An Efficient Model for Privacy and Security in Mobile Cloud Computing

被引:0
|
作者
Ragini [1 ]
Mehrotra, Parul [1 ]
Venkatesan, S. [1 ]
机构
[1] Indian Inst Informat Technol, Div Cyber Laws & Informat Secur, Allahabad 211012, Uttar Pradesh, India
关键词
Mobile Cloud Computing; Identity Based Encryption (IBE); Privacy&Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Cloud Computing has emerged as a promising technology and its application is expected to expand its features in storing personal health information, e-governance and others. Although data security and privacy have been the major concern to the users. These issues originated from the fact that the cloud is a semi-trusted environment and the sensitive information stored in the cloud can be accessed by any unauthorized person. Thus, new methods and models are needed to solve the problem of privacy and security of data owner. In this paper, we attempt to address the concern of privacy and security of data owner. We first present a Mobility Node Model (MNM) where mobile client is coming from the external environment to the organization. Here data owner provides access of cloud data to mobile client via proxy server without revealing its identity. Second we propose a Centralized Owner Model (COM) as a centralized control mechanism which generates, key, group member details and mobile client accessibility for external and internal environment. Here request of mobile client is propagated via Trusted Leader to achieve optimality in terms of minimizing computation and communication overheads. The analysis of our proposed models demonstrate the efficiency to achieve the privacy and security in mobile cloud computing.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Data Security and Privacy in Cloud Computing
    Sun, Yunchuan
    Zhang, Junsheng
    Xiong, Yongping
    Zhu, Guangyu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [22] Security and Privacy Issues in Cloud Computing
    UbaidullahBokhari, Mohammad
    MakkiShallal, Qahtan
    Tamandani, Yahya Kord
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 896 - 900
  • [23] User Privacy and Security in Cloud Computing
    Waleed, AL-Museelem
    Li Chunlin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (02): : 341 - 352
  • [24] Privacy using Mobile Cloud Computing
    Abdo, Jacques Bou
    Demerjian, Jacques
    Chaouchi, Hakima
    Atechian, Talar
    Bassil, Carole
    2015 FIFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS (DICTAP), 2015, : 178 - 182
  • [25] Editorial Note: Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing
    Gupta, B. B.
    Yamaguchi, Shingo
    Agrawal, Dharma P.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (21) : 22669 - 22669
  • [26] Enhancing Data and Privacy Security in Mobile Cloud Computing through Quantum Cryptography
    Han, Jiawei
    Liu, Yanheng
    Sun, Xin
    Song, Lijun
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 398 - 401
  • [27] Editorial Note: Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing
    Multimedia Tools and Applications, 2017, 76 : 22669 - 22669
  • [28] Security and Privacy Implications of Cloud Computing - Lost in the Cloud
    Tchifilionova, Vassilka
    OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2011, 6555 : 149 - 158
  • [29] Privacy and Security Security for Mobile and Cloud Frontiers in Healthcare
    Kotz, David
    Fu, Kevin
    Gunter, Carl
    Rubin, Avi
    COMMUNICATIONS OF THE ACM, 2015, 58 (08) : 21 - 23
  • [30] Development of a Security Education Model System for Cloud Computing and Data Security and Privacy Protection
    Jia, Rui
    Ni, Xiaoli
    Shao, Xiaoyi
    Zhang, Ting
    Qi, Qunkun
    WIRELESS PERSONAL COMMUNICATIONS, 2023,