International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 110 | Views: 296

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014 | Popularity: 6.3 / 10


     

A Survey on Data Storage Security in Mobile Cloud Computing Environment

Manoj M. Chavan, Poonam Gupta


Abstract: Cloud computing is a utility computing which provides computing, networking, storage space as a service to users through Internet. Users can automatically provision and de-provision resources on demand, paying charges for the capacity they use. Mobile cloud computing combines the power of mobile with cloud computing thus providing the user with unlimited pool of resource from cloud without hampering mobility of user. A mobile user storing data on the cloud can be read by the cloud service provider or hacked by man-in-middle attack, thus affecting user privacy and integrity. So data stored on the cloud should be encrypted, disallowing unauthorized user to access stored data. Mobile devices are resource constrained since they are battery powered, have less processing power and have less storage space. Any algorithm or technique used for securing mobile users data should take into account above constraints for effective uses of cloud for mobile users. In this paper we have provided a survey of different techniques for secure storage of mobile users data in the cloud, their merits and demerits for mobile environment.


Keywords: Security, Mobile Cloud Computing, Cloud computing


Edition: Volume 3 Issue 11, November 2014


Pages: 2554 - 2557



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Manoj M. Chavan, Poonam Gupta, "A Survey on Data Storage Security in Mobile Cloud Computing Environment", International Journal of Science and Research (IJSR), Volume 3 Issue 11, November 2014, pp. 2554-2557, https://www.ijsr.net/getabstract.php?paperid=OCT141548, DOI: https://www.doi.org/10.21275/OCT141548



Similar Articles

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022

Pages: 455 - 459

Real World IoT Applications in Daily Domain

Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad

Share this Article
Top