International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064




Downloads: 110

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014


A Survey on Data Storage Security in Mobile Cloud Computing Environment

Manoj M. Chavan [2] | Poonam Gupta [7]


Abstract: Cloud computing is a utility computing which provides computing, networking, storage space as a service to users through Internet. Users can automatically provision and de-provision resources on demand, paying charges for the capacity they use. Mobile cloud computing combines the power of mobile with cloud computing thus providing the user with unlimited pool of resource from cloud without hampering mobility of user. A mobile user storing data on the cloud can be read by the cloud service provider or hacked by man-in-middle attack, thus affecting user privacy and integrity. So data stored on the cloud should be encrypted, disallowing unauthorized user to access stored data. Mobile devices are resource constrained since they are battery powered, have less processing power and have less storage space. Any algorithm or technique used for securing mobile users data should take into account above constraints for effective uses of cloud for mobile users. In this paper we have provided a survey of different techniques for secure storage of mobile users data in the cloud, their merits and demerits for mobile environment.


Keywords: Security, Mobile Cloud Computing, Cloud computing


Edition: Volume 3 Issue 11, November 2014,


Pages: 2554 - 2557


How to Cite this Article?

Manoj M. Chavan, Poonam Gupta, "A Survey on Data Storage Security in Mobile Cloud Computing Environment", International Journal of Science and Research (IJSR), Volume 3 Issue 11, November 2014, pp. 2554-2557, https://www.ijsr.net/get_abstract.php?paper_id=OCT141548

How to Share this Article?






Similar Articles with Keyword 'Security'

Downloads: 123 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar | Mohan K [15]

Share this Article


Top