Resource Sharing Security in Cloud Computing Environment

Although Cloud Computing is a great innovation in the world of computing, there also exist downsides of cloud computing. These most important challenges are Security & Privacy of data on the cloud, check availability of data on the cloud. For these problems, Data storage security refers to the security of data on the storage media. Security is an important factor in cloud computing for ensuring clients data is placed on the secure mode in the cloud. The third party must not be stealing Data so authentication of client becomes a mandatory task. Security is very essential for applications where the sensitive data is transmitted. On the other hand, the encryption methods with minimal key size and minimal computations have to be selected as energy efficiency is also limitation of mobile applications. Therefore, there is a great need of encryption method with high levels of security and with minimal key size. Traditional Symmetric or Asymmetric encryption algorithms can be used for cloud computing to provide three cryptographic primitives, integrity, confidentiality and authentication. There are many drawbacks for Symmetric encryption algorithms such as key maintenance is a great problem faced in symmetric encryption methods and less security, level is the problem of asymmetric encryption methods even though key maintenance is easy. And there are many drawbacks of Asymmetric encryption algorithms such as those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. There for, the main target for ensuring security is to developed new hybrid cryptography protocol. This new security protocol using combination of both symmetric and asymmetric cryptographic techniques is proposed by merging both symmetric and asymmetric techniques by a way that avoids the disadvantages of the existing hybrid protocols. We developed Five new hybrid cryptography protocol for achieving security in Mobile Cloud Computing. In proposed protocol the plain text divided into two parties, the first part is encrypted using encryption scheme and the second part encrypted using anther encryption scheme. These two schemes have occurred simultaneously so that the time required making encryption to all plain text is small because two schemes done in parallel way. We can obtain much security with a little time in this proposed protocol. The Proposed protocol has been proposed to achieve the security services such as Authentication, Confidentiality, Integrity, Non-Repudiation and Availability. The results show the superiority of NHCP algorithms over other algorithms in terms of the encryption and decryption time, processing time, and throughput

[1]  Salah M. El-Sayed,et al.  Developing and Evaluation of New Hybrid Encryption Algorithms , 2014, BIOINFORMATICS 2014.

[3]  Salah M. El-Sayed,et al.  Elastic framework for augmenting the performance of mobile applications using cloud computing , 2013, 2013 9th International Computer Engineering Conference (ICENCO).

[4]  Sunil Kumar,et al.  Security Issues in Mobile Ad Hoc Networks: A Survey , 2016 .

[5]  Bo Li,et al.  Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications , 2013, IEEE Wireless Communications.

[6]  Henri E. Bal,et al.  Ibis for mobility: solving challenges of mobile computing using grid techniques , 2009, HotMobile '09.

[7]  Mais Nijim,et al.  Survey on Three Components of Mobile Cloud Computing: Offloading, Distribution and Privacy , 2017 .

[8]  Jiafu Wan,et al.  Security and privacy in mobile cloud computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[9]  Mohey M. Hadhoud,et al.  Wireless Network Security Still Has no Clothes , 2011, Int. Arab. J. e Technol..

[10]  Gernot Heiser,et al.  An Analysis of Power Consumption in a Smartphone , 2010, USENIX Annual Technical Conference.

[11]  Athanasios V. Vasilakos,et al.  SeDaSC: Secure Data Sharing in Clouds , 2017, IEEE Systems Journal.

[12]  Rajkumar Buyya,et al.  Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges , 2014, IEEE Communications Surveys & Tutorials.

[13]  Gustavo Alonso,et al.  Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications , 2009, Middleware.

[14]  E. Wadhwa,et al.  Performance Comparison of Single and Multipath Routing Protocols in Adhoc Networks , 2011 .

[15]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[16]  Salah M. El-Sayed,et al.  Increasing The Performance Of Mobile Smartphones Using Partition And Migration Of Mobile Applications To Cloud Computing , 2014 .

[17]  Feng Xia,et al.  Context-Aware Mobile Cloud Computing and Its Challenges , 2015, IEEE Cloud Computing.

[18]  Athanasios V. Vasilakos,et al.  Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..

[19]  Rajkumar Buyya,et al.  Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges , 2013, IEEE Communications Surveys & Tutorials.

[20]  Mazliza Othman,et al.  A Survey of Mobile Cloud Computing Application Models , 2014, IEEE Communications Surveys & Tutorials.

[21]  Feng Xia,et al.  Rich Mobile Applications: Genesis, taxonomy, and open issues , 2014, J. Netw. Comput. Appl..

[22]  Gurjeet Singh,et al.  Security Threats and Maintaince in Mobile Adhoc Networks , 2011 .

[23]  Darshan Bhole,et al.  A New Security Protocol Using Hybrid Cryptography Algorithms , 2016 .