scholarly journals A Secure Mobile Cloud Storage Environment using Encryption Algorithm

2016 ◽  
Vol 140 (8) ◽  
pp. 33-43
Author(s):  
Nitin Nagar ◽  
Ugrasen Suman
2014 ◽  
Vol 644-650 ◽  
pp. 1919-1922
Author(s):  
Bao Yi Wang ◽  
Jing Ming ◽  
Shao Min Zhang ◽  
Hao Jiang ◽  
Hui Luo

In view of the current popular cloud storage access control, some security problems were still existed. To solve the problem which the cloud service provider can’t verify the user write permissions by the CP-ABE based cloud storage access control, in this paper a cloud storage access control method is proposed which is based on the encryption algorithm of the cipher-text (CP-ABE) and the attribute-based signature (ABS). This method not only achieves the cloud storage environment information privacy and integrity, but also supports inheritance authorization and scalability.


Author(s):  
Leonel Moyou Metcheka ◽  
René Ndoundam

AbstractClassical or traditional steganography aims at hiding a secret in cover media such as text, image, audio, video or even in network protocols. Recent research has improved this approach called distributed steganography by fragmenting the secret message and embedding each secret piece into a distinct cover media. The major interest of this approach is to make the secret message detection extremely difficult. However, these file modifications leave fingerprints which can reveal a secret channel to an attacker. Our contribution is a new steganography paradigm transparent to any attacker and resistant to the detection and the secret extraction. Two properties contribute to achieve these goals: the files do not undergo any modification while the distribution of the secret in the multi-cloud storage environment allows us to hide the existence of the covert channel between the communicating parties. Information’s are usually hidden inside the cover media. In this work, the covert media is a pointer to information. Therefore the file carries the information without being modified and the only way to access it is to have the key. Experiments show interesting comparison results with remarkable security contributions. The work can be seen as a new open direction for further research in the field.


Author(s):  
Christos Stergiou ◽  
Kostas E. Psannis

Mobile cloud computing provides an opportunity to restrict the usage of huge hardware infrastructure and to provide access to data, applications, and computational power from every place and in any time with the use of a mobile device. Furthermore, MCC offers a number of possibilities but additionally creates several challenges and issues that need to be addressed as well. Through this work, the authors try to define the most important issues and challenges in the field of MCC technology by illustrating the most significant works related to MCC during recent years. Regarding the huge benefits offered by the MCC technology, the authors try to achieve a more safe and trusted environment for MCC users in order to operate the functions and transfer, edit, and manage data and applications, proposing a new method based on the existing AES encryption algorithm, which is, according to the study, the most relevant encryption algorithm to a cloud environment. Concluding, the authors suggest as a future plan to focus on finding new ways to achieve a better integration MCC with other technologies.


Author(s):  
Zhaobin Liu ◽  
Wenyu Qu ◽  
Weijiang Liu ◽  
Yunfan Li

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 30444-30457 ◽  
Author(s):  
Shangping Wang ◽  
Duo Zhang ◽  
Yaling Zhang ◽  
Lihua Liu

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 109038-109053 ◽  
Author(s):  
Lihua Liu ◽  
Shangping Wang ◽  
Bintao He ◽  
Duo Zhang

Sign in / Sign up

Export Citation Format

Share Document