St¨ocker, “Understanding cloud computing vulnerabilities,” Security & privacy, IEEE, vol. 9, no. 2, pp. 50–57, 2011.

S. Ghemawat, H. Gobioff, and S.-T. Leung, “The google file system,” in ACM SIGOPS operating systems review, vol. 37, no. 5. ACM, 2003, pp. 29–43.

M. Zhou, R. Zhang, W. Xie, W. Qian, and A. Zhou, “Security and privacy in cloud computing: A survey,” in Semantics Knowledge and Grid (SKG), 2010 Sixth International Conference on. IEEE, 2010, pp. 105–112.


Full Text: PDF[Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.