Loading

Protecting Data on Mobile Cloud Computing
Vikram Patalbansi1, G.Prasanna Laxmi2

1Vikram Patalbansi, Assist. Professor , L.B.H.S.S.T’s ICA Bandra Mumbai , Research Scholar Pacific University Udaipur.
2Dr G. Prasanna Laxmi, WOS – A Program(DST), Trainer, HMI Engineering Services.
Manuscript received on 27 August 2019. | Revised Manuscript received on 07 September 2019. | Manuscript published on 30 September 2019. | PP: 3453-3459 | Volume-8 Issue-11, September 2019. | Retrieval Number: K25740981119/2019©BEIESP | DOI: 10.35940/ijitee.K2574.0981119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Mobile Cloud Computing is a combination of general Cloud Computing and Mobile Computing in which we have to access resources from the remote cloud data center with the help of mobile electronics and peripherals like mobile smartphones, laptops, gadgets, etc. via Cellular Technology or Wireless Communication. Mobile devices have lots of resource constraints like storage capacity, processing speed, and battery life. Hence through simple mobile computing software and programming, we cannot manipulate on mobile devices of cloud data center information. Because of such kinds of difficulty, we have to process information or data through external mobile devices. Accessing and processing of data with the help of Trusted Third Party Agency (TPA) outside the cloud data center and mobile devices have lots of security challenges. To make cloud data secure over outside resources, lots of terminologies and theory are put forward by various researchers. In this paper, we will analyze their theory and its limitations and offer our security algorithm proposal. In this thesis article, we analyze the security framework for storing data on Cloud Server by Mobile and limitation of this process. Also, we review the theory of how data can be secure our data on cloud administrators.
Keywords: Mobile Cloud Computing, Security algorithm of cloud, Wireless security
Scope of the Article: Mobile Cloud Computing and Application Services