An Efficient Model for Privacy and Security in Mobile Cloud Computing

被引:0
|
作者
Ragini [1 ]
Mehrotra, Parul [1 ]
Venkatesan, S. [1 ]
机构
[1] Indian Inst Informat Technol, Div Cyber Laws & Informat Secur, Allahabad 211012, Uttar Pradesh, India
关键词
Mobile Cloud Computing; Identity Based Encryption (IBE); Privacy&Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Cloud Computing has emerged as a promising technology and its application is expected to expand its features in storing personal health information, e-governance and others. Although data security and privacy have been the major concern to the users. These issues originated from the fact that the cloud is a semi-trusted environment and the sensitive information stored in the cloud can be accessed by any unauthorized person. Thus, new methods and models are needed to solve the problem of privacy and security of data owner. In this paper, we attempt to address the concern of privacy and security of data owner. We first present a Mobility Node Model (MNM) where mobile client is coming from the external environment to the organization. Here data owner provides access of cloud data to mobile client via proxy server without revealing its identity. Second we propose a Centralized Owner Model (COM) as a centralized control mechanism which generates, key, group member details and mobile client accessibility for external and internal environment. Here request of mobile client is propagated via Trusted Leader to achieve optimality in terms of minimizing computation and communication overheads. The analysis of our proposed models demonstrate the efficiency to achieve the privacy and security in mobile cloud computing.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Security and privacy for storage and computation in cloud computing
    Wei, Lifei
    Zhu, Haojin
    Cao, Zhenfu
    Dong, Xiaolei
    Jia, Weiwei
    Chen, Yunlu
    Vasilakos, Athanasios V.
    INFORMATION SCIENCES, 2014, 258 : 371 - 386
  • [42] Cloud computing security and privacy: Standards and regulations
    Yu, Yong
    Miyaji, Atsuko
    Au, Man Ho
    Susilo, Willy
    COMPUTER STANDARDS & INTERFACES, 2017, 54 : 1 - 2
  • [43] Confidential Computing: Elevating Cloud Security and Privacy
    Russinovich, Mark
    COMMUNICATIONS OF THE ACM, 2024, 67 (01) : 52 - 53
  • [44] Confidential Computing: Elevating Cloud Security and Privacy
    Russinovich M.
    Queue, 2023, 21 (04): : 44 - 48
  • [45] Security and Privacy in Cloud Computing: Technical Review
    Abdulsalam, Yunusa Simpa
    Hedabou, Mustapha
    FUTURE INTERNET, 2022, 14 (01)
  • [46] Security and Privacy Challenges in Cloud Computing Environments
    Takabi, Hassan
    Joshi, James B. D.
    Ahn, Gail-Joon
    IEEE SECURITY & PRIVACY, 2010, 8 (06) : 24 - 31
  • [47] Challenges on Privacy and Reliability in Cloud Computing Security
    Tse, Daniel W. K.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1180 - 1186
  • [48] Data Security and Privacy Protection of Cloud Computing
    Dai Xuebing
    Wang Zhaojing
    Zhang Yan
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1570 - +
  • [49] Mobile cloud computing: Architecture and Security
    Wang, Suzhen
    Du, Zhijuan
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2274 - 2281
  • [50] Mobile Cloud Computing: Security Threats
    Vikas, Solanke S.
    Gurudatt, Kulkarni A.
    Pawan, Katgaonkar
    Shyam, Gupta
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,