Open Access   Article Go Back

Enrichment of Mobile data Security over Cloud storage using New Asymmetric key algorithm

P. Kuppuswamy1

Section:Research Paper, Product Type: Journal Paper
Volume-4 , Issue-10 , Page no. 133-138, Oct-2016

Online published on Oct 28, 2016

Copyright © P. Kuppuswamy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P. Kuppuswamy, “Enrichment of Mobile data Security over Cloud storage using New Asymmetric key algorithm,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.133-138, 2016.

MLA Style Citation: P. Kuppuswamy "Enrichment of Mobile data Security over Cloud storage using New Asymmetric key algorithm." International Journal of Computer Sciences and Engineering 4.10 (2016): 133-138.

APA Style Citation: P. Kuppuswamy, (2016). Enrichment of Mobile data Security over Cloud storage using New Asymmetric key algorithm. International Journal of Computer Sciences and Engineering, 4(10), 133-138.

BibTex Style Citation:
@article{Kuppuswamy_2016,
author = {P. Kuppuswamy},
title = {Enrichment of Mobile data Security over Cloud storage using New Asymmetric key algorithm},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2016},
volume = {4},
Issue = {10},
month = {10},
year = {2016},
issn = {2347-2693},
pages = {133-138},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1091},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1091
TI - Enrichment of Mobile data Security over Cloud storage using New Asymmetric key algorithm
T2 - International Journal of Computer Sciences and Engineering
AU - P. Kuppuswamy
PY - 2016
DA - 2016/10/28
PB - IJCSE, Indore, INDIA
SP - 133-138
IS - 10
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1593 1268 downloads 1275 downloads
  
  
           

Abstract

Using cloud storage is rapidly increasing at present in all the service and commercial zone. Safety and security concern of the data always uncertain in private, public and hybrid cloud storage system. In particular, mobile data on cloud storage facing enormous challenges and security issues. There is no limitation of mobile users, mobile data and its various services on mobile environment. Increase and deployment of mobile usage much needed to store their vast information in cloud environment, which establish to Mobile data storage on cloud environment. Cloud storage system promotes usage of cloud based services in a mobile environment. Encryption algorithm plays a vital role in securing mobile cloud system in security aspects. The core objective of this paper is to secure the mobile data on cloud environment. In this research article, we comparatively studied and analyzed various encryption algorithms used in mobile cloud base security with proposed new encryption model. Our proposed encryption/decryption method holds the higher security because the more dynamics and randomness are adaptively added into the key generation process with the help of key distribution centre (KDC).

Key-Words / Index Term

Mobile cloud computing, Cloud storage, Cloud Computing; Mobile cloud, Block cipher algorithm. Data encryption/decryption etc

References

[1] Prakash Kuppuswamy, and Saeed Q Y Al-Khalidi, �Analysis of security threats and prevention in cloud storage: Review report�, International Journal of Advanced Research in Engineering and Applied Sciences ISSN: 2278-6252, Vol. 3, January 2014.
[2] Prakash Kuppuswamy, and Saeed Q. Y. Al-Khalidi, �Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm�, MIS Review Vol. 19, No. 2, March 2014, pp. 1-13.
[3] Prakash Kuppuswamy, �Security implementation on Cloud Storage using New Public key algorithm based on Block cipher�, International Journal of Management, IT and Engineering, Volume 4, Issue 5 ISSN: 2249-0558, May 2014.
[4] P. Sharma and S. S. Gautam, "Exploration of efficient symmetric algorithms," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 2016, pp. 663-666
[5] R. Ferzli, and I. Khalife, �Mobile cloud computing educational tool for image/video processing algorithms�, In IEEE Digital Signal Processing Workshop and IEEE Signal Processing Education Workshop, 2015, pp. 529-533.
[6] Md Asif Mushtaque, "Comparative Analysis on Different parameters of Encryption Algorithms for Information Security", International Journal of Computer Sciences and Engineering, Volume-02, Issue-04, Page No (76-82), Apr -2014
[7] Dhanalakshmi, S., S. Suganya, and K. Kokilavani. "Mobile learning using cloud computing." International Journal of Computer and Engineering 2.11 (2014): 102-108.
[8] Parsi kalpana, and Sudha singaraju, �Data Security in Cloud Computing using RSA Algorithm�, International Journal of Research in Computer and Communication technology, ISSN 2278-5841, Vol. 1, Issue 4, September 2012.
[9] M. Sujithra, and G. Padmavathi, �Ensuring Security on mobile device data with two phase RSA algorithm over cloud storage�, Journal of Theoretical and Applied Information Technology, Vol.80. No.2 ISSN: 1992-8645, October 2015.
[10] Mohd Rizuan Baharon, Qi Shi, David L, and Lewellyn-Jones, �A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing�, 978-1-5090-0154-5/15, IEEE International Conference on 2015.
[11] John Rhoton, �Cloud Computing Explained: Implementation Handbook for Enterprises�, 2013.
[12] P. Menezes, Van Oorschot, and S. Vanstone, �Handbook of Applied Cryptography�, CRC Press, 1996.
[13] Prakash kuppuswamy, and C.Chandrasekar, �Enrichment of security through cryptographic public key algorithm based on block cipher�, Indian Journal of Computer Science and Engineering (IJCSE), ISSN : 0976-5166 Vol. 2 No. 3 Jun-Jul 2011.
[14] Prakash Kuppuswamy, C. Chandrasekar, �Optimisation of Public key Algorithm in Block Cipher using Negative Variables�, International Journal of Computer Science Research and Application, Vol. 01, Issue. 01, 2010, pp. 11-23.
[15] Pradeep Sharma, and S. S. Gautam. "Classification of Efficient Symmetric Key Cryptography Algorithms." International Journal of Computer Science and Information Security 14.2 (2016): 105.
[16] E. Ahmed Youssef, �A Framework for secure Healthcare systems based on Big data analytics in mobile cloud computing environments�, International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.2, June 2014.
[17] K. Priyanka and Nagarathna Kulennavar, �A Survey On Big Data Analytics In Health Care�, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4) , 2014, PP.5865-5868.
[18] Javier Andreu-Perez, C.Y. Carmen Poon, D. Robert Merrifield, T.C. Stephen Wong, and Guang-Zhong Yang, �Big Data for Health�, IEEE Journal of biomedical and health informatics, Vol.19 No.4, July 2015.