Affiliation:
1. MSc. Software Systems, Coimbatore Institute of Technology, Coimbatore, Tamil Nadu, India
2. Assistant Professor, Coimbatore Institute of Technology, Coimbatore, Tamil Nadu, India
Abstract
Mobile cloud computing in the increasing popularity among users of mobile device enables to store their data in cloud. Security is the major concern when the sensitive information is stored and transferred across the internet. It is essential to make sure that the data is secured and protected. In this paper, we discussed the problem of privacy of data with reducing the resources usage. Moreover, mobile cloud computing has limitations in resources such as power energy, processor, Memory and storage. Cryptography ensures the confidentiality, authentication, availability, and integrity of the data. This is done through cryptographic algorithms such as Data Encryption Standard (DES), Blowfish and Advanced Encryption Standard (AES). The experimental results evaluated and compared the performance of the encryption algorithms. The performance metrics used are encryption and decryption time, CPU and Memory utilization. Evaluation results showed a significant improvement in reducing the resources, amongst all the techniques, choosing a suitable encryption algorithm based on different parameters that are best fit to the future user requirements is considered.
Reference10 articles.
1. Gurpreet Kaur and Manish Mahajan (2013), Analyzing Data Security for Cloud Computing Using Cryptography Algorithms‖, International Journal of Engineering Research and Application, Vol.-3,782-786.
2. Sujithra, M., G. Padmavathi, and Sathya Narayanan. Mobile Device Data Security: A Cryptographic Approach by Outsourcing Mobile Data to Cloud. In: Procedia Computer Science 47; 2015.p. 480-485.
3. Paresh D.Sharma, Prof. Hitesh Gupta(February 2014) An Implementation for Conserving Privacy based on Encryption Process to Secured Cloud Computing Environment‖ IJESRT Sharma, 3(2).
4. D. S. A. Elminaam, H. M. A. Kader, and M. M. Hadhoud, "Evaluating the performance of symmetric encryption algorithms," International Journal of Computer Theory and Engineering, vol. 10, no. 3, pp. 343-351, 2009.
5. M. Sujithra, and G. Padmavathi, "Ensuring Security on mobile device data with two phase RSA algorithms over cloud storage", Journal of Theoretical and Applied Information Technology, Vol.80. No.2 ISSN: 1992-8645, October 2015.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献