Robust Security With Strong Authentication in Mobile Cloud Computing Based on Trefoil Congruity Framework

Robust Security With Strong Authentication in Mobile Cloud Computing Based on Trefoil Congruity Framework

Jerald Nirmal Kumar S., Ravimaran S., Sathish A.
Copyright: © 2021 |Pages: 28
DOI: 10.4018/JOEUC.20211101.oa11
Article PDF Download
Open access articles are freely available for download

Abstract

In the mobile cloud computing era, the sharing of secured large-scale data which have major challenges. From an existing quantum based security mechanism randomly chosen the photon detector which creates small length of qubits so it cannot provide much security in MCC also data storage in the cloud server doesn’t guarantees the lossless back up and data recovery as well attains more computation complex during secure access of stored data. Therefore to solve those issues a unique combination of the Trefoil Congruity framework is proposed which consist Quantum Key Fibo Privacy Approach (QKFPA) performing the quantum key generation for encrypt and decrypt the data with the aid of Fibonacci chain-slanting matrix. Based on that quantum key data is uploaded, then secured data should be stored, ultra-widely distributed data transfer mechanism does the scrambling with sorting the stored data by implementing novel HS-DRT technique that improves the lossless backup and recovery of data storage.
Article Preview
Top

1. Introduction

Mobile cloud computing (MCC) is laurenched as a cloud computing technology that is available for mobile devices like smartphones and tablets (Mollah et al., 2017). In MCC, mobile users can access cloud-specific tools, program and operating performance, and use cloud infrastructure to deploy and implement a range of applications to improve computing power and enhance the storage space and context. Mobile devices are available. The MCC industry is projected to produce $94.75 billion in sales (online, 2018), according to Mordor Intelligence's report in 2023 (Mordor Intelligence Industry Report, 2018). However, the abundance of mobile cloud providers still raises more protection and privacy issues (Chang et al., 2016). The mobile computing world also introduces new security, convenience and privacy requirements. The conventional user authentication method, based on the username and password, relies on the point of view of the user. For the simplification and convenience of login, the user name and the password have been chosen in the past. However, in recent years people would choose to bring more and more jobs in the mobile terminal due to the huge success of the mobile terminal. As a result, the accounts to be handled are increasing. The findings reveal that on average, every user has 25 accounts in 8 periods of a day and 6.5 passwords and logs. You cannot remember the complex password again but people cannot stop using a plain, weak password and sharing the same password with different network services. If the password of the user is tricked or stolen by the virus and trojan horse, the personal details of the user would be jeopardized (Han et al., 2018).

The protection risks occur for all parties, meaning that the cloud and cloud service providers have problems protecting themselves from possible security attacks for safe sessions, transactions and activities (Gupta & Badve, 2017). It is the responsibility of the cloud service provider to provide its service customers with secured and secure networks to safeguard confidential data, passwords, and applications. In comparison, cloud service providers use sophisticated pin code and strong authentication schemes to deliver stable and uninterrupted services (Chaudhry et al., 2019). Mobile Cloud Computing (MCC) is an evolving technology in which data and information computation, manipulation, and storage take place beyond mobile devices (Xia et al., 2016). This technology is regarded as a cloud itself. MCC has arisen as eminent mobile facilities for effective and economical use of remote computing services and data storage (Oludele & Oluwabukola, 2016). It provides many services, including a network, applications, infrastructure, storage, and reconstruction, etc., and is a very significant cost-effective approach for storage and computation (Pandian & Smys, 2020). The cloud computing services are designed into a replication mechanism to prevent the lack of knowledge about the natural or manmade catastrophe (Gharajeh, 2015). To avoid unintended manipulation and hacking of the information contained in the cloud, it fragments information accompanied by replication to maximize security and to fix concerns of overburdening the cloud. Several times, this scattered information is not well organized but distributed or dispersed changed by random means. This increases the information's recovery time as well as the restored quality (Han et al., 2015).

Complete Article List

Search this Journal:
Reset
Volume 36: 1 Issue (2024)
Volume 35: 3 Issues (2023)
Volume 34: 10 Issues (2022)
Volume 33: 6 Issues (2021)
Volume 32: 4 Issues (2020)
Volume 31: 4 Issues (2019)
Volume 30: 4 Issues (2018)
Volume 29: 4 Issues (2017)
Volume 28: 4 Issues (2016)
Volume 27: 4 Issues (2015)
Volume 26: 4 Issues (2014)
Volume 25: 4 Issues (2013)
Volume 24: 4 Issues (2012)
Volume 23: 4 Issues (2011)
Volume 22: 4 Issues (2010)
Volume 21: 4 Issues (2009)
Volume 20: 4 Issues (2008)
Volume 19: 4 Issues (2007)
Volume 18: 4 Issues (2006)
Volume 17: 4 Issues (2005)
Volume 16: 4 Issues (2004)
Volume 15: 4 Issues (2003)
Volume 14: 4 Issues (2002)
Volume 13: 4 Issues (2001)
Volume 12: 4 Issues (2000)
Volume 11: 4 Issues (1999)
Volume 10: 4 Issues (1998)
Volume 9: 4 Issues (1997)
Volume 8: 4 Issues (1996)
Volume 7: 4 Issues (1995)
Volume 6: 4 Issues (1994)
Volume 5: 4 Issues (1993)
Volume 4: 4 Issues (1992)
Volume 3: 4 Issues (1991)
Volume 2: 4 Issues (1990)
Volume 1: 3 Issues (1989)
View Complete Journal Contents Listing