Two-Phase Security Framework for Network Layer Communication in Ad Hoc Clouds
Niroj Kumar Pani1, Satyasundara Mahapatra2, Rati Ranjan Dash3
1Niroj Kumar Pani, Department of CSEA, IGIT, Saranga, Odisha, India.
2Satyasundara Mahapatra, Department of CSE, Pranveer Singh Institute of Technology, Kanpur, UP, India.
3Rati Ranjan Dash, Department of Mech Engg., CET, Bhubaneswar, Odisha, India.
Manuscript received on 02 July 2019 | Revised Manuscript received on 09 July 2019 | Manuscript published on 30 August 2019 | PP: 2280-2285 | Volume-8 Issue-10, August 2019 | Retrieval Number: J11340881019/2019©BEIESP | DOI: 10.35940/ijitee.J1134.0881019
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: An ad hoc cloud computing environment on the infrastructure point of view is formed by consuming resources from existing occasionally available computing setups that are primarily used for some other purposes, for example, personal computers, mobile phones and such similar devices connected to the internet. In this paper, we propose a mechanism to secure the network layer communications particularity routing and data packet forwarding in ad hoc cloud environment. The paper details the proposed scheme and analyses its robustness on the security perspective.
Keywords: Cloud computing, ad hoc cloud, security, routing, forwarding. I
Scope of the Article: Big Data Security