2021
DOI: 10.4018/joeuc.20211101.oa11
|View full text |Cite
|
Sign up to set email alerts
|

Robust Security With Strong Authentication in Mobile Cloud Computing Based on Trefoil Congruity Framework

Abstract: In the mobile cloud computing era, the sharing of secured large-scale data which have major challenges. From an existing quantum based security mechanism randomly chosen the photon detector which creates small length of qubits so it cannot provide much security in MCC also data storage in the cloud server doesn’t guarantees the lossless back up and data recovery as well attains more computation complex during secure access of stored data. Therefore to solve those issues a unique combination of the Trefoil Cong… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 31 publications
0
0
0
Order By: Relevance
“…At the same time, traditional backup tools allow you to restore data directly from the backup, but often you need to restore the entire system (11)(12)(13). If your database is 15 TB, this will take several days (14). In a world where the master sheet disappears and everything is stored in IT systems, every second creates data that we want to protect immediately, the moment it is created.…”
Section: Introductionmentioning
confidence: 99%
“…At the same time, traditional backup tools allow you to restore data directly from the backup, but often you need to restore the entire system (11)(12)(13). If your database is 15 TB, this will take several days (14). In a world where the master sheet disappears and everything is stored in IT systems, every second creates data that we want to protect immediately, the moment it is created.…”
Section: Introductionmentioning
confidence: 99%
“…In the context of the rapid development of big data, data privacy protection and cybersecurity information on the Internet (Ma et al, 2021;Kou et al, 2021;Chen, Sun, Yang, et al, 2021) have become inevitable issues in the security field, which data from different domains are cross-integrated, each participant forms an interactive scenario for distributed computing in the network communities. This includes cloud computing, edge computing for the Internet of Things (Jerald Nirmal Kumar et al, 2021;Ramu et al, 2020;Wei et al, 2021;Azrour et al, 2021), and secure computation, among others. In the two-party computation, due to insufficient computing power, their own data is encrypted and sent to the second party for computation and return the result value.…”
Section: Introductionmentioning
confidence: 99%