Enhancing mobile data security using red panda optimized approach with chaotic fuzzy encryption in mobile cloud computing

被引:0
|
作者
Garg, Vishal [1 ]
Kaur, Bikrampal [2 ]
Jangra, Surender [3 ]
机构
[1] IKG Punjab Tech Univ, Dept Comp Sci & Engn, Jalandhar, Punjab, India
[2] Punjabi Univ, Dept Comp Engn, Patiala, Punjab, India
[3] GTB Coll, Dept Comp Applicat, Bhawanigarh Sangrur, Punjab, India
来源
关键词
chaotic fuzzy encryption; cloud computing; cloud storage; CPU utilization; offloading; red panda optimization; security; ENERGY;
D O I
10.1002/cpe.8243
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Smartphone devices have occupied an indispensable place in human life. These devices have some restrictions, like short lifetime of battery, imperfect computation power, less memory size and unpredictable network connectivity. Hence, a number of methods previously presented to decrease these restrictions as well as increase the battery lifespan with the help of offloading strategy. This manuscript proposes a new enhancing mobile data security using red panda optimized approach with chaotic fuzzy encryption in mobile cloud computing (RPO-CFE-SMC) to offload intensive computation tasks from mobile device to the cloud. The proposed model utilizes a red panda optimization algorithm (RPOA) to scale dynamically the offloading decision under energy consumption, CPU utilization, execution time, memory usage parameters. Before the work is transferred to the cloud, an innovative security layer is applied for encrypting the data using AES chaotic fuzzy encryption (CFE) technology. The proposed RPO-CFE-SMC method provides 20.63%, 25.25%, 25.28%, and 32.47% lower encryption time and 23.66%, 24.25%, and 26.47% lower energy consumption compared with existing EFFORT-SMC, EESH-SMC, and CP-ABE-SMC models respectively. In conclusion, the simulation results prove that the improved efficiency of proposed model in offloading computation to the cloud with enhanced data protection using chaotic fuzzy encryption.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] CHANGE DETECTION OF MOBILE LIDAR DATA USING CLOUD COMPUTING
    Liu, Kun
    Boehm, Jan
    Alis, Christian
    XXIII ISPRS CONGRESS, COMMISSION III, 2016, 41 (B3): : 309 - 313
  • [32] Open Architecture for Mobile Data Collection using Cloud Computing
    da Conceicao, Arlindo F.
    Sanchez, Jimmy V.
    Barabasz, Tiago
    Mamani-Aliaga, Alvaro H.
    dos Santos, Bruno G.
    Mendonca, Matheus F.
    2013 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2013), VOL 2, 2013, : 160 - 165
  • [33] Qualitative Exploration of Data Security Risks in Mobile Cloud Computing for Higher Education
    Qashou, Abeer M. Azem
    Bahar, Nurhidayah
    Mohamed, Hazura
    SECURITY AND PRIVACY, 2025, 8 (02):
  • [34] Editorial Note: Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing
    Multimedia Tools and Applications, 2017, 76 : 22669 - 22669
  • [35] A Novel Approach for Optimal Multimedia Data Distribution in Mobile Cloud Computing
    Hung, Pham Phuoc
    Aazam, Mohammad
    Nguyen, Tien-Dung
    Huh, Eui-Nam
    ADVANCES IN MULTIMEDIA, 2014, 2014
  • [36] A Hesitant Fuzzy Based Security Approach for Fog and Mobile-Edge Computing
    Rathore, Shailendra
    Sharma, Pradip Kumar
    Sangaiah, Arun Kumar
    Park, James J.
    IEEE ACCESS, 2018, 6 : 688 - 701
  • [37] Data Offloading in Mobile Cloud Computing: A Markov Decision Process Approach
    Liu, Dongqing
    Khoukhi, Lyes
    Hafid, Abdelhakim
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [38] Using Location Based Encryption to Improve the Security of Data Access in Cloud Computing
    Abolghasemi, Meer Soheil
    Sefidab, Mandi Mokarrami
    Atani, Reza Ebrahimi
    2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2013, : 261 - 265
  • [39] Authentication Scheme using Unique Identification method with Homomorphic Encryption in Mobile Cloud Computing
    Chean, Lim Tsu
    Ponnusamy, Vasaki
    Fati, Suliman Mohamed
    2018 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS & INDUSTRIAL ELECTRONICS (ISCAIE 2018), 2018, : 195 - 200
  • [40] Enhancing Security of Mobile Cloud Computing by Trust- and Role-Based Access Control
    Abdul, Arif Mohammad
    Mohammad, Arshad Ahmad Khan
    Venkat Reddy, P.
    Nuthakki, Praveena
    Kancharla, Rakesh
    Joshi, Rahul
    Kannaiya Raja, N.
    SCIENTIFIC PROGRAMMING, 2022, 2022