Ghost Encryption: Mobile data security model for encrypting data before moving it to the Cloud Service Provider

被引:0
|
作者
Armel, Arokia Susai Raja [1 ]
Thavavel, V. [1 ]
机构
[1] Karunya Univ, Dept Comp Applicat, Coimbatore 641114, Tamil Nadu, India
关键词
Cloud computing; Encryption; Data security; Mobile computing;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud Computing is the current technology that revolutionize the mobile and IT industry. Most of the mobile vendors are providing extended data storage over the cloud either with the third party cloud service provider such as Samsung Android smart phones with DropBox storage. On the other hand, Apple iPhone and Windows Phone has their own cloud data storage such as iCloud and SkyDrive respectively. However, mobile phone cloud application users are hesitant to move their data from their mobile phone to the cloud service provider because of increasing data security and privacy concern. In this paper, a mobile data security encryption model is proposed to encounter this problem. With the technical advancement in the mobile and cloud computing, an encryption algorithm is designed known as Ghost, Geometric Host for Mobile Data Security.
引用
收藏
页码:512 / 516
页数:5
相关论文
共 50 条
  • [31] Self-Encryption Scheme for Data Security in Mobile Devices
    Chen, Yu
    Ku, Wei-Shinn
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 850 - +
  • [32] Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing
    Gai, Keke
    Qiu, Meikang
    Zhao, Hui
    IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (04) : 678 - 688
  • [33] A Protect Solution for Data Security in Mobile Cloud Storage
    Yu, Xiaojun
    Wen, Qiaoyan
    FIFTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2012): ALGORITHMS, PATTERN RECOGNITION AND BASIC TECHNOLOGIES, 2013, 8784
  • [34] Reconsidering big data security and privacy in cloud and mobile cloud systems
    Tawalbeh, Lo'ai A.
    Saldamli, Gokay
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (07) : 810 - 819
  • [35] Enriched cloud computing data security through a triple level encryption model for healthcare systems
    Kanagaraj, Hari Priya
    Christo, Brintha Nalsingh
    International Journal of Cloud Computing, 2024, 13 (06) : 566 - 580
  • [36] Legal Requirements and Identifying Data Security for Cloud Service
    Godfrin
    2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM), 2016, : 185 - 191
  • [37] Towards performance evaluation of cloud service providers for cloud data security
    Ramachandran, Muthu
    Chang, Victor
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2016, 36 (04) : 618 - 625
  • [38] A cross encryption scheme for data security storage in cloud computing environment
    Kang, Haiyan
    Deng, Jie
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2023, 16 (01) : 1 - 10
  • [39] Enhanced Cloud Security Framework To Confirm Data Security on Asymmetric And Symmetric Key Encryption
    Jayapandian, N.
    Rahman, A. M. J. Md. Zubair
    Radhikadevi, S.
    Koushikaa, M.
    2016 WORLD CONFERENCE ON FUTURISTIC TRENDS IN RESEARCH AND INNOVATION FOR SOCIAL WELFARE (STARTUP CONCLAVE), 2016,
  • [40] Hybrid Encryption Technique to Enhance Security of Health Data in Cloud Environment
    Dutta, Aritra
    Bose, Rajesh
    Roy, Sandip
    Sutradhar, Shrabani
    ARCHIVES OF PHARMACY PRACTICE, 2023, 14 (03) : 41 - 47