A Survey on Data Storage Security in Mobile Cloud Computing Environment
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

A Survey on Data Storage Security in Mobile Cloud Computing Environment

Manoj M. Chavan, Poonam Gupta

Cloud computing is a utility computing which provides computing, networking, storage space as a service to users through Internet. Users can automatically provision and de-provision resources on demand, paying charges for the capacity they use. Mobile cloud computing combines the power of mobile with cloud computing thus providing the user with unlimited pool of resource from cloud without hampering mobility of user. A mobile user storing data on the cloud can be read by the cloud service provider or hacked by man-in-middle attack, thus affecting user privacy and integrity. So data stored on the cloud should be encrypted, disallowing unauthorized user to access stored data. Mobile devices are resource constrained since they are battery powered, have less processing power and have less storage space. Any algorithm or technique used for securing mobile users data should take into account above constraints for effective uses of cloud for mobile users. In this paper we have provided a survey of different techniques for secure storage of mobile users data in the cloud, their merits and demerits for mobile environment.

Keywords: Security, Mobile Cloud Computing, Cloud computing

Edition: Volume 3 Issue 11, November 2014

Pages: 2554 - 2557

Share this Article

How to Cite this Article?

Manoj M. Chavan, Poonam Gupta, "A Survey on Data Storage Security in Mobile Cloud Computing Environment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141548, Volume 3 Issue 11, November 2014, 2554 - 2557

43 PDF Views | 39 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Security'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'Mobile Cloud Computing'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1129 - 1135

Mobile Cloud Computing Applied in Social TV

K Ramu, A Jyothi

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2067 - 2070

A Survey on QOS Guaranteed Bandwidth Shifting and Redistribution in Mobile Cloud Environment

Swati Nagpure

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2488 - 2491

Securing Mobile User Data in Cloud Computing Environment

Manoj M. Chavan, Poonam V. Gupta

Share this Article

Similar Articles with Keyword 'Cloud computing'

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment ? A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Masters Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 130 - 134

Implementation of Client-Side Deduplication on Encrypted Data with Public Auditing in Cloud Storage

Lekhashree N R, Shashidhara M S, Santhosh S

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article
Top