Outsourcing with secure accessibility in mobile cloud computing

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - April Issue 2013 by IJCTT Journal
Volume-4 Issue-4                           
Year of Publication : 2013
Authors :Monika Waghmare, Prof T.A.Chavan

MLA

Monika Waghmare, Prof T.A.Chavan "Outsourcing with secure accessibility in mobile cloud computing"International Journal of Computer Trends and Technology (IJCTT),V4(4):526-530 April Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: -Now a days a mobile device like a smart phone is becoming one of the major information processing devices for users. On the other hand, a mobile device is still resource constrained, and some applications, generally demand more resources than a mobile device can pay for. To overcome this, a mobile device should get resources from an external source. One of such sources present is cloud computing platforms. In Mobile Cloud computing generally front-end consist of users who possess mobile devices and back-end cloud servers. This pattern enables users to access a large volume of storage resources with portable devices in a distributed and cooperative manner. In between the times of uploading and downloading files or data, the privacy and integrity of files need to be guaranteed. In this paper a cloud platform is shaped for storage outsourcing, security necessities in mobile cloud are addressed and equivalent algorithms are addressed for guiding off-the-shelf implementation of mobile cloud communications.

 

References-
[1] Hoang T. Dinh, Chonho Lee, Dusit Niyato, and Ping Wang. A Survey of Mobile Cloud Computing: Architecture Applications, and Approaches,In Wireless Communications and Mobile Computing 2011.
[2] Xu L, Xing T, Zhong Y, et al. Secure data processing framework for mobile cloud computing. In: IEEE INFOCOM 2011 Workshop on Cloud Computing (INFOCOMW11). Shanghai, China, 2011: 711- 716.
[3] Priyank Singh Hada, Ranjita Singh, Mukul Manmohan. Security Agents: A Mobile Agent based Trust Model for Cloud Computing.In International Journal of Computer Applications (0975 – 8887) Volume 36– No.12, December 2011
[4] Wei Ren, Linchen Yu, Ren Gao, Feng Xiong.Lightweight and Compromise Resilient Storage Outsourcing with Distributed Secure Accessibility in Mobile Cloud Computing. Tsinghua Science And Technology,ISSNl1007-0214ll06/09llpp520 528.Volume 16, Number 5, October 2011.
[5] Manjunatha A, Ranabahu A, Sheth A, et al. Power of clouds in your pocket: An efficient approach for cloud mobile hybrid application development. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom10). Indianapolis, IN, USA, 2010: 496-503.

Keywords — Mobile cloud computing, cloud computing, cloud servers, mobile devices, integrity, privacy.