An Efficient Model for Privacy and Security in Mobile Cloud Computing

被引:0
|
作者
Ragini [1 ]
Mehrotra, Parul [1 ]
Venkatesan, S. [1 ]
机构
[1] Indian Inst Informat Technol, Div Cyber Laws & Informat Secur, Allahabad 211012, Uttar Pradesh, India
关键词
Mobile Cloud Computing; Identity Based Encryption (IBE); Privacy&Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Cloud Computing has emerged as a promising technology and its application is expected to expand its features in storing personal health information, e-governance and others. Although data security and privacy have been the major concern to the users. These issues originated from the fact that the cloud is a semi-trusted environment and the sensitive information stored in the cloud can be accessed by any unauthorized person. Thus, new methods and models are needed to solve the problem of privacy and security of data owner. In this paper, we attempt to address the concern of privacy and security of data owner. We first present a Mobility Node Model (MNM) where mobile client is coming from the external environment to the organization. Here data owner provides access of cloud data to mobile client via proxy server without revealing its identity. Second we propose a Centralized Owner Model (COM) as a centralized control mechanism which generates, key, group member details and mobile client accessibility for external and internal environment. Here request of mobile client is propagated via Trusted Leader to achieve optimality in terms of minimizing computation and communication overheads. The analysis of our proposed models demonstrate the efficiency to achieve the privacy and security in mobile cloud computing.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Efficient Privacy-Preserving Authentication Protocol for Mobile Cloud Computing Services
    Xiong L.
    Peng D.
    Peng T.
    Liang H.
    Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2019, 54 (01): : 202 - 210
  • [32] Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
    He, Debiao
    Kumar, Neeraj
    Khan, Muhammad Khurram
    Wang, Lina
    Shen, Jian
    IEEE SYSTEMS JOURNAL, 2018, 12 (02): : 1621 - 1631
  • [33] Enabling Efficient Decentralized and Privacy Preserving Data Sharing in Mobile Cloud Computing
    Zhang, Jiawei
    Lu, Ning
    Li, Teng
    Ma, Jianfeng
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [34] An Energy Efficient Data Privacy Scheme for IoT Devices in Mobile Cloud Computing
    Bahrami, Mehdi
    Khan, Arshia
    Singhal, Mukesh
    2016 5TH IEEE INTERNATIONAL CONFERENCE ON MOBILE SERVICES (MS 2016), 2016, : 190 - 195
  • [35] An exploration of security and privacy among cloud computing
    Chen, Chih-Yung
    Tu, Jih-Fu
    INNOVATION, COMMUNICATION AND ENGINEERING, 2014, : 219 - 222
  • [36] On Current Trends in Security and Privacy of Cloud Computing
    Sahin, Serap
    2013 7TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2013, : 171 - 175
  • [37] A Review on Privacy and Security Assessment of Cloud Computing
    Jain, Khushboo
    Gupta, Manali
    Abraham, Ajith
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2021, 16 (05): : 161 - 168
  • [38] A Novel Cloud Computing Algorithm of Security and Privacy
    Chen, Chih-Yung
    Tu, Jih-Fu
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [39] Security and Privacy Challenges in Vehicular Cloud Computing
    Lu, Rongxing
    Rahulamathavan, Yogachandran
    Zhu, Hui
    Xu, Chang
    Wang, Miao
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [40] SECURITY AND PRIVACY OF CONNECTED VEHICULAR CLOUD COMPUTING
    Li, Hongwei
    Lu, Rongxing
    Misic, Jelena
    Mahmoud, Mohamed
    IEEE NETWORK, 2018, 32 (03): : 4 - 6