A Novel Framework to Develop an Efficient Secured Optimization Model for Mobile Cloud Computing

Authors

  • Mrs.Rafath Samrin  Associate Professor, Department of CSE (AI&ML), CMR Technical Campus, Hyderabad, India
  • Ms. Raheem Unnisa  Assistant Professor, Department of CSE, CMR Technical Campus, Hyderabad, India
  • Ms. Saba Sultana  Assistant Professor, Department of CSE, CMR Technical Campus, Hyderabad, India
  • Ms. Tabeen Fatima  Assistant Professor, Department of CSE, CMR Technical Campus, Hyderabad, India

Keywords:

Security, Computation Offloading, Smart Phones, Mobile Cloud Computing, Particle Swarm Optimization, Privacy, Data Security.

Abstract

Cloud computing made technological world as pay and use service. Communication technologies made human life comfortable. Mobile communication changes the world in all aspects. The combination of these give an efficient future which was proved already. Cell phone gadgets are generally utilized in our day to day routines. Be that as it may, these gadgets show restrictions, for example, short battery lifetime, restricted calculation power, little memory size and eccentric organization availability. Thusly, various arrangements have been proposed to relieve these restrictions and expand the battery lifetime with the utilization of the offloading procedure. In this paper, a novel system is proposed to offload concentrated calculation errands from the cell phone to the cloud. This structure utilizes an enhancement model to decide the offloading choice progressively founded on four primary boundaries, specifically, energy utilization, Computer processor use, execution time, and memory utilization. Likewise, another security layer is given to safeguard the moved information in the cloud from any assault. The exploratory outcomes demonstrated the way that the structure can choose a reasonable offloading choice for various kinds of versatile application errands while accomplishing huge execution improvement. Also, unique in relation to past methods, the system can safeguard application information from any danger.

References

  1. Ibrahim A. Elgendy, "An Efficient and Secured Framework for Mobile Cloud Computing", IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 9, NO. 1, JANUARY-MARCH 2021.
  2. Leavitt N, 2009, ‘Is Cloud Computing Really Ready for Prime Time?’, Computer, Vol. 42, pp. 15-20, 2009.
  3. Weinhardt C, Anandasivam A, Blau B, and Stosser J, ‘Business Models in the Service World’, IT Professional, vol. 11, pp. 28-33, 2009.
  4. M. Sulochana and Ojaswani Dubey, “Preserving Data Confidentiality using Multi-Cloud Architecture”, 2nd International Symposium on Big Data and Cloud Computing (ISBCC’15), Procedia Computer Science 50 ( 2015 ) 357 – 362.
  5. Ramgovind, Sumant, Mariki M. Eloff, and Elme Smith. "The management of security in cloud computing", In Information Security for South Africa (ISSA), 2010, pp. 1-7. IEEE, 2010.
  6. D. Huang and D. Medhi, “A Key-chain Based Keying Scheme For Many-to-Many Secure Group Communication,” ACM Transactions on Information and System Security, vol. 7, no. 4,pp. 523 – 552, 2004.
  7. Z. Zhou and D. Huang, “An optimal key distribution scheme for multicast group communication,” in IEEE Conference on Computer Communications (Infocom), 2010.
  8. A. Shamir, “How to Share a Secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979.
  9. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on Computer and communications security, pages 598–609. ACM, 2007.
  10. G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur., 9(1):1–30, 2006.
  11. J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attributebased encryption. In SP ’07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 321–334, Washington, DC, USA, 2007. IEEE Computer Society.
  12. D. Boneh, X. Boyen, and E.J. Goh. Hierarchical identity based encryption with constant size ciphertext. Advances in Cryptology–EUROCRYPT 2005, pages 440–456, 2005.
  13. Dr. Mahesh Kotha,"A Novel Frame Work to Improve Security and Performance Issues in Healthcare System using Cloud Computing", International Journal of Scientific Research in Science and Technology Print ISSN: 2395-6011 | Online ISSN: 2395-602X .
  14. Dr.Mahesh K, "A Survey on Predicting Uncertainty of Cloud Service Provider Towards Data Integrity and Economic" 2019 IJSRST | Volume 6 | Issue 1 | Print ISSN: 2395-6011 | Online ISSN: 2395-602X.
  15. D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. pages 535–554. Springer, 2007.
  16. M. Shiraz and A.Gani, “A lightweight active service migration framework for computational offloading in mobile cloud computing,” Journal of Supercomputing, Vol.68, No.2, pp. 978–995, 2014.
  17. Shiraz, A. Gani, A. Shamim, S.Khan, and R.W. Ahmad, “Energy efficient computational offloading framework for mobile cloud computing,” Journal of Grid Computing, Vol.13, No.1, pp. 1–18, 2015.
  18. W.Z. Zhang, H.C. Xie, and C.H. Hsu, “Automatic memory control of multiple virtual machines on a consolidated server,” IEEE Transactions on Cloud Computing, vol.5, no.1, pp. 2–14, 2017.
  19. Y. Li, M. Chen, W. Dai, and M. Qiu, “Energy optimization with dynamic task scheduling mobile cloud computing,” IEEE Systems Journal, No.99, pp. 1–10, 2017.
  20. J. Toldinas, R. Damasevicius, A. Venckauskas, T. Blazauskas, and J. Ceponis, “Energy consumption of cryptographic algorithms in mobile devices”, ElektronikaIrElektrotechnika, Vol. 20, No.5, pp. 158–161, 2014.
  21. Mahesh K, " Load Balancing Issues in Cloud Environment Using Virtual Machines to Handles Future Load Imbalances with Service Level Objects". Journal of Engineering, Computing and Architecture, ISSN NO: 1934-7197.
  22. Ravindra Changala, "Data Mining Techniques for Cloud Technology" in International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE),Volume 4, Issue 8, Pages 2319-5940, ISSN: 2278-1021, August 2015.
  23. Bharath Kumar Enesheti, Naresh Erukulla, Kotha Mahesh, “Edge Computing to Improve Resource Utilization and Security in the Cloud Computing System”, Journal Of Engineering, Computing &Architecture,ISSN NO:1934-7197, Volume 11, Issue 12, DECEMBER - 2021.

Downloads

Published

2022-06-30

Issue

Section

Research Articles

How to Cite

[1]
Mrs.Rafath Samrin, Ms. Raheem Unnisa, Ms. Saba Sultana, Ms. Tabeen Fatima "A Novel Framework to Develop an Efficient Secured Optimization Model for Mobile Cloud Computing" International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011,Volume 9, Issue 3, pp.599-609, May-June-2022.