Back to Search Start Over

A novel method for mobile cloud computing security system.

Authors :
Naveen, P. V.
Kalaiselvi, K.
Source :
AIP Conference Proceedings. 5/19/2022, Vol. 2393 Issue 1, p1-7. 7p.
Publication Year :
2022

Abstract

In the recent era, usage of mobile device is increasing rapidly. People are enjoying the services provided in the mobile device and mobile applications. Cloud services can incredibly upgrade the computing capability of portable gadgets so the mobile applications are depending on the cloud to provide the operation like machine learning algorithms of data mining, big data, multimedia and ad hoc network. There are many issues and challenges while providing mobile services such as security and protection are major concern to give more attention. The perspective of this article is to explore the difficulties in mobile computing architectures and to evaluate the applicability of current security systems and to achieve solution toward it. There are three phases as the new architectural data service mechanism is proposed in the first phase. Time and Identity based proxy re-encryption with all or nothing transform scheme (TIB-PRE-AONT) efficiently achieved both of the secrecy and access control of data, secondly Cipher text policy attribute based encryption (CP-ABE) access control scheme is used and implement with k medoid clustering algorithm. Thirdis an Efficient and Optimal Fixed-Length Ciphertext-Policy Attribute-Based Encryption used for security with fuzzy clustering based Data Encryption Strategy for Big Data in Mobile Cloud Computing as a scheme, which used Whale Optimization Algorithm (BS-WOA) is used for the security key. The efficiency of the proposed methods proved from the comparison analysis results. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
0094243X
Volume :
2393
Issue :
1
Database :
Academic Search Index
Journal :
AIP Conference Proceedings
Publication Type :
Conference
Accession number :
157003292
Full Text :
https://doi.org/10.1063/5.0075132