2016
DOI: 10.14257/ijast.2016.89.05
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Security Mechanism for Protecting Data in Mobile Cloud Environment

Abstract: Cloud computing is a popular technology that provides services to the users on demand and on pay-per-usage fee that is they only pay for the data utilized when required. With the vast growth in the use of mobile phone applications, the users are relying on their phones for their personal as well as professional work and suffering from many problems (storage, processing, security etc). To overcome these limitations and growth in the use of cloud applications, a new development area has emerged recently called a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Cloud computing has recently received increased attention from both research communities and IT industries, especially for large-scale data management systems as the number of services is large and is also increasing fast [1][2][3]. Cloud computing is virtually distributed computing, consisting of a data server with data providers and customers [4]. There are several studies focusing on efficiently processing large amounts of data in cloud environments [5][6][7], as well as studies investigating green computing, an area analyzing efficient use of computer resources.…”
Section: Introductionmentioning
confidence: 99%
“…Cloud computing has recently received increased attention from both research communities and IT industries, especially for large-scale data management systems as the number of services is large and is also increasing fast [1][2][3]. Cloud computing is virtually distributed computing, consisting of a data server with data providers and customers [4]. There are several studies focusing on efficiently processing large amounts of data in cloud environments [5][6][7], as well as studies investigating green computing, an area analyzing efficient use of computer resources.…”
Section: Introductionmentioning
confidence: 99%
“…All the spam text messages, voice phishing, and financial frauds on the messenger with impersonation might be related to the leakage of personal information [4]. Disclosure of personal information not only mentally damages on individuals but also makes them exposed to financial damage, and various crimes including kidnapping by illegal use of other's name or voice-phishing.…”
Section: Introductionmentioning
confidence: 99%