DefinePK

DefinePK hosts the largest index of Pakistani journals, research articles, news headlines, and videos. It also offers chapter-level book search.

Resourceful investigate encryption method using data hunt in mobile cloud service


Article Information

Title: Resourceful investigate encryption method using data hunt in mobile cloud service

Authors: A. S. Syed Navaz, Asha N., Vanmathi Chandrasekaran, J. Jayashree

Journal: ARPN Journal of Engineering and Applied Sciences

HEC Recognition History
Category From To
Y 2023-07-01 2024-09-30
Y 2022-07-01 2023-06-30
Y 2021-07-01 2022-06-30
X 2020-07-01 2021-06-30

Publisher: Khyber Medical College, Peshawar

Country: Pakistan

Year: 2018

Volume: 13

Issue: 15

Language: English

Categories

Abstract

In this paper, we showcase demand elevated class applications, storage space of data distantly, the less protection burden of local data storage and shared pool of configurable computing resources are the services provided that can be enjoyed by the users by using cloud storage. Data integrity protection is an imposing task in cloud computing that is done as the outsourced data is no longer physically possessed, especially for users with constrained computing resources. Cloud storage is a model used by the users to store their files and the providers are responsible for keeping the data available and accessible. The mobile cloud environment has security issues as the cloud environment that cannot be applied in mobile devices. Low transmission rates, latency sensitivity, poor connectivity are the challenges required to be undertaken by wireless networks to avoid security issues. Conventional investigate schemes and Ranked Serial Binary Investigate (RSBI) algorithm leads to extra traffic costs and a long investigate time for the users. The Resourceful investigate an able encryption scheme is proposed to address these issues as a mobile cloud service. The data communication process is optimized for traffic efficiency by reducing the access size by using lightweight access encrypted keyword compression method in this innovative scheme. The user registries in the cloud to upload their files and then the files are encrypted by using the index and compress, key generation and Secure Flow Algorithm (SFA). The encrypted files are stored in the cloud server that can be downloaded by the user by entering the keyword and in the database investigate able encryption is used to investigate the files to speed up the investigate time. Two optimization methods have been proposed in document, investigate called to investigate able encryption and SFA algorithm. The result shows that investigate able encryption scheme which reduces the investigate time as well as network traffic.


Paper summary is not available for this article yet.

Loading PDF...

Loading Statistics...