A Privacy Preserving Mechanism For Protecting Data In Mobile Ad-Hoc Network For Mobile Applications

被引:0
|
作者
Banupriya, K. [1 ]
Andrews, S. [2 ]
机构
[1] Mahendra Arts & Sci Coll, Dept Comp Sci, Namakkal, Tamil Nadu, India
[2] Mahendra Engn Coll, Dept Comp Sci, Namakkal, Tamil Nadu, India
关键词
Data handling; Integrity; private logging; Smartphone; Cloud storage;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Every smart phone has internal storage for the users to store their important data in it. If any unknown person gets the device they can miss use the data stored inside the mobile since there is no protection for the stored data. It is the major problem for smart phone users because of the limited security of the mobile. To address this problem, it introduced a new technique which is functional on Android platform. This paper propose an application named Private Data Mode (PDM) to illustrate the technique of securing the user data by using cloud services. Through the PDM application the user can store the data directly to the cloud and not necessary to store inside mobile storage. The application utilizes a multiple level security techniques to protect the data which starts with image pattern matching as first level authentication for cloud entry. The next level of security aspect is cloud authentication which decides the type of data to be secured. The user can manually create or select the storage data by this application and they can instantly store into the cloud. The PDM performs both upload and download operations using the same authentication. The proposed technique provides more protection for the data by removing them from mobile storage and securing them in cloud. There are no limitations on the type of data and all users can access the PDM application which is portable to versatile mobile devices.
引用
收藏
页码:348 / 352
页数:5
相关论文
共 50 条
  • [21] Centralized frame for routing in mobile ad-hoc network
    Bakht, H
    Merabti, M
    Askwith, B
    Wang, SW
    ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 613 - 616
  • [22] NEMAN: A network emulator for mobile ad-hoc networks
    Puzar, M
    Plagemann, T
    ConTEL 2005: Proceedings of the 8th International Conference on Telecommunications, Vols 1 and 2, 2005, : 155 - 161
  • [23] Optimized and Executive Survey On Mobile Ad-hoc Network
    Lalwani, Praveen
    Silakari, Sanjay
    Shukla, Piyush Ku
    2012 INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICES COMPUTING (ISCOS 2012), 2012, : 31 - 35
  • [24] Mobility based algorithm for mobile ad-hoc network
    Furusho, S
    Kitasuka, T
    Nakanishi, T
    Fukuda, A
    2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2003, : 334 - 337
  • [25] Evaluation of mobile ad-hoc network techniques in a cellular network
    Wijting, CS
    Prasad, R
    IEEE VEHICULAR TECHNOLOGY CONFERENCE, FALL 2000, VOLS 1-6, PROCEEDINGS: BRINGING GLOBAL MOBILITY TO THE NETWORK AGE, 2000, : 1025 - 1029
  • [26] MASS: editor for mobile ad-hoc network scenarios
    Cabrero, Sergio
    Garcia Paneda, Xabiel
    Melendi, David
    Garcia, Roberto
    2010 IEEE GLOBECOM WORKSHOPS, 2010, : 1679 - 1683
  • [27] An Innovative Approach For Security On Mobile Ad-Hoc Network
    Hari, Pranav
    Shukla, Vinay Krishna
    Verma, Pushpendra R.
    2015 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2015, : 759 - 765
  • [28] Network access control for mobile ad-hoc networks
    Wang, P
    Ning, P
    Reeves, DS
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 350 - 362
  • [29] Effectiveness of overlay multicasting in mobile ad-hoc network
    Detti, A
    Loreti, C
    Loreti, P
    2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 3891 - 3895
  • [30] Replication in Mobile Ad-hoc Network Using Hopfield Network
    Chawla, Tanu
    Kumar, Dr. Mukesh
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL CONFERENCE IN MOOC, INNOVATION AND TECHNOLOGY IN EDUCATION (MITE), 2013, : 26 - 31