An Efficient Model for Privacy and Security in Mobile Cloud Computing

被引:0
|
作者
Ragini [1 ]
Mehrotra, Parul [1 ]
Venkatesan, S. [1 ]
机构
[1] Indian Inst Informat Technol, Div Cyber Laws & Informat Secur, Allahabad 211012, Uttar Pradesh, India
关键词
Mobile Cloud Computing; Identity Based Encryption (IBE); Privacy&Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Cloud Computing has emerged as a promising technology and its application is expected to expand its features in storing personal health information, e-governance and others. Although data security and privacy have been the major concern to the users. These issues originated from the fact that the cloud is a semi-trusted environment and the sensitive information stored in the cloud can be accessed by any unauthorized person. Thus, new methods and models are needed to solve the problem of privacy and security of data owner. In this paper, we attempt to address the concern of privacy and security of data owner. We first present a Mobility Node Model (MNM) where mobile client is coming from the external environment to the organization. Here data owner provides access of cloud data to mobile client via proxy server without revealing its identity. Second we propose a Centralized Owner Model (COM) as a centralized control mechanism which generates, key, group member details and mobile client accessibility for external and internal environment. Here request of mobile client is propagated via Trusted Leader to achieve optimality in terms of minimizing computation and communication overheads. The analysis of our proposed models demonstrate the efficiency to achieve the privacy and security in mobile cloud computing.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Security and Privacy in Mobile Cloud Computing
    Suo, Hui
    Liu, Zhuohua
    Wan, Jiafu
    Zhou, Keliang
    2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 655 - 659
  • [2] Special issue on security and privacy techniques in mobile cloud computing
    You, Ilsun
    Li, Jin
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2016, 7 (05) : 607 - 609
  • [3] Special issue on security and privacy techniques in mobile cloud computing
    Ilsun You
    Jin Li
    Journal of Ambient Intelligence and Humanized Computing, 2016, 7 : 607 - 609
  • [4] Security and Privacy in Cloud Computing
    Tari, Zahir
    IEEE CLOUD COMPUTING, 2014, 1 (01): : 54 - 57
  • [5] Security and Privacy in Cloud Computing
    Hamouda, Sara
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 241 - 245
  • [6] Security and Privacy in Cloud Computing
    Xiao, Zhifeng
    Xiao, Yang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02): : 843 - 859
  • [7] Security and Privacy in Cloud Computing
    Soni, Rajat
    Ambalkar, Smrutee
    Bansal, Pratosh
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [8] A Security Model for the Enhancement of Data Privacy in Cloud Computing
    Sharma, Yoshita
    Gupta, Himanshu
    Khatri, Sunil Kumar
    PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 898 - 902
  • [9] An Efficient Biometric Identification in Cloud Computing With Enhanced Privacy Security
    Liu, Chun
    Hu, Xuexian
    Zhang, Qihui
    Wei, Jianghong
    Liu, Wenfen
    IEEE ACCESS, 2019, 7 : 105363 - 105375
  • [10] Efficient Management of Security and Privacy Issues in Mobile Cloud Environment
    Jana, Debasish
    Bandyopadhyay, Debasis
    2013 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2013,