Mobile Cloud Computing Security Using Cryptographic Hash Function Algorithm

被引:0
|
作者
Arfan, M. [1 ]
机构
[1] Univ Diponegoro, Fac Engn, Dept Elect Engn, Semarang, Indonesia
关键词
mobile computing; cloud computing; fuction hash;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
the use of cloud computing in the year 2008 is 42.8 million and it increased up to 998 million users in the year 2014. In other hand, the growth is not followed by increasing of user trust in cloud based data management especially in business sector. Some companies is not interested in adopting cloud computing mobile service due to risks of security and privacy. In cloud computing mobile service, some security gap and misuse of data ownership policy by service provider and other unconcern parties are still found. This thread is becoming an obstacle in adapting mobile cloud computing paradigm, the ease is not comparable to company's data misuse thread by other parties. So that, mobile cloud computing security system needs to construct which can lessen the risks of security and privacy. The use of complicated keys will complicate the parties which has no authority in accessing privately company's data. This security system will use hash function algorithm which is symmetric so that decrypting process in cloud system become more complicated and its expected that company's data will be better protected. With this system, the system mobile cloud computing users both corporate and individuals can manage business resources online quickly and safely from the risks of data leakage.
引用
收藏
页码:403 / 407
页数:5
相关论文
共 50 条
  • [1] Improving the Security by using Various Cryptographic Techniques in Cloud Computing
    Jain, Gaurav
    Sejwar, Vikas
    [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 23 - 28
  • [2] Enhancing Blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm
    Velmurugadass, P.
    Dhanasekaran, S.
    Anand, S. Shasi
    Vasudevan, V.
    [J]. MATERIALS TODAY-PROCEEDINGS, 2021, 37 : 2653 - 2659
  • [3] An Advance Cryptographic Solutions in Cloud Computing Security
    Ul Abedin, Zain
    Guan, Zhitao
    Arif, Asad Ullah
    Anwar, Usman
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTING, MATHEMATICS AND ENGINEERING TECHNOLOGIES (ICOMET), 2019,
  • [4] A Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing
    Thabit F.
    Can O.
    Alhomdy S.
    Al-Gaphari G.H.
    Jagtap S.
    [J]. International Journal of Intelligent Networks, 2022, 3 : 16 - 30
  • [5] Enhancing Information Security in Cloud Computing Environment Using Cryptographic Techniques
    Pardeshi, Suraj R.
    Pawar, Vikul J.
    Kharat, Kailash D.
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 511 - 515
  • [6] Security Issues of Mobile Application Using Cloud Computing
    Cimler, Richard
    Matyska, Jan
    Balik, Ladislav
    Horalek, Josef
    Sobeslav, Vladimir
    [J]. AFRO-EUROPEAN CONFERENCE FOR INDUSTRIAL ADVANCEMENT, AECIA 2014, 2015, 334 : 347 - 357
  • [7] Cryptographic security evaluation of MD4 hash function
    AbdelAzeem, E
    Seireg, R
    Shaheen, SL
    [J]. THIRTEENTH NATIONAL RADIO SCIENCE CONFERENCE - NRSC'96, 1996, : 345 - 354
  • [8] An Efficient and Secure Data Storage in Mobile Cloud Computing through RSA and Hash Function
    Garg, Preeti
    Sharma, Vineet
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 334 - 339
  • [9] Mobile cloud computing: Architecture and Security
    Wang, Suzhen
    Du, Zhijuan
    [J]. MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2274 - 2281
  • [10] Security in CloneCloud for Mobile Cloud Computing
    Patel, Payal
    Patel, Rajan
    [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 752 - 756