2019
DOI: 10.2139/ssrn.3352362
|View full text |Cite
|
Sign up to set email alerts
|

Data Security in Mobile Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…The findings indicate that the proposed method is safe, efficient, and has a remarkable effect on the IoT. Sarode and Bhalla [40] indicated that mobile CC (MCC) is a fast-developing invention at present. Data protection and security are important considerations when using a mobile device.…”
Section: Literature Reviewmentioning
confidence: 88%
See 1 more Smart Citation
“…The findings indicate that the proposed method is safe, efficient, and has a remarkable effect on the IoT. Sarode and Bhalla [40] indicated that mobile CC (MCC) is a fast-developing invention at present. Data protection and security are important considerations when using a mobile device.…”
Section: Literature Reviewmentioning
confidence: 88%
“…Research author Framework Techniques utilized Gai et al [20] Cloud (generally) D2ES Potey et al [21] Amazon Web Homomorphic Vijayakumar et al [22] Healthcare area Diffie-Hellman, AES Mathur et al [58] Cloud (generally) SHA-1, AES Lee et al [25] Heroku AES Biswas et al [26] Online examination system Not used More et al [27] Banking systems ABE and BRE algorithm Attar and Shahin [28] Cloud (generally) AES Abdulhamid [29] Microsoft Azure Blowfish Kumar et al [30] IT organizations Binary tree Sajay [31] Organizations Homographic, Blowfish Subashanthini and Pounambal [32] Electronic commerce IWT, chaotic maps, and DNA Xu et al [33] Electronic healthcare systems Modified Paillier cryptosystem, truth discovery technology, and the Dirichlet distribution Naidu et al [34] Bluemix SHA 512 Philip and Shah [35] Microsoft Azure Biometrics for authentication Malviya and Dave [36] Open cloud Homomorphic, AES Dong et al [37] SecureMR Homomorphic Wu et al [38] mIoT Public key encipherment with keyword search Namasudra [39] IOT ABE, distributed hash network, and identity-based timed-release encryption Sarode and Bhalla [40] MCC AES, RSA, and QR code Wang et al [41] EHR Public key encipherment with conjunctive keyword search Hiemenz and Krämer [42] Geospatial AES Chauhan et al [43] SRM University Teacher's fingerprint, AES Qiu et al [45] EHR Selective encipherment algorithm combined with fragmentation and dispersion Goyal and Kant [46] IT industry AES, SHA-1, and ECC Kumar and Roberts [47] CC Digital signatures Kumar and Shafi [48] CC modified RSA Teng et al [49] Hadoop improved AES Abroshan [50] CC Elliptic curve technique and enhanced Blowfish Awan et al [51] CC Enhanced AES (128) Kumar et al [52] ARPS and CloudSim SMO algorithm Mata et al [53]...…”
Section: Table 1 Framework and Techniques Utilizedmentioning
confidence: 99%