A Privacy Preserving Mechanism For Protecting Data In Mobile Ad-Hoc Network For Mobile Applications

被引:0
|
作者
Banupriya, K. [1 ]
Andrews, S. [2 ]
机构
[1] Mahendra Arts & Sci Coll, Dept Comp Sci, Namakkal, Tamil Nadu, India
[2] Mahendra Engn Coll, Dept Comp Sci, Namakkal, Tamil Nadu, India
关键词
Data handling; Integrity; private logging; Smartphone; Cloud storage;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Every smart phone has internal storage for the users to store their important data in it. If any unknown person gets the device they can miss use the data stored inside the mobile since there is no protection for the stored data. It is the major problem for smart phone users because of the limited security of the mobile. To address this problem, it introduced a new technique which is functional on Android platform. This paper propose an application named Private Data Mode (PDM) to illustrate the technique of securing the user data by using cloud services. Through the PDM application the user can store the data directly to the cloud and not necessary to store inside mobile storage. The application utilizes a multiple level security techniques to protect the data which starts with image pattern matching as first level authentication for cloud entry. The next level of security aspect is cloud authentication which decides the type of data to be secured. The user can manually create or select the storage data by this application and they can instantly store into the cloud. The PDM performs both upload and download operations using the same authentication. The proposed technique provides more protection for the data by removing them from mobile storage and securing them in cloud. There are no limitations on the type of data and all users can access the PDM application which is portable to versatile mobile devices.
引用
收藏
页码:348 / 352
页数:5
相关论文
共 50 条
  • [1] Reliable mobile ad-hoc network
    Dana, Arash
    Zadeh, Ahmad Khadem
    Nasiri, Saeid Haji
    PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL MULTI-CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS, 2006, : 371 - +
  • [2] Preserving Privacy for Mobile Ad-Hoc Network Emergency Services via Heterogeneous Access Control Model
    Abu Bakar, Asmidar
    El-Talib, El-Munzir Hassan
    Ismail, Roslan
    ADVANCED SCIENCE LETTERS, 2014, 20 (10-12) : 2046 - 2049
  • [3] Towards middleware services for mobile ad-hoc network applications
    Plagemann, T
    Goebel, V
    Griwodz, C
    Halvorsen, P
    NINTH IEEE WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2003, : 249 - 255
  • [4] Mobile ad-hoc network - A novel node authentication mechanism
    Mahmood, Syed Azhar
    Ahmed, Farhan
    Qureshi, Zaffar I.
    Jafri, M. N.
    PROCEEDINGS OF THE WSEAS INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, ELECTRONICS, CONTROL & SIGNAL PROCESSING: SELECTED TOPICS ON CIRCUITS, SYSTEMS, ELECTRONICS, CONTROL & SIGNAL PROCESSING, 2007, : 609 - +
  • [5] A Mobile Ad-hoc Network Data Cache Invalidation Method
    Jia, Li
    PEEA 2011, 2011, 23
  • [6] Adaptive segmented path protecting mechanism in mobile ad hoc network
    Wang R.-Y.
    Wu D.-P.
    Wu M.-Q.
    Zhen Y.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2011, 33 (07): : 1617 - 1622
  • [7] PCM: a privacy-preserving detection mechanism in mobile ad hoc networks
    Zhu, Bo
    Ren, Kui
    Wang, Lingyu
    Debbabi, Mourad
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (2-3) : 167 - 184
  • [8] Network forensics on mobile ad-hoc networks
    Otaka, Akira
    Takagi, Tsuyoshi
    Takahashi, Osamu
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2008, 5179 : 175 - 182
  • [9] Forming Trust in Mobile Ad-Hoc Network
    Abu Bakar, Asmidar
    Ismail, Roslan
    Jais, Jamilin
    Manan, Jamalul-lail Abdul
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 470 - +
  • [10] Simulation framework for Mobile Ad-Hoc network
    Sha, XJ
    Tan, W
    Xu, YB
    ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 739 - 743