A Security Access Control Mechanism for Outsourced Data in Mobile Cloud Computing Environment
Journal Title: International Journal of Innovative Research in Advanced Engineering - Year 2016, Vol 0, Issue 0
Abstract
"Mobile Cloud Computing"(MCC), is basically a cloud environment in which mobile users are acts like a client and cloud server at the back end which allows users to save and access their huge data with different mobile devices(such as tablets, smart phones, PDAs, etc.) in a diversified manner. Although Mobile cloud acts as an inventory of user's data and resolves the storage and processing issue but also it opens the door for the threat of data security. The present solutions has their drawback such as less flexibility, scalability and overloaded key distribution computation. And also some solutions are not applicable in mobile cloud environment. So we propose an "Access Control mechanism" which is not only lightweight with minimum computation overhead but also less expensive in nature and gives access right for data sharing. We are using out of band mobile authentication for data sharing which enables dynamic scalability, client side encryption and decryption and lesser overhead as compared to existing solution. The security encryption algorithm, sharing access right and use of out of band mobile authentication is highly analysed and proves its applicability with higher efficiency.
Authors and Affiliations
Pratika Singh, Dr. Harsh Dev
Review Paper on Smart Sensor Network for Air Quality Monitoring
Green and clean environment across the globe is very much essential for the health of the nature. Unfortunately different kinds of pollution are affecting the quality of the environment around us. This review paper is ma...
Design and Development of Parallel - Counter Flow Heat Exchanger
Objective of this review paper reviews the literatures related to the parallel and counter flow of different types of heat exchangers and modifications made to improve the performance. Various papers were reviewed from t...
CALCULATION of the CEREBRAL HEMORRHAGE VOLUME USING ANALYSIS of COMPUTED TOMOGRAPHY IMAGE
A study of cerebral hemorrhage detection using computed tomography with head image has been done. The process after detection is the determination of the area and volume of hemorrhage. Image processing techniques used ar...
Industry Based Vocational Higher Education Management Model (IVHEMM) On Engineering
Industrial participation in an educational development remains low. This case caused by the absence of clear and detailed provisions of the Government about industrial involvement in the development of vocational highe...
Optimal Capacitor Placement for IEEE 14 bus system using Genetic Algorithm
Genetic Algorithm (GA) is a non-parametric optimization technique that is frequently used in problems of combinatory nature with discrete or continuous variables. Depending on the evaluation function used this optimizati...