2017
DOI: 10.4018/ijcac.2017040105
|View full text |Cite
|
Sign up to set email alerts
|

Secure Mobile Multi Cloud Architecture for Authentication and Data Storage

Abstract: The use of Cloud Computing in the mobile networks offer more advantages and possibilities to the mobile users such as storing, downloading and making calculation on data on demand and its offer more resources to these users such as the storage resources and calculation power. So, Mobile Cloud Computing allows users to fully utilize mobile technologies to store, to download, share and retrieve their personal data anywhere and anytime. As many recent researches show, the main problem of fully expansion and use o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 29 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…Ensuring the authentication and users' privacy is one of the major concerns of security experts (Werner et al, 2017;Zkik et al, 2017). The use of public cloud servers allowed offering several benefits to users in terms of resources but its limited by risks related to security, especially regarding confidentiality and privacy.…”
Section: Global View Of A-heaasmentioning
confidence: 99%
“…Ensuring the authentication and users' privacy is one of the major concerns of security experts (Werner et al, 2017;Zkik et al, 2017). The use of public cloud servers allowed offering several benefits to users in terms of resources but its limited by risks related to security, especially regarding confidentiality and privacy.…”
Section: Global View Of A-heaasmentioning
confidence: 99%
“…The combination of various systems allows the manufacturers to operate more efficient, fast, and cost-effectively, while rising bandwidth. Also, synergies between SD-WAN and the multi-cloud architectures [6] offer several advantages to automation and virtualization and ondemand provisioning, while maintaining mobility and cost savings.…”
Section: Introductionmentioning
confidence: 99%
“…The algorithm developed and presented by the author is a step toward research, design, invention and implementation of innovative tools and methods for more efficient solving of complex problems 8-11,15-23. Each developer uses his own approach: synthesis of two or more algorithms into one, use of encoding method as a cipher, application of mathematical models in the field of optics, acoustics, chemistry, and so on in the problems of encryption.…”
Section: Introductionmentioning
confidence: 99%