Downloads: 145 | Views: 292
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014 | Popularity: 6.2 / 10
Enhancing the Mobile Cloud Server Security by MAC Address
Kamalpreet Kaur, Navpreet Kaur Walia
Abstract: Mobile Cloud computing is an emerging and vast area for the field of research. In the era of advanced technology the client and server architecture is been shifting from distributed or cluster to cloud architecture. Smart phone devices are booming in market and it covers most of the works of people which was earlier used to done by the help of computer. We can read mails with push notifications facility; we can communicate and store large number of data in mobile devices. As the Internet-enabled mobile devices including smartphones and tablets continue to grow; web-based malicious threats will continue to increase in number to make more complex. Securing data is more critical in the Mobile Cloud Environment. So; one of the key challenges is to design the cloud computing security architecture for mobile device on the internet. In this paper we proposed security architecture for mobile cloud computing.
Keywords: MCC, AES, SAAS, PAAS, IAAS
Edition: Volume 3 Issue 6, June 2014
Pages: 2505 - 2510
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 722
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera