Enhancing mobile data security using red panda optimized approach with chaotic fuzzy encryption in mobile cloud computing

被引:0
|
作者
Garg, Vishal [1 ]
Kaur, Bikrampal [2 ]
Jangra, Surender [3 ]
机构
[1] IKG Punjab Tech Univ, Dept Comp Sci & Engn, Jalandhar, Punjab, India
[2] Punjabi Univ, Dept Comp Engn, Patiala, Punjab, India
[3] GTB Coll, Dept Comp Applicat, Bhawanigarh Sangrur, Punjab, India
来源
关键词
chaotic fuzzy encryption; cloud computing; cloud storage; CPU utilization; offloading; red panda optimization; security; ENERGY;
D O I
10.1002/cpe.8243
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Smartphone devices have occupied an indispensable place in human life. These devices have some restrictions, like short lifetime of battery, imperfect computation power, less memory size and unpredictable network connectivity. Hence, a number of methods previously presented to decrease these restrictions as well as increase the battery lifespan with the help of offloading strategy. This manuscript proposes a new enhancing mobile data security using red panda optimized approach with chaotic fuzzy encryption in mobile cloud computing (RPO-CFE-SMC) to offload intensive computation tasks from mobile device to the cloud. The proposed model utilizes a red panda optimization algorithm (RPOA) to scale dynamically the offloading decision under energy consumption, CPU utilization, execution time, memory usage parameters. Before the work is transferred to the cloud, an innovative security layer is applied for encrypting the data using AES chaotic fuzzy encryption (CFE) technology. The proposed RPO-CFE-SMC method provides 20.63%, 25.25%, 25.28%, and 32.47% lower encryption time and 23.66%, 24.25%, and 26.47% lower energy consumption compared with existing EFFORT-SMC, EESH-SMC, and CP-ABE-SMC models respectively. In conclusion, the simulation results prove that the improved efficiency of proposed model in offloading computation to the cloud with enhanced data protection using chaotic fuzzy encryption.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Enhancing Data Retrieval Using Fuzzy Keywords and Data Security Using Feistal Encryption Algorithm
    Dhamija, Jalendu
    Rawat, Kaumudi
    Choudhury, Tanupriya
    Kumar, Praveen
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT 2018), 2018, : 257 - 262
  • [42] Ghost Encryption: Mobile data security model for encrypting data before moving it to the Cloud Service Provider
    Armel, Arokia Susai Raja
    Thavavel, V.
    2013 FIFTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2013, : 512 - 516
  • [43] A Context Aware Reputation Mechanism for Enhancing Big Data Veracity in Mobile Cloud Computing
    Lin, Hui
    Hu, Jia
    Liu, Jiajia
    Xu, Li
    Wu, Yulei
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 2049 - 2058
  • [44] Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues
    Bhatia, Tarunpreet
    Verma, A. K.
    JOURNAL OF SUPERCOMPUTING, 2017, 73 (06): : 2558 - 2631
  • [45] Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues
    Tarunpreet Bhatia
    A. K. Verma
    The Journal of Supercomputing, 2017, 73 : 2558 - 2631
  • [46] Cloud Path Selection using Fuzzy Analytic Hierarchy Process for Offloading in Mobile Cloud Computing
    Singla, Chinu
    Kaushal, Sakshi
    2015 2ND INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN ENGINEERING & COMPUTATIONAL SCIENCES (RAECS), 2015,
  • [47] RAMWS: Reliable approach using middleware and WebSockets in mobile cloud computing
    Abdelfattah, Amr S.
    Abdelkader, Tamer
    EI-Horbaty, EI-Sayed M.
    AIN SHAMS ENGINEERING JOURNAL, 2020, 11 (04) : 1083 - 1092
  • [48] A mobile cloud computing framework for execution of data as a service using cloudlet
    Yadav, Santosh K.
    Kumar, Rakesh
    KUWAIT JOURNAL OF SCIENCE, 2021, 48 (03)
  • [49] Application Offloading Using Data Aggregation in Mobile Cloud Computing Environment
    Kumari, Raj
    Kaushal, Sakshi
    Roopali
    LEADERSHIP, INNOVATION AND ENTREPRENEURSHIP AS DRIVING FORCES OF THE GLOBAL ECONOMY, 2017, : 17 - 29
  • [50] Enhancing Data Security in Mobile Ad-hoc Network (MANETs) Using Trust-Based Approach with RSSI and Fuzzy Logic
    Alyoubi, Adel A.
    MOBILE NETWORKS & APPLICATIONS, 2024,