SlideShare a Scribd company logo
Enviar búsqueda
Cargar
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Denunciar
Compartir
IRJET Journal
Fast Track Publications
Seguir
•
1 recomendación
•
49 vistas
Ingeniería
https://www.irjet.net/archives/V4/i11/IRJET-V4I1147.pdf
Leer más
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
•
1 recomendación
•
49 vistas
IRJET Journal
Fast Track Publications
Seguir
Denunciar
Compartir
Ingeniería
https://www.irjet.net/archives/V4/i11/IRJET-V4I1147.pdf
Leer más
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
1 de 3
Descargar ahora
Recomendados
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i... por
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
103 vistas
•
4 diapositivas
Data Search in Cloud using the Encrypted Keywords por
Data Search in Cloud using the Encrypted Keywords
IRJET Journal
34 vistas
•
4 diapositivas
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing por
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
59 vistas
•
3 diapositivas
H1803035056 por
H1803035056
IOSR Journals
149 vistas
•
7 diapositivas
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud por
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal
64 vistas
•
4 diapositivas
Survey on Data Security with Time Constraint in Clouds por
Survey on Data Security with Time Constraint in Clouds
IRJET Journal
24 vistas
•
4 diapositivas
Más contenido relacionado
La actualidad más candente
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage por
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal
30 vistas
•
3 diapositivas
Accessing secured data in cloud computing environment por
Accessing secured data in cloud computing environment
IJNSA Journal
348 vistas
•
10 diapositivas
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and... por
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
21 vistas
•
3 diapositivas
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ... por
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
35 vistas
•
9 diapositivas
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl... por
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
1crore projects
120 vistas
•
14 diapositivas
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ... por
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
10 vistas
•
22 diapositivas
La actualidad más candente
(20)
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage por IRJET Journal
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal
•
30 vistas
Accessing secured data in cloud computing environment por IJNSA Journal
Accessing secured data in cloud computing environment
IJNSA Journal
•
348 vistas
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and... por IRJET Journal
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
•
21 vistas
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ... por IRJET Journal
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
•
35 vistas
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl... por 1crore projects
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
1crore projects
•
120 vistas
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ... por IRJET Journal
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
•
10 vistas
G017424448 por IOSR Journals
G017424448
IOSR Journals
•
416 vistas
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ... por IJSRED
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IJSRED
•
151 vistas
Secure Medical Data Computation using Virtual_ID Authentication and File Swap... por IJASRD Journal
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
IJASRD Journal
•
41 vistas
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M... por IRJET Journal
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
•
298 vistas
A Novel privacy preserving public auditing for shared data in cloud por JAVVAJI VENKATA RAO
A Novel privacy preserving public auditing for shared data in cloud
JAVVAJI VENKATA RAO
•
1.2K vistas
Location Based Encryption-Decryption Approach for Data Security por Editor IJCATR
Location Based Encryption-Decryption Approach for Data Security
Editor IJCATR
•
577 vistas
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)... por dbpublications
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications
•
57 vistas
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU... por Migrant Systems
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems
•
1.5K vistas
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud por IRJET Journal
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
•
18 vistas
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr... por IRJET Journal
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal
•
11 vistas
3 ijece 1 ed iqbal qc por IAESIJEECS
3 ijece 1 ed iqbal qc
IAESIJEECS
•
26 vistas
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography por IRJET Journal
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET Journal
•
171 vistas
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage por IRJET Journal
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET Journal
•
71 vistas
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud por IRJET Journal
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
IRJET Journal
•
28 vistas
Similar a Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Efficient and Empiric Keyword Search Using Cloud por
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
0 vistas
•
5 diapositivas
Secure Data Sharing In an Untrusted Cloud por
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
294 vistas
•
6 diapositivas
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co... por
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET Journal
130 vistas
•
4 diapositivas
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN... por
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
67 vistas
•
15 diapositivas
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri... por
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
35 vistas
•
6 diapositivas
IRJET- Secure Cloud Data Using Attribute Based Encryption por
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
20 vistas
•
5 diapositivas
Similar a Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
(20)
Efficient and Empiric Keyword Search Using Cloud por IRJET Journal
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
•
0 vistas
Secure Data Sharing In an Untrusted Cloud por IJERA Editor
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
•
294 vistas
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co... por IRJET Journal
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET Journal
•
130 vistas
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN... por cscpconf
