Loading

Secured Information Sharing in Mobile Cloud Computing using Access Controls
Kaja Masthan1, K. Venkatesh Sharma2

1Kaja Masthan*, Reacher Scholar, Shri Jagdish Prasad Jhabarmal Tibrewala University, Rajasthan, India.
2Dr. K. Venkatesh Sharma, Professor, Dept of CSE, C.V.R. College of Engineering, Hyderabad, Telangana.

Manuscript received on September 17, 2019. | Revised Manuscript received on 23 September, 2019. | Manuscript published on October 10, 2019. | PP: 1559-1564 | Volume-8 Issue-12, October 2019. | Retrieval Number: L31201081219/2019©BEIESP | DOI: 10.35940/ijitee.L3120.1081219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Presently usage of smart mobiles increasing, due to internet availability most of users outsourcing their data to cloud but it is untrusted, so a security mechanism needed in this work proposing Homomorphic cipher text policy-Attribute based encryption (HCP-ABE), it derived from classic ABE. “Mobile cloud computing are combinations of mobile computing and cloud computing”, mobile applications are designed and hosted in cloud computing without verifying about mobile environment. Security models are constructed using Perturbation methods as per literature. These models are not secure compared to cryptographic techniques. When perturbation methods are used, Data reconstruction becomes a significant challenge. Hence computations are complicated to perform. Furthermore, this method suffers a trade-off between accuracy and privacy and most of the research work focused on key management issues and static access policies but due to user dynamic the access control mechanism should design for proactive strategies. To support dynamic access control and operations HCP-ABE scheme intended. In this paper we identify challenges associated with mobile cloud-based security system and possible provide solutions to understand existing research work conducting compressive review on different access control mechanisms.
Keywords: Cloud Computing, Mobile Cloud Computing (MCC) Access Controls, Homomorphic Encryption and ABE.
Scope of the Article: Cloud Computing