Security Enhancement in Cryptography for Mobile Device Outsourced in Cloud Computing

  • et al.
N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Mobile devices often store data in cloud computing storage based on the increasing availability of the users. But security is the major issue in cloud computing. Sensitive information is stored and provided across internet to make sure that the data is protected with security. In this paper, the concept of data privacy is given more importance with regard to the major problem of reducing outsourced data usage. Mobile computing has memory storage and power resources as limitations. But cryptography is a concept which provides some sort of security enhancement that ensures the authentication and the availability of data integrity with confidentiality. Certain algorithms are used for ensuring an increase in security such as AES, DES, and Blowfish. Experimental results are computed and analyzed to level up the performance using cryptographic algorithms. Results are shown in order to assure resistance among the above techniques. Choosing an apt algorithm will quench the requirements of the future.

Cite

CITATION STYLE

APA

Krishnan R*, H., John, A., … Mary R, V. L. (2020). Security Enhancement in Cryptography for Mobile Device Outsourced in Cloud Computing. International Journal of Innovative Technology and Exploring Engineering, 9(8), 971–975. https://doi.org/10.35940/ijitee.h6780.069820

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free