Satishkumar, A. and Vidhya, A. (2024) Data Security Complications on Computing Technology in Mobile Cloud. In: Advancements in Smart Computing and Information Security. Springer, pp. 357-367.
Full text not available from this repository. (Request a copy)Abstract
Mobile devices resource limitations are a direct result of mobile computing rapid development. Nowadays, the gadget that was primarily used to receive calls and compose messages in earlier decades is capable of handling almost all of the duties currently carried out by computers. On the other hand, the development of mobile computing can be changed by combining mobile and cloud computing techniques, creating a new process known as mobile cloud computing technology. A mobile handler is now released from the constrained emission of currently available mobile devices as the information is deposited in the cloud’s framework and the real implementation shifts to the cloud backdrop. Additionally, in order to utilize cloud services, wireless technology is used to transmit data between clouds and mobile devices. As a result, a few brand-new courses on privacy and security encounters are presented. Even if there are many disagreements, the resulting security elucidations have been projected and acknowledged in the literature by numerous researchers to counteract the experiments. Additionally, compare this effort based on various security and privacy preferences, and as a last point, discuss some open issues. This paper compares the existing RSA and AES algorithm with the proposed algorithm EMSA. The proposed algorithm shows more security than the existing algorithm and this can be used in cloud as well as mobile computing for storing confidential data.
Item Type: | Book Section |
---|---|
Subjects: | Computer Science Engineering > Cloud Computing |
Divisions: | Computer Science |
Depositing User: | Mr IR Admin |
Date Deposited: | 08 Oct 2024 09:48 |
Last Modified: | 08 Oct 2024 09:48 |
URI: | https://ir.vistas.ac.in/id/eprint/9478 |