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
•
67 vistas
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri... por IRJET Journal
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
•
35 vistas
IRJET- Secure Cloud Data Using Attribute Based Encryption por IRJET Journal
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
•
20 vistas
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C... por IRJET Journal
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
•
31 vistas
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC por IRJET Journal
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
•
36 vistas
C017421624 por IOSR Journals
C017421624
IOSR Journals
•
137 vistas
International Journal of Computational Engineering Research(IJCER) por ijceronline
International Journal of Computational Engineering Research(IJCER)
ijceronline
•
275 vistas
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage por IJERA Editor
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IJERA Editor
•
22 vistas
IRJET-Auditing and Resisting Key Exposure on Cloud Storage por IRJET Journal
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal
•
31 vistas
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr... por IRJET Journal
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET Journal
•
62 vistas
IRJET- Securing Cloud Data Under Key Exposure por IRJET Journal
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
•
203 vistas
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham por IRJET Journal
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
•
3 vistas
IRJET- Secure Data Protection in Cloud Computing por IRJET Journal
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
•
12 vistas
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage por IRJET Journal
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal
•
21 vistas
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing por ijtsrd
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
ijtsrd
•
45 vistas
Improving Efficiency of Security in Multi-Cloud por IJTET Journal
Improving Efficiency of Security in Multi-Cloud
IJTET Journal
•
317 vistas
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur... por ijsrd.com
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
•
162 vistas
Más de IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL por
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
20 vistas
•
7 diapositivas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
8 vistas
•
7 diapositivas
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
7 vistas
•
5 diapositivas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
13 vistas
•
11 diapositivas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
14 vistas
•
6 diapositivas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
7 vistas
•
5 diapositivas
Más de IRJET Journal
(20)
SOIL STABILIZATION USING WASTE FIBER MATERIAL por IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
•
20 vistas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
•
8 vistas
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
•
7 vistas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
•
13 vistas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
•
14 vistas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
•
7 vistas
Heart Failure Prediction using Different Machine Learning Techniques por IRJET Journal
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal
•
7 vistas
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel por IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal
•
3 vistas
Metro Development and Pedestrian Concerns por IRJET Journal
Metro Development and Pedestrian Concerns
IRJET Journal
•
2 vistas
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... por IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal
•
3 vistas
Data Analytics and Artificial Intelligence in Healthcare Industry por IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal
•
3 vistas
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... por IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal
•
44 vistas
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... por IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal
•
10 vistas
Development of Effective Tomato Package for Post-Harvest Preservation por IRJET Journal
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal
•
4 vistas
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” por IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal
•
5 vistas
Understanding the Nature of Consciousness with AI por IRJET Journal
Understanding the Nature of Consciousness with AI
IRJET Journal
•
12 vistas
Augmented Reality App for Location based Exploration at JNTUK Kakinada por IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal
•
6 vistas
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... por IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal
•
18 vistas
Enhancing Real Time Communication and Efficiency With Websocket por IRJET Journal
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal
•
4 vistas
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... por IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal
•
4 vistas
Último
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L... por
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
Anowar Hossain
12 vistas
•
34 diapositivas
Multi-objective distributed generation integration in radial distribution sy... por
Multi-objective distributed generation integration in radial distribution sy...
IJECEIAES
15 vistas
•
14 diapositivas
Activated sludge process .pdf por
Activated sludge process .pdf
8832RafiyaAltaf
8 vistas
•
32 diapositivas
Effect of deep chemical mixing columns on properties of surrounding soft clay... por
Effect of deep chemical mixing columns on properties of surrounding soft clay...
AltinKaradagli
6 vistas
•
10 diapositivas
Machine Element II Course outline.pdf por
Machine Element II Course outline.pdf
odatadese1
8 vistas
•
2 diapositivas
Plumbing por
Plumbing
Iwiss Tools Co.,Ltd
15 vistas
•
14 diapositivas
Último
(20)
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L... por Anowar Hossain
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
Anowar Hossain
•
12 vistas
Multi-objective distributed generation integration in radial distribution sy... por IJECEIAES
Multi-objective distributed generation integration in radial distribution sy...
IJECEIAES
•
15 vistas
Activated sludge process .pdf por 8832RafiyaAltaf
Activated sludge process .pdf
8832RafiyaAltaf
•
8 vistas
Effect of deep chemical mixing columns on properties of surrounding soft clay... por AltinKaradagli
Effect of deep chemical mixing columns on properties of surrounding soft clay...
