Enhancing mobile data security using red panda optimized approach with chaotic fuzzy encryption in mobile cloud computing

被引:0
|
作者
Garg, Vishal [1 ]
Kaur, Bikrampal [2 ]
Jangra, Surender [3 ]
机构
[1] IKG Punjab Tech Univ, Dept Comp Sci & Engn, Jalandhar, Punjab, India
[2] Punjabi Univ, Dept Comp Engn, Patiala, Punjab, India
[3] GTB Coll, Dept Comp Applicat, Bhawanigarh Sangrur, Punjab, India
来源
关键词
chaotic fuzzy encryption; cloud computing; cloud storage; CPU utilization; offloading; red panda optimization; security; ENERGY;
D O I
10.1002/cpe.8243
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Smartphone devices have occupied an indispensable place in human life. These devices have some restrictions, like short lifetime of battery, imperfect computation power, less memory size and unpredictable network connectivity. Hence, a number of methods previously presented to decrease these restrictions as well as increase the battery lifespan with the help of offloading strategy. This manuscript proposes a new enhancing mobile data security using red panda optimized approach with chaotic fuzzy encryption in mobile cloud computing (RPO-CFE-SMC) to offload intensive computation tasks from mobile device to the cloud. The proposed model utilizes a red panda optimization algorithm (RPOA) to scale dynamically the offloading decision under energy consumption, CPU utilization, execution time, memory usage parameters. Before the work is transferred to the cloud, an innovative security layer is applied for encrypting the data using AES chaotic fuzzy encryption (CFE) technology. The proposed RPO-CFE-SMC method provides 20.63%, 25.25%, 25.28%, and 32.47% lower encryption time and 23.66%, 24.25%, and 26.47% lower energy consumption compared with existing EFFORT-SMC, EESH-SMC, and CP-ABE-SMC models respectively. In conclusion, the simulation results prove that the improved efficiency of proposed model in offloading computation to the cloud with enhanced data protection using chaotic fuzzy encryption.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing
    Shabbir, Maryam
    Shabbir, Ayesha
    Iwendi, Celestine
    Javed, Abdul Rehman
    Rizwan, Muhammad
    Herencsar, Norbert
    Lin, Jerry Chun-Wei
    IEEE ACCESS, 2021, 9 : 8820 - 8834
  • [2] Data Encryption as a Service in Mobile Cloud Computing
    Ibtihal, Mouhib
    Moulay Driss, El Ouadghiri
    Abdelali, El Bouchti
    Khalid, ZineDine
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2016, 11 (03): : 135 - 143
  • [3] Enhancing Data Security Using AES Encryption Algorithm in Cloud Computing
    Rajput, Snehal
    Dhobi, J. S.
    Gadhavi, Lata J.
    PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS: VOL 2, 2016, 51 : 135 - 143
  • [4] An Optimized Solution for Mobile Environment Using Mobile Cloud Computing
    Liu, Qingfeng
    Jian, Xie
    Hu, Jicheng
    Zhao, Hongchen
    Zhang, Shanshan
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 5483 - +
  • [5] ENCRYPTION AS A SERVICE FOR SECURING DATA IN MOBILE CLOUD COMPUTING
    Mouhib, Ibtihal
    Driss, El Ouadghiri
    Zine-Dine, Khalid
    2015 15TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2015, : 546 - 550
  • [6] Enhancing Data and Privacy Security in Mobile Cloud Computing through Quantum Cryptography
    Han, Jiawei
    Liu, Yanheng
    Sun, Xin
    Song, Lijun
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 398 - 401
  • [7] A Hybrid Model Encryption for Enhancing Data Security in Cloud Computing
    Zibouh, Ouadia
    Dalli, Anouar
    Drissi, Hilal
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT THROUGH VISION 2020, 2019, : 3840 - 3849
  • [8] A location-dependent data encryption approach for enhancing mobile information system security
    Liao, Hsien-Chou
    Lee, Po-Ching
    Chao, Yun-Hsiang
    Chen, Chin-Ling
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 625 - +
  • [9] CLOUD COMPUTING DATA SECURITY USING ENCRYPTION ALGORITHMS
    Rithvik, Kumar
    Kaur, Simran
    Sejwal, Shilpa
    Narwal, Priti
    Jain, Prateek
    IIOAB JOURNAL, 2019, 10 (02) : 75 - 82
  • [10] Mobile Device Data Security: A Cryptographic Approach by Outsourcing Mobile data to Cloud
    Sujithra, M.
    Padmavathi, G.
    Narayanan, Sathya
    GRAPH ALGORITHMS, HIGH PERFORMANCE IMPLEMENTATIONS AND ITS APPLICATIONS (ICGHIA 2014), 2015, 47 : 480 - 485