
Evolving Cryptographic Approach for Enhancing Security of Resource Constrained Mobile Device Outsourced Data in Cloud Computing
Author(s) -
K Kaviya,
K. K. Shanthini,
M. Sujithra
Publication year - 2019
Publication title -
international journal of scientific research in computer science, engineering and information technology
Language(s) - English
Resource type - Journals
ISSN - 2456-3307
DOI - 10.32628/cseit195111
Subject(s) - computer science , encryption , cloud computing , client side encryption , cryptography , mobile cloud computing , computer security , data security , mobile device , authentication (law) , computer network , on the fly encryption , operating system
Mobile cloud computing in the increasing popularity among users of mobile device enables to store their data in cloud. Security is the major concern when the sensitive information is stored and transferred across the internet. It is essential to make sure that the data is secured and protected. In this paper, we discussed the problem of privacy of data with reducing the resources usage. Moreover, mobile cloud computing has limitations in resources such as power energy, processor, Memory and storage. Cryptography ensures the confidentiality, authentication, availability, and integrity of the data. This is done through cryptographic algorithms such as Data Encryption Standard (DES), Blowfish and Advanced Encryption Standard (AES). The experimental results evaluated and compared the performance of the encryption algorithms. The performance metrics used are encryption and decryption time, CPU and Memory utilization. Evaluation results showed a significant improvement in reducing the resources, amongst all the techniques, choosing a suitable encryption algorithm based on different parameters that are best fit to the future user requirements is considered.