AltinKaradagli
•
6 vistas
Machine Element II Course outline.pdf por odatadese1
Machine Element II Course outline.pdf
odatadese1
•
8 vistas
Plumbing por Iwiss Tools Co.,Ltd
Plumbing
Iwiss Tools Co.,Ltd
•
15 vistas
SWM L15-L28_drhasan (Part 2).pdf por MahmudHasan747870
SWM L15-L28_drhasan (Part 2).pdf
MahmudHasan747870
•
28 vistas
Wire Rope por Iwiss Tools Co.,Ltd
Wire Rope
Iwiss Tools Co.,Ltd
•
9 vistas
DESIGN OF SPRINGS-UNIT4.pptx por gopinathcreddy
DESIGN OF SPRINGS-UNIT4.pptx
gopinathcreddy
•
18 vistas
Design and analysis of a new undergraduate Computer Engineering degree – a me... por WaelBadawy6
Design and analysis of a new undergraduate Computer Engineering degree – a me...
WaelBadawy6
•
56 vistas
Design of machine elements-UNIT 3.pptx por gopinathcreddy
Design of machine elements-UNIT 3.pptx
gopinathcreddy
•
29 vistas
Object Oriented Programming with JAVA por Demian Antony D'Mello
Object Oriented Programming with JAVA
Demian Antony D'Mello
•
107 vistas
Machine learning in drug supply chain management during disease outbreaks: a ... por IJECEIAES
Machine learning in drug supply chain management during disease outbreaks: a ...
IJECEIAES
•
10 vistas
DevOps-ITverse-2023-IIT-DU.pptx por Anowar Hossain
DevOps-ITverse-2023-IIT-DU.pptx
Anowar Hossain
•
8 vistas
SEMI CONDUCTORS por pavaniaalla2005
SEMI CONDUCTORS
pavaniaalla2005
•
20 vistas
An approach of ontology and knowledge base for railway maintenance por IJECEIAES
An approach of ontology and knowledge base for railway maintenance
IJECEIAES
•
12 vistas
Digital Watermarking Of Audio Signals.pptx por AyushJaiswal781174
Digital Watermarking Of Audio Signals.pptx
AyushJaiswal781174
•
8 vistas
Dynamics of Hard-Magnetic Soft Materials por Shivendra Nandan
Dynamics of Hard-Magnetic Soft Materials
Shivendra Nandan
•
14 vistas
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) por Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Tsuyoshi Horigome
•
23 vistas
Thermal aware task assignment for multicore processors using genetic algorithm por IJECEIAES
Thermal aware task assignment for multicore processors using genetic algorithm
IJECEIAES
•
31 vistas
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 256 Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SURVEY Anusree Radhakrishnan1 Minu Lalitha Madhav2 PG Scholar1, Asst. Professor2 Dept. of Computer Science & Engineering, Sree Buddha College of Engineering, Pattoor, Alappuzha ------------------------------------------------------------------------***----------------------------------------------------------------------- ABSTRACT-Electronic devices are developing day by day. Although their need increases compared to a desktop mobile devices has some of the demerits in the sense that they have limited computation capability and storage. So that they cant meet all the needs of the user. The solution is to integrate the mobile computing with the cloud computing technology. The new name Mobile cloud computing (MCC) opens an extended boundary for mobile users. But when we integrate the cloud computing concept with the mobile technology, the issues that present in the cloud computing is still there. Privacy, data integrity, authentication such terms should be maintained control. For to ensure it different cryptographic primitives can be used. Keywords - MCC, access control , data integrity, authentication, security INTRODUCTION Cloud computing provides immense storage for different clients. The main advantage of the cloud is the storage itself. Most of the organizations now a days depends on the clouds . So that they are not bothered about the economic cost of the storage hardware. Cloud provides low cost and good reliability. But here also when the data is shared we need to ensure that whether it is shared to the right person. According to a survey conducted in USA 90% of the citizen uses the cloud facility for storage purposes. Within this 90% about 80% of them are worried about the security of their data. Since the data is completely handled in the cloud the data security is completely depends on the ability of the technical team whom are handling the cloud. Any type of security loop hole will harm the trust of the cloud. Now a days it is quite common to use the cloud with the help of the mobile device. By a recent study the cloud will acquire 90 % of the citizens for their mobile devices. To offload storage to the cloud, there are many existing storage services for mobile devices, such as Dropbox, Box, iCloud, Google Drive, and Skydrive We are integrating the Mobile computing nad Cloud computing, surely there will be some security issues. In this survey we are looking for some of the security preserving paradigms in MCC environment. The following section is the literature review section of 5 papers. Along with it merits and demerits are also mentioned. Last the review section ends with a conclusion LITERATURE REVIEW In [1] Huaquan Wang proposes a provable data possession protocol. Recently the demand of the cloud computing increased due to its ability , flexibility and large storage capacity. . Normally in public clouds the user keeps the data in the server but they can’t access the data remotely. Thus, information security is an important problem in public cloud storage, such as data confidentiality, integrity, and availability. Some cases the client can’t check the possession of the data. This paper tells about a proxy provable data possession (PPDP). In public clouds, PPDP is a matter of crucial importance when the client cannot perform the remote data possession checking. Here it focuses on the PPDP system model, the security model, and the design method. Based on the bilinear pairing technique . It Verifies whether the server possess correct data. Advantages The overhead at the server is low. Performance of PDP is bounded by disk I/O and not by cryptographic computation Disadvantages Performance decreases as the no. of users increases Dan Boneh describes a broadcast encryption in [2]. Some set S of the users will be listening to the broadcast channel. A broadcaster will encrypt the message. I order to decrypt it the user can use the private key. We can say that the system is collusion resistant in the sense that the users outside the broadcast can’t collude the information. The broadcaster can encrypt to any subset S of his choice. In the file system the access control can be provided by this broadcast encryption. Advantages Each user only has to keep a single secret key
