Ghost Encryption: Mobile data security model for encrypting data before moving it to the Cloud Service Provider

被引:0
|
作者
Armel, Arokia Susai Raja [1 ]
Thavavel, V. [1 ]
机构
[1] Karunya Univ, Dept Comp Applicat, Coimbatore 641114, Tamil Nadu, India
关键词
Cloud computing; Encryption; Data security; Mobile computing;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud Computing is the current technology that revolutionize the mobile and IT industry. Most of the mobile vendors are providing extended data storage over the cloud either with the third party cloud service provider such as Samsung Android smart phones with DropBox storage. On the other hand, Apple iPhone and Windows Phone has their own cloud data storage such as iCloud and SkyDrive respectively. However, mobile phone cloud application users are hesitant to move their data from their mobile phone to the cloud service provider because of increasing data security and privacy concern. In this paper, a mobile data security encryption model is proposed to encounter this problem. With the technical advancement in the mobile and cloud computing, an encryption algorithm is designed known as Ghost, Geometric Host for Mobile Data Security.
引用
收藏
页码:512 / 516
页数:5
相关论文
共 50 条
  • [41] Performance Analysis of Attribute based Encryption and Cloud Health data Security
    Priyanka, J.
    Ramakrishnan, M.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS 2020), 2020, : 989 - 994
  • [42] Data Stream Analytics as Cloud Service for Mobile Applications
    Chen, Qiming
    Hsu, Meichun
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2010, PT II, 2010, 6427 : 709 - +
  • [43] Efficient sensitivity orient blockchain encryption for improved data security in cloud
    Siva Kumar, A.
    Godfrey Winster, S.
    Ramesh, R.
    CONCURRENT ENGINEERING-RESEARCH AND APPLICATIONS, 2021, 29 (03): : 249 - 257
  • [44] Cloud Data Life Cycle Security Issues and Research of Encryption Technology
    Li, Nengneng
    Zhang, Yongsheng
    Fan, Yueqin
    Chang, Liang
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY, 2016, 47 : 356 - 359
  • [45] Data Distribution and Encryption Modelling for PaaS-enabled Cloud Security
    Verginadis, Yiannis
    Patiniotakis, Ioannis
    Mentzas, Gregoris
    Veloudis, Simeon
    Paraskakis, Iraklis
    2016 8TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2016), 2016, : 497 - 502
  • [46] Enhancing Data Security Using AES Encryption Algorithm in Cloud Computing
    Rajput, Snehal
    Dhobi, J. S.
    Gadhavi, Lata J.
    PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS: VOL 2, 2016, 51 : 135 - 143
  • [47] AN INVESTIGATION ON THE TECHNIQUES USED FOR ENCRYPTION AND AUTHENTICATION FOR DATA SECURITY IN CLOUD COMPUTING
    Rajamani, Tamilarasi
    Sevugan, Prabu
    Purushotham, Swarnalatha
    IIOAB JOURNAL, 2016, 7 (05) : 126 - 138
  • [48] Data Value Chain as a Service Framework: for Enabling Data Handling, Data Security and Data Analysis in the Cloud
    Kasim, Henry
    Hung, Terence
    Li, Xiaorong
    PROCEEDINGS OF THE 2012 IEEE 18TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2012), 2012, : 804 - 809
  • [49] Cloud Service Model's Role in Provider and User Security Investment Incentives
    Yang, Mingwen
    Jacob, Varghese S.
    Raghunathan, Srinivasan
    PRODUCTION AND OPERATIONS MANAGEMENT, 2021, 30 (02) : 419 - 437
  • [50] ANALYSIS OF MOBILE DATA SERVICE MODEL
    Zhan, Yi
    Yuan, Jie
    Cheng, Nan
    Chen, Yanlei
    PROCEEDINGS OF 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND APPLICATIONS, 2009, : 958 - 961