A Privacy Preserving Mechanism For Protecting Data In Mobile Ad-Hoc Network For Mobile Applications

被引:0
|
作者
Banupriya, K. [1 ]
Andrews, S. [2 ]
机构
[1] Mahendra Arts & Sci Coll, Dept Comp Sci, Namakkal, Tamil Nadu, India
[2] Mahendra Engn Coll, Dept Comp Sci, Namakkal, Tamil Nadu, India
关键词
Data handling; Integrity; private logging; Smartphone; Cloud storage;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Every smart phone has internal storage for the users to store their important data in it. If any unknown person gets the device they can miss use the data stored inside the mobile since there is no protection for the stored data. It is the major problem for smart phone users because of the limited security of the mobile. To address this problem, it introduced a new technique which is functional on Android platform. This paper propose an application named Private Data Mode (PDM) to illustrate the technique of securing the user data by using cloud services. Through the PDM application the user can store the data directly to the cloud and not necessary to store inside mobile storage. The application utilizes a multiple level security techniques to protect the data which starts with image pattern matching as first level authentication for cloud entry. The next level of security aspect is cloud authentication which decides the type of data to be secured. The user can manually create or select the storage data by this application and they can instantly store into the cloud. The PDM performs both upload and download operations using the same authentication. The proposed technique provides more protection for the data by removing them from mobile storage and securing them in cloud. There are no limitations on the type of data and all users can access the PDM application which is portable to versatile mobile devices.
引用
收藏
页码:348 / 352
页数:5
相关论文
共 50 条
  • [31] Mobile ad-hoc networks and QoS demanding applications
    Boukhalfa, L
    Minet, P
    George, L
    Midonnet, S
    MOBILE AND WIRELESS COMMUNICATIONS NETWORKS, 2003, : 11 - 14
  • [32] Multistage authentication scheme for mobile ad-hoc network using clustering mechanism
    Lee, Hyewon K.
    Choi, Jaeyoung
    HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, 4208 : 653 - 661
  • [33] Lightweight Security Mechanism to Mitigate Active Attacks in a Mobile Ad-hoc Network
    Ahamed, Uthumansa
    Fernando, Shantha
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2022, 68 (01) : 145 - 152
  • [34] The Goal of Securing Mobile Ad-Hoc Network and Solutions
    Sultana, Najiya
    Sarangdevat, S. S.
    ADVANCES IN DIGITAL IMAGE PROCESSING AND INFORMATION TECHNOLOGY, 2011, 205 : 355 - 365
  • [35] Optimization of Route Repair in Mobile Ad-hoc Network
    李承
    汪为农
    Journal of Shanghai University, 2004, (02) : 169 - 176
  • [36] DETECTION OF MALICIOUS NODE IN MOBILE AD-HOC NETWORK
    Sangeetha, V
    Kumar, S. Swapna
    2018 FOURTH INTERNATIONAL CONFERENCE ON POWER, SIGNALS, CONTROL AND COMPUTATION (EPSCICON), 2018,
  • [37] Tracing Mobile Attackers in Wireless Ad-Hoc Network
    Yang, Ming Hour
    Chiu, Chien-Si
    Shieh, Shiuhpyng
    2008 3RD INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2008), 2008, : 7 - +
  • [38] Wormhole Attack in Mobile Ad-hoc Network: A Survey
    Shrivastava, Akansha
    Dubey, Rajni
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 293 - 298
  • [39] QUANTIFYING NETWORK PERFORMANCE OF MOBILE AD-HOC NETWORKS
    Comparetto, G.
    Marshall, J.
    Mirhakkak, M.
    Schult, N.
    Schwartz, J.
    Zhang, K.
    DiOrio, D.
    Thai, S.
    2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 1847 - +
  • [40] On the Connectivity of a Mobile Ad-Hoc Network for Forest Firefighters
    Azuaje, Orangel
    Aguiar, Ana
    PROCEEDINGS OF THE 13TH WORKSHOP ON CHALLENGED NETWORKS (CHANTS'18), 2018, : 11 - 17