International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015

Securing Mobile User Data in Cloud Computing Environment

Manoj M. Chavan, Poonam V. Gupta

Mobile Cloud Computing (MCC) combines dynamic fields of cloud computing, portable computing, wireless communication infrastructure, location services and mobile web. Using mobile cloud computing the user can access unlimited computing power and storage space. Data stored by mobile user on the cloud should be secured both from unauthorized access and cloud provider. Additionally mobile devices assessing the data are constrained in terms of resource such as storage space and computing power, so communication cost must be reduced. For securing the data stored on the cloud our proposed system uses attribute based encryption in which only the authorized user can access stored data by satisfying required attributes. Complex cryptographic operations are performed by cloud provider and trusted authority i.e manager thus relieving mobile user from heavy computational load. Whenever a user leaves group of authorized users re-encryption is performed on the encrypted data by cloud provider without intermediate decryption while preserving the integrity and privacy of user data.

Keywords: Mobile Cloud Computing, Cloud Computing, Security, Attribute Based Encryption, Re-Encryption

Edition: Volume 4 Issue 7, July 2015

Pages: 2488 - 2491


How to Cite this Article?

Manoj M. Chavan, Poonam V. Gupta, "Securing Mobile User Data in Cloud Computing Environment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB157114, Volume 4 Issue 7, July 2015, 2488 - 2491

26 PDF Views | 26 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Mobile Cloud Computing'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2611 - 2615

QoS Ensured Bandwidth Allocation in Mobile Cloud Computing

Mahesh D.S, Shalini Pawar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 988 - 992

A Survey on Attribute Based Encryption to Improve Efficiency in Semantic Search Over Cloud Data

Vina M. Lomte, Gauri S. Patil

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2554 - 2557

A Survey on Data Storage Security in Mobile Cloud Computing Environment

Manoj M. Chavan, Poonam Gupta

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1876 - 1882

Ensuring QoS-Guaranteed Bandwidth Shifting and Redistribution using Mobile Cloud Environment

Dr. K. Suresh Babu, Gardas Pavani

Share this article



Similar Articles with Keyword 'Cloud Computing'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2366 - 2370

A Survey on Multi-Keyword Ranked Query Search over Encrypted Cloud Storage

Jaikishan Tindwani, Aruna Gupta

Share this article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1949 - 1953

A Review: Data Security and Privacy Advancement Approach on Webos with Desktop-As-A-Service

Pooja Saini, Kanchan Narula

Share this article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1861 - 1865

Security Rudiments for SaaS Application Development and Deployment

Anand Singh

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1722 - 1729

Security on Cloud Computing: A Review

Rameshwari Malik

Share this article



Similar Articles with Keyword 'Security'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article



Similar Articles with Keyword 'Attribute Based Encryption'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1899 - 1902

Privacy Preservation in Cloud Using Attribute Based Encryption

T. Arokiaarun, D. Saveetha

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1314 - 1316

Pseudonym Generation with Combining the Identity Based and Attribute Based Encryption with Outsourced Revocation in Cloud Computing

Kirti Patil, Sonali Patil

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 988 - 992

A Survey on Attribute Based Encryption to Improve Efficiency in Semantic Search Over Cloud Data

Vina M. Lomte, Gauri S. Patil

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1122 - 1125

Improving Security of Traceable White-Box CPABE with TTP Access Control

Dilu Anil

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2579 - 2581

Decentralized Access Control of Data Stored In Cloud Using Attribute Based Encryption and Hidden Attributes

Sumedha Tathavadekar, Vikas Maral

Share this article



Similar Articles with Keyword 'Re-Encryption'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2618 - 2620

A Unified Scheme of Hierarchical Attribute-Based Encryption

Syeda Husna Mehanoor, Syeda Ayesha Thainiath

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3169 - 3172

A Survey on Secure Data Sharing and Collaboration Approaches in Cloud Computing

Prajakta Solapurkar, Girish Potdar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1644 - 1648

Survey on VANET Protocols and Security Techniques

Ashok Shivaji Dadali, Prof. Ram Joshi

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2488 - 2491

Securing Mobile User Data in Cloud Computing Environment

Manoj M. Chavan, Poonam V. Gupta

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 700 - 702

A Secure Decentralized Erasure for Code-Based Cloud Storage System

Shaik Fathima Zahera

Share this article
Top