Secured information sharing in mobile cloud computing using access controls

2Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Presently usage of smart mobiles increasing, due to internet availability most of users outsourcing their data to cloud but it is untrusted, so a security mechanism needed in this work proposing Homomorphic cipher text policy-Attribute based encryption (HCP-ABE), it derived from classic ABE. “Mobile cloud computing are combinations of mobile computing and cloud computing”, mobile applications are designed and hosted in cloud computing without verifying about mobile environment. Security models are constructed using Perturbation methods as per literature. These models are not secure compared to cryptographic techniques. When perturbation methods are used, Data reconstruction becomes a significant challenge. Hence computations are complicated to perform. Furthermore, this method suffers a trade-off between accuracy and privacy and most of the research work focused on key management issues and static access policies but due to user dynamic the access control mechanism should design for proactive strategies. To support dynamic access control and operations HCP-ABE scheme intended. In this paper we identify challenges associated with mobile cloud-based security system and possible provide solutions to understand existing research work conducting compressive review on different access control mechanisms.

Cite

CITATION STYLE

APA

Masthan, K., & Venkatesh Sharma, K. (2019). Secured information sharing in mobile cloud computing using access controls. International Journal of Innovative Technology and Exploring Engineering, 8(12), 1559–1564. https://doi.org/10.35940/ijitee.L3120.1081219

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free