Earticle

현재 위치 Home

Securing Mobile Cloud Environment with Unified Reliable Encryption Algorithm, Security Key and Authentication

첫 페이지 보기
  • 발행기관
    보안공학연구지원센터(IJGDC) 바로가기
  • 간행물
    International Journal of Grid and Distributed Computing 바로가기
  • 통권
    Vol.8 No.5 (2015.10)바로가기
  • 페이지
    pp.153-164
  • 저자
    Buchanagandi Enock Nyamajeje, Huiqun Yu
  • 언어
    영어(ENG)
  • URL
    https://www.earticle.net/Article/A257194

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

원문정보

초록

영어
Building applications on on-demand infrastructures instead of building applications on fixed and rigid infrastructures was provided by cloud computing providers. By simply positing into the cloud, it gains fast access to business applications or infrastructure resources with reduced Capital Expenditures (CAPEX). Dramatic increase in amount of information’s are placed into the cloud by individuals and industries, security issues are vital concern in mobile computing (MCC) and impends fast deployment of applications on the cloud. This work discus the different security issues that arises about how safe the mobile cloud computing environment is and provides a unified reliable security mechanism. There are two different types of the cloud users are: On-demand and Optimistic. On-demand is a non-preemptible for flexible leases given a user accessing to the resources within an interactive time of making the request and makes the resources available for an agreed-upon period of time, user can deploy any virtual machine (VM) compatible with the system. Optimistic is preemptible and pre-set contract gives a user access to resources at an indeterminate time and make resources available to the user for an insufficient amount of time. After that, this resources are initially (pre)-defined for the user by the cloud admin, that is the user cannot provide his or her own virtual machine (VM) based on defined access control for security.

목차

Abstract
 1. Introduction
 2. Methods and System Design
  A. Security System Model
  B. Cloud Storage Module
  C. Mail Authentication
  D. File Stored Block Model
 3. Related Work
 4. Protocol Statement
  A. Authentication Process
  B. Access Control Process for Security to Access Cloud Space
  C. Accessing Protected Resource Storage and Transfer Message
  D. File Size Usage of Cloud Space Analysis
 5. Analysis System Design Scenario
 6. Conclusions and Future Work
 Acknowledgements
 References

키워드

On-demand user optimistic user security cloud mobile environment

저자

  • Buchanagandi Enock Nyamajeje [ Department of Computer Science and Engineering East China University of Science and Technology, 200237, China ]
  • Huiqun Yu [ Department of Computer Science and Engineering Shanghai Key Laboratory of Computer Software Evaluating and Testing, Shanghai 201112, China ]

참고문헌

자료제공 : 네이버학술정보

간행물 정보

발행기관

  • 발행기관명
    보안공학연구지원센터(IJGDC) [Science & Engineering Research Support Center, Republic of Korea(IJGDC)]
  • 설립연도
    2006
  • 분야
    공학>컴퓨터학
  • 소개
    1. 보안공학에 대한 각종 조사 및 연구 2. 보안공학에 대한 응용기술 연구 및 발표 3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최 4. 보안공학 기술의 상호 협조 및 정보교환 5. 보안공학에 관한 표준화 사업 및 규격의 제정 6. 보안공학에 관한 산학연 협동의 증진 7. 국제적 학술 교류 및 기술 협력 8. 보안공학에 관한 논문지 발간 9. 기타 본 회 목적 달성에 필요한 사업

간행물

  • 간행물명
    International Journal of Grid and Distributed Computing
  • 간기
    격월간
  • pISSN
    2005-4262
  • 수록기간
    2008~2016
  • 십진분류
    KDC 505 DDC 605

이 권호 내 다른 논문 / International Journal of Grid and Distributed Computing Vol.8 No.5

    피인용수 : 0(자료제공 : 네이버학술정보)

    함께 이용한 논문 이 논문을 다운로드한 분들이 이용한 다른 논문입니다.

      페이지 저장