Security Mechanism for Android Cloud Computing

被引:0
|
作者
Archana, R. [1 ]
Mythili, C. [1 ]
Kalyani, S. Nithya [2 ]
机构
[1] KSR Coll Engn, InformationTechnol, Tiruchengode, Tamil Nadu, India
[2] KSR Coll Engn, Tiruchengode, Tamil Nadu, India
关键词
Android Cloud Computing; Cloud Computing; Android Users; Android; Onion Routing; Security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Today android devices face many resource challenges like battery life, storage, bandwidth etc. cloud computing offers advantages to users by allowing them to use infrastructures, platforms and software by cloud providers elastically in an on-demand fashion at low cost. Android Cloud Computing (ACC) provides android users with data storage and processing services in cloud, obviating the need to have a powerful device configuration(e.g. CPU speed, Memory, Capacity etc) and all resource-intensive computing can be performed in cloud. Nowadays more and more commercial applications are shifting to android and these days security becomes a big issue. With increasing use of mobile android devices, the requirement of cloud computing in android arises. In this paper, a brief review for how ACC is emerging in real world and further important issues towards security are discussed. Here security mechanism based on onion routing is proposed, which will secure the data on Android Cloud Computing.
引用
收藏
页码:133 / 138
页数:6
相关论文
共 50 条
  • [1] New mechanism for Cloud Computing Storage Security Fragmentation-redundancy-scattering as security mechanism for Data Cloud Computing
    Ait El Mrabti, Almokhtar
    Ammari, Najim
    Abou El Kalam, Anas
    Ait Ouahman, Abdellah
    De Montfort, Mina
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (07) : 526 - 539
  • [2] The Research on Cloud computing data security mechanism
    Xu Xiaoping
    Yan Junhu
    Liu Lan
    [J]. ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1595 - 1599
  • [3] Cloud computing security: Architecture, mechanism and modeling
    Lin, Chuang
    Su, Wen-Bo
    Meng, Kun
    Liu, Qu
    Liu, Wei-Dong
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2013, 36 (09): : 1765 - 1784
  • [4] Study on Data Security Mechanism in Cloud Computing
    Sandha
    Durga, M. Ganaga
    [J]. SECOND INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET 2014), 2014, : 13 - 17
  • [5] The Research of Data Security Mechanism Based on Cloud Computing
    Guo, Changyou
    Zheng, Xuefeng
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 363 - 370
  • [6] Research on the security mechanism of cloud computing service model
    Zhang Y.
    [J]. Automatic Control and Computer Sciences, 2016, 50 (2) : 98 - 106
  • [7] Computer cyberspace security mechanism supported by cloud computing
    Fu, ZeYuan
    [J]. PLOS ONE, 2022, 17 (10):
  • [8] Design of the Security Mechanism for a BPO Cloud Computing Platform
    Hui, Huaihai
    McLernon, Des
    Zaidi, Ali
    [J]. PROCEEDINGS OF 2018 IEEE 9TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2018, : 1092 - 1095
  • [9] Research on a security mechanism for cloud computing based on virtualization
    Du, Ye
    Zhang, Ruhui
    Li, Meihong
    [J]. TELECOMMUNICATION SYSTEMS, 2013, 53 (01) : 19 - 24
  • [10] Investigation of Security Challenges and a Novel Security Mechanism for Cloud Computing Environment
    Aldakheel, Maram Abdullatif
    Rahman, Sk Md Mizanur
    Al-Zahrani, Rasheed
    El-Qawasmeh, Eyas
    [J]. 2015 2ND WORLD SYMPOSIUM ON WEB APPLICATIONS AND NETWORKING (WSWAN), 2015,