Achieving an Effective Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing

Authors(3) :-S R V Durga Bhavani, Dr. K V V S Narayana Murthy, Dr. D. Mohan Reddy

Mobile device has restricted capacity and constrained computing resources so data can be put away on mobile cloud processing .Any client can transfer data on that cloud additionally anybody can get to that data, so there is security issue identified with that data in this way, we have to give security to that data to keep from unapproved client. Presently a day, the cloud computing turns out to be better known however the security isn't given in productive way. The issues identified with security is expands step by step. A few algorithms are intended to give security to cloud computing however those are not proficient for portable cloud computing so we outline LDSS-CP-ABE algorithm for give security to the mobile cloud computing. LDSS moves major computational overhead from portable customer side devices utilizing intermediary servers. Likewise we can utilize lethargic re-encryption technique which can lessen tedious process. Lightweight secure data sharing plan can decrease the computational overhead on the customer side mobile device when clients are sharing their data on portable cloud. Likewise we utilize the AES (Advance Standard Encryption) algorithm for data encryption and unscrambling reason.

Authors and Affiliations

S R V Durga Bhavani
PG Scholar, Department of Computer Science and Engineering, Amalapuram Institute of Management Sciences and College of Engineering, Mummidivaram, East Godavari District, Andhra Pradesh, India
Dr. K V V S Narayana Murthy
Professor, Computer Science and Engineering, Amalapuram Institute of Management Sciences and College of Engineering, Mummidivaram, East Godavari District, Andhra Pradesh, India
Dr. D. Mohan Reddy
Professor & Principal, Amalapuram Institute of Management Sciences and College of Engineering, Mummidivaram, East Godavari District, Andhra Pradesh, India

Mobile Cloud Computing, Data Encryption, Access control, User revocation.

  1. Maheshwari U, Vingralek R, Shapiro W. "How to build a trusted database system on untrusted storage. in: Proceedings of the 4th conference on Symposium on Operating System Design & Implementation-Volume 4". USENIX Association, pp. 10-12, 2000.
  2. Kan Yang, XiaohuaJia, KuiRen: "Attribute-based fine-grained access control with efficient revocation in cloud storage systems". ASIACCS 2013, pp. 523-528, 2013.
  3. Crampton J, Martin K, Wild P. "On key assignment for hierarchical access control. in: Computer Security Foundations Workshop". IEEE press, pp. 14-111, 2006.
  4. Shi E, Bethencourt J, Chan T H H, et al. "Multi-dimensional range query over encrypted data. in: Proceedings of Symposium on Security and Privacy (SP)", IEEE press, 2007. 350364
  5. Cong Wang, KuiRen, Shucheng Yu, and KarthikMahendraRajeUrs."Achieving Usable and Privacy-assured Similarity Search over Outsourced Cloud Data". IEEE INFOCOM 2012, Orlando, Florida, March 25-30, 2012
  6. Yu S., Wang C., Ren K., Lou W. "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing". INFOCOM 2010, pp. 534-542, 2010
  7. Kan Yang, XiaohuaJia, KuiRen, Bo Zhang, RuitaoXie: "DACMACS: Effective Data Access Control for Multiauthority Cloud Storage Systems". IEEE Transactions on Data Forensics and Security, Vol. 8, No. 11, pp.1790 1801, 2013.
  8. Stehlé D, Steinfeld R. "Faster fully homomorphic encryption. in: Proceedings of 16th International Conference on the Theory and Application of Cryptology and Data Security". Singapore: Springer press, pp.377-394, 2010.
  9. Junzuo Lai, Robert H. Deng ,Yingjiu Li ,et al. "Fully secure key policy attribute-based encryption with constant-size ciphertexts and fast decryption. In: Proceedings of the 9th ACM symposium on Data, Computer and Communications Security" (ASIACCS), pp. 239-248, Jun. 2014.
  10. ChenglinShen, Heng He. "A Lightweight Secure Data Sharing Scheme for MobileCloud Computing". Ruixuan Li, Member, IEEE 2016.
  11. Gentry C, Halevi S. "Implementing gentry's fully-homomorphic encryption scheme. in: Advances in Cryptology–EUROCRYPT" 2011. Berlin, Heidelberg: Springer press, pp. 129-148, 2011.
  12. Brakerski Z, Vaikuntanathan V. "Efficient fully homomorphic encryption from (standard) LWE.in: Proceeding of IEEE Symposium on Foundations of Computer Science". California, USA: IEEE press, pp. 97-106, Oct. 2011.
  13. Qihua Wang, Hongxia Jin. "Data leakage mitigation for discertionary access control in collaboration clouds".the 16th ACM Symposium on Access Control Models and Technologies (SACMAT), pp.103-122, Jun. 2011.
  14. Adam Skillen and Mohammad Mannan.On "Implementing Deniable Storage Encryption for Mobile Devices.the 20th Annual Network and Cloud System Security Symposium (NDSS)", Feb. 2013.

Publication Details

Published in : Volume 4 | Issue 1 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 448-452
Manuscript Number : IJSRSET184199
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

S R V Durga Bhavani, Dr. K V V S Narayana Murthy, Dr. D. Mohan Reddy, " Achieving an Effective Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 1, pp.448-452, January-February-2018.
Journal URL : http://ijsrset.com/IJSRSET184199

Follow Us

Contact Us