Ghost Encryption: Mobile data security model for encrypting data before moving it to the Cloud Service Provider

被引:0
|
作者
Armel, Arokia Susai Raja [1 ]
Thavavel, V. [1 ]
机构
[1] Karunya Univ, Dept Comp Applicat, Coimbatore 641114, Tamil Nadu, India
关键词
Cloud computing; Encryption; Data security; Mobile computing;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud Computing is the current technology that revolutionize the mobile and IT industry. Most of the mobile vendors are providing extended data storage over the cloud either with the third party cloud service provider such as Samsung Android smart phones with DropBox storage. On the other hand, Apple iPhone and Windows Phone has their own cloud data storage such as iCloud and SkyDrive respectively. However, mobile phone cloud application users are hesitant to move their data from their mobile phone to the cloud service provider because of increasing data security and privacy concern. In this paper, a mobile data security encryption model is proposed to encounter this problem. With the technical advancement in the mobile and cloud computing, an encryption algorithm is designed known as Ghost, Geometric Host for Mobile Data Security.
引用
收藏
页码:512 / 516
页数:5
相关论文
共 50 条
  • [21] Security as a Service using Data Steganography in Cloud
    Ramachandran, Anitha Balaji
    Paramjothi, Pradeepan
    Mukherjee, Saswati
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2013), 2013, : 81 - 90
  • [22] Applying encryption algorithm to enhance data security in cloud storage
    Laboratory of Research in Informatics and Telecommunication , University of Mohammed V,Faculty of Science, Rabat, Morocco
    Eng. Lett., 4 (277-282):
  • [23] Applying Encryption Algorithm to Enhance Data Security in Cloud Storage
    Kartit, Zaid
    El Marraki, Mohamed
    ENGINEERING LETTERS, 2015, 23 (04) : 277 - 282
  • [24] Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud
    Qureshi, Muhammad Bilal
    Qureshi, Muhammad Shuaib
    Tahir, Saqib
    Anwar, Aamir
    Hussain, Saddam
    Uddin, Mueen
    Chen, Chin-Ling
    SYMMETRY-BASEL, 2022, 14 (04):
  • [25] Enhancing mobile data security using red panda optimized approach with chaotic fuzzy encryption in mobile cloud computing
    Garg, Vishal
    Kaur, Bikrampal
    Jangra, Surender
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (23):
  • [26] Hybrid Data Security Model for Cloud
    Sood, Sandeep K.
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2013, 3 (03) : 50 - 59
  • [27] Security Model for Securing Data on Cloud
    Madni, Ahmad Fayyaz
    Shah, Munam Ali
    2022 17TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES (ICET'22), 2022, : 206 - 211
  • [28] Data Security Model for Cloud Computing
    Dai Yuefa
    Wu Bo
    Gu Yaqiang
    Zhang Quan
    Tang Chaojing
    PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 141 - 144
  • [29] An Efficient Scheme to Ensure Data Availability for a Cloud Service Provider
    Kang, Seungmin
    Veeravalli, Bharadwaj
    Aung, Khin Mi Mi
    Jin, Chao
    2014 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2014,
  • [30] Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System
    Prakash, G. L.
    Prateek, Manish
    Singh, Inder
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROPAGATION AND COMPUTER TECHNOLOGY (ICSPCT 2014), 2014, : 624 - 629