Enhanced Secure Big Data in Distributed Mobile Cloud Computing Using Fuzzy Encryption Model

Abstract

This paper proposes a novel architecture for adaptive encryption of public cloud databases that offers a proxy-free alternative to the system. cloud system is difficult to synchronize login and authentication data between external clouds and internal systems without exposing internal security data. The cloud technologies are rapidly being adopted throughout the Information Technology (IT) due to their various attractive properties. In spite of their spread, they have raised a range of significant security and privacy concerns which interrupt their adoption in sensitive environments. The cloud computing technology provides IT services and resources to the customers through public network such as internet. The cloud computing services and infrastructure are mostly owned by a third party called cloud service providers. Cloud computing provides an innovative model for the organizations to use software applications, storage and processing capabilities of cloud without investing on the infrastructure. Mobile cloud computing provides a novel ecommerce mode for organizations without any upfront investment. Since cloud computing uses distributed resources in open environment, it is important to provide secure keys to share the data for developing cloud computing applications. To ensure a correctness of users? data in the cloud, we propose an effective and secure distributed model including a Self-Proxy Server (SPS) with self-created algorithm. The model resolves a communication bottleneck due to re-encryption of a shared data in the cloud whenever users are revoked. It offers to reduce security risks and protect their resources because a distributed SPS dynamically interacts with Key Manager (KM) when the mobile users take on cloud services. This paper presents a comprehensive mobile cloud design which provides an effective and secure cloud computing services on mobile devices. This proposed system provides fuzzy authorization technique to ensure the correctness of username and the password for that fuzzy technique is used. This technique includes if the fake user to know the details about the password that is using the hint given. If the hacker know about the original password when he reenter. To avoid this type of the situation fuzzy authorization uses the technique if the entered password partially matches the user can get the video that is the fake video. After that hacker stop retrying the username and the password. The original data is taken after real password is given by the real user.

Authors and Affiliations

Pavithra P, Balamurugan K

Keywords

Related Articles

Hybridization Approach to Classify Big Data Using Social Internet of Things

Recently there has been quite a number of independent research activities that investigated the potentialities of integrating social networking concepts into Internet of Things solutions. The resulting paradigm, named So...

Optimization of Milling Operation Using Genetic and PSO Algorithm

Metal cutting is one of the important and widely used manufacturing processes in engineering industries. Optimizing the machining parameters has become an essential one in order to be competitive and to meet customer dem...

Smart Home Implementing IOT Technology with Multilingual Speech Recognition System

There is nothing like staying at home for real comfort. This era is a technical era. People are searching for smart way of doing every little-to-big things in their life.so there is no exception for home at all. We can u...

An Improved Compiler Directed Power Optimization for Disk Based Systems using Back Propagation Neural Networks

The performance of the parallel disk systems is highly affected by excessive power consumption. Hence, various researches are being done in the areas of energy optimization of such systems. Because of the extensive growt...

Download PDF file
  • EP ID EP405063
  • DOI 10.9756/BIJSESC.8391
  • Views 116
  • Downloads 0

How To Cite

Pavithra P, Balamurugan K (2018). Enhanced Secure Big Data in Distributed Mobile Cloud Computing Using Fuzzy Encryption Model. Bonfring International Journal of Software Engineering and Soft Computing, 8(2), 21-25. https://europub.co.uk/articles/-A-405063