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 257 Disadvantages It needs more storage and time for to implement. Paper [3] is based on a novel remote based data possession checking protocol. Most of the data owners will outsource this data to cloud storage. But the security of the data is the main issue here. . To solve this problem some remote data possession checking protocols are used . But most of the techniques will not support the data dynamics. RDPC is a solution to the above problem. And it is based on homomorphic hash function. The scheme is secure against forgery attack, replay attack, reply attack. An operation record table is used to track the files. Optimised implementation of ORT is used here. It has Less computation + Communication cost. But Need to access the entire file block for each challenge [4] describes an attribute based encryption. Hui Cui, Robert H. Deng describes AB scheme. Here the data owner will save all the data in the cloud and the data will be shared with the users having some specific credentials. In order to save the storage space duplicate copy of the data should be avoided. But most of the cases deduplication is not supported. But in this paper deduplication is supported. Where a private cloud is responsible for duplicate detection and a public cloud manages the storage. Compared with other schemes this AB schemes has some of the advantages. Firstly, it can be used to confidentially share data with users by specifying access policies rather than sharing decryption keys. Secondly, it achieves the standard notion of semantic security for data confidentiality while existing systems only achieve it by defining a weaker security notion. [5] describes Cloud Security Using Service Level Agreements. It make use of some of the service level agreements. Users can specify the needs. And with the help of the security level agreement they can be provided. Te security level agreement consist of different security parameters in different point of view. Advantages Customers visually comparing CSPs based on their offered secSLAs. Disadvantages Nothing mentioned about advanced security metrics/Cloud secSLA notions e.g., uncertainty, end-to-end security evaluation In [6] Giuseppe Ateniese says about a Proxy reencryption(PRE). A significant benefit brought by PRE is that each user only has to keep a single secret key and does not suffer from the key escrow problem. Concretely, in a PRE system, a data owner Alice can generate a re- encryption key to help Bob transform a ciphertext under her own public key to ciphertext of the same message under Bob’s public key, such that Bob can decrypt it by using his own secret key to obtain the original message. However, the access control provided by a traditional PRE (including ID-based PRE ) is in an “all or nothing” manner . Namely, a user with a corresponding re- encryption key can read all the data of the data owner, but a user without the re-encryption key cannot read any private data of the data owner. This is not applicable to the case that the data owner only wants to share part of his data with others. In order to realize flexible access control, a new variant of PRE can be used Advantages a) Implementation is simple Disadvantage a) Some area is error prone CONCLUSION MCC is an evolving technology in which many more features are adding to it.By analysing these features we can conclude that the only problem with the system is of security in data sharing. MCC has to follow a number of features such as data sharing access control, authentication ,integrity etc. But we cant design one system with all these features. For all security related frameworks the main purpose should be to ensure the security of data. A number of security frameworks has already been designed to this proposed. By analysing 6 of these methods we could conclude that a lot of research are going on in the field of mobile cloud computing REFERENCES [1] Huaqun Wang, “Proxy Provable Data Possession in Public Clouds” JOURNAL OF L ATEX CLASS FILES, VOL. 6, NO. 1,. [2] Dan Boneh, Brent Waters, Craig Genry, Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys,” in ICNP ’05, 2005. [3] Hao Yan, Jiguo Li, Jinguang Han, “A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage ” Carnegie Mellon University Research Showcase @ CMU.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 258 [4] Hui Cui, Robert H. Deng, Yingjiu Li, and Guowei Wu, “Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud,” JOURNAL OF L ATEX CLASS FILES, VOL. , NO. , MONTH 2016. [5] Y. Xiang, W. Zhou, and M. Guo, “Cloud Security Using Service Level Agreements. Parallel Distrib. Syst., vol. 20, no. 4, pp. 567–580, 2009. [6] Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger. “Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur., 9:1–30, February 2016..
Descargar ahora