Header menu link for other important links
Resourceful investigate encryption method using data hunt in mobile cloud service
A.S. Syed Navaz, Chandrasekaran V, ,
Published in Asian Research Publishing Network
Volume: 13
Issue: 15
Pages: 4543 - 4549
In this paper, we showcase demand elevated class applications, storage space of data distantly, the less protection burden of local data storage and shared pool of configurable computing resources are the services provided that can be enjoyed by the users by using cloud storage. Data integrity protection is an imposing task in cloud computing that is done as the outsourced data is no longer physically possessed, especially for users with constrained computing resources. Cloud storage is a model used by the users to store their files and the providers are responsible for keeping the data available and accessible. The mobile cloud environment has security issues as the cloud environment that cannot be applied in mobile devices. Low transmission rates, latency sensitivity, poor connectivity are the challenges required to be undertaken by wireless networks to avoid security issues. Conventional investigate schemes and ranked serial binary investigate (RSBI) algorithm leads to extra traffic costs and a long investigate time for the users. The resourceful investigate an able encryption scheme is proposed to address these issues as a mobile cloud service. The data communication process is optimized for traffic efficiency by reducing the access size by using lightweight access encrypted keyword compression method in this innovative scheme. The user registries in the cloud to upload their files and then the files are encrypted by using the index and compress, key generation and secure flow algorithm (SFA). The encrypted files are stored in the cloud server that can be downloaded by the user by entering the keyword and in the database investigate able encryption is used to investigate the files to speed up the investigate time. Two optimization methods have been proposed in document, investigate called to investigate able encryption and SFA algorithm. The result shows that investigate able encryption scheme which reduces the investigate time as well as network traffic. © 2006-2018 Asian Research Publishing Network (ARPN).
About the journal
JournalARPN Journal of Engineering and Applied Sciences
PublisherAsian Research Publishing Network