Loading

TDWOA: Effective Triple DES with Whale Optimization Algorithm for Trust Based Offloading System
M. S. Premalatha1, B. Ramakrishnan2

1M. S. Premalatha, Research Scholar, Manonmanium Sundaranar University, Abishekapatti, Thirunelveli, Tamil Nadu, India.

2Dr. B. Ramakrishnan, Associate Professor, Department of Computer Science and Research Centre, S.T. Hindu College, Nagercoil, Tamil Nadu, India.

Manuscript received on 05 February 2019 | Revised Manuscript received on 12 February 2019 | Manuscript Published on 13 February 2019 | PP: 395-403 | Volume-8 Issue- 4S February 2019 | Retrieval Number: DS2895028419/2019©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In Mobile Cloud Computing (MCC), offloading may be a fashionable scheme projected to reinforce the characteristics of portable devices by extenuating complex calculations to capable cloud servers. Efficiency in security and energy consumption point of view, offloading is most important. It actually demonstrates the new disputes over security vulnerabilities by the unauthorized users. Among doable security problems are temporal arrangement threads that aren’t secured by ancient scientific discipline security. Therefore, the first intension is to propose secure and economical offloading approach to writing methodology to be performed with the assistance of Triple DES rule personal key by activity server and also the optimum key choice is completed by the “Whale Optimization algorithm (WOA)”. The experimental results are presented to ensure the efficiency of this research. The proposed TDWOA technique is analyzed with various existing algorithms to ensure the security over computational offloading in cloud.

Keywords: Offloading, Trust Management, Encryption, Whale Optimization, Triple DES.
Scope of the Article: Computer Science and Its Applications