Enhanced Secure Big Data in Distributed Mobile Cloud Computing Using Fuzzy Encryption Model

Abstract

This paper proposes a novel architecture for adaptive encryption of public cloud databases that offers a proxy-free alternative to the system. cloud system is difficult to synchronize login and authentication data between external clouds and internal systems without exposing internal security data. The cloud technologies are rapidly being adopted throughout the Information Technology (IT) due to their various attractive properties. In spite of their spread, they have raised a range of significant security and privacy concerns which interrupt their adoption in sensitive environments. The cloud computing technology provides IT services and resources to the customers through public network such as internet. The cloud computing services and infrastructure are mostly owned by a third party called cloud service providers. Cloud computing provides an innovative model for the organizations to use software applications, storage and processing capabilities of cloud without investing on the infrastructure. Mobile cloud computing provides a novel ecommerce mode for organizations without any upfront investment. Since cloud computing uses distributed resources in open environment, it is important to provide secure keys to share the data for developing cloud computing applications. To ensure a correctness of users? data in the cloud, we propose an effective and secure distributed model including a Self-Proxy Server (SPS) with self-created algorithm. The model resolves a communication bottleneck due to re-encryption of a shared data in the cloud whenever users are revoked. It offers to reduce security risks and protect their resources because a distributed SPS dynamically interacts with Key Manager (KM) when the mobile users take on cloud services. This paper presents a comprehensive mobile cloud design which provides an effective and secure cloud computing services on mobile devices. This proposed system provides fuzzy authorization technique to ensure the correctness of username and the password for that fuzzy technique is used. This technique includes if the fake user to know the details about the password that is using the hint given. If the hacker know about the original password when he reenter. To avoid this type of the situation fuzzy authorization uses the technique if the entered password partially matches the user can get the video that is the fake video. After that hacker stop retrying the username and the password. The original data is taken after real password is given by the real user.

Authors and Affiliations

Pavithra P, Balamurugan K

Keywords

Related Articles

IOT based Accident Preventing and Reporting System

An accident is an unpredicted and unintentional event. Considering the alarming increase in the number of accidents happening in our country, this system ensures to make the four-wheeler driving safer than before for the...

Effective Online Discussion Data for Teachers Reflective Thinking Using Feature base Model

In this paper analysis automatic coding method by integrating the inductive content analysis and text classification techniques. In existing model acquire the reflective thinking categories by conducting an inductive con...

Enhanced Secure Big Data in Distributed Mobile Cloud Computing Using Fuzzy Encryption Model

This paper proposes a novel architecture for adaptive encryption of public cloud databases that offers a proxy-free alternative to the system. cloud system is difficult to synchronize login and authentication data betwee...

Android Application Development for Textile Industry

The main motivation for the application development for textile industries is fashion cycles are developing faster than ever. The current world is enclosed with a large number of digital visual information. Sample approv...

Block Chain Technology for Privacy Protection for Cloudlet-based Medical Data Sharing

With the popularity of wearable devices, along with the development of clouds and cloudlet technology, there has been increasing need to provide better medical care. The processing block chain of medical data mainly incl...

Download PDF file
  • EP ID EP405063
  • DOI 10.9756/BIJSESC.8391
  • Views 127
  • Downloads 0

How To Cite

Pavithra P, Balamurugan K (2018). Enhanced Secure Big Data in Distributed Mobile Cloud Computing Using Fuzzy Encryption Model. Bonfring International Journal of Software Engineering and Soft Computing, 8(2), 21-25. https://europub.co.uk/articles/-A-405063