Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan

Cloud computing is an emerging computing paradigm that offers on-demand, flexible, and elastic IT services for the end-users. The small and medium-sized business organization having limited budget can enjoy the scalable services of the cloud. However, the migration of the organizational data on the...

全面介紹

書目詳細資料
主要作者: Khan, Abdul Nasir
格式: Thesis
出版: 2014
主題:
_version_ 1849733898691411968
author Khan, Abdul Nasir
author_facet Khan, Abdul Nasir
author_sort Khan, Abdul Nasir
description Cloud computing is an emerging computing paradigm that offers on-demand, flexible, and elastic IT services for the end-users. The small and medium-sized business organization having limited budget can enjoy the scalable services of the cloud. However, the migration of the organizational data on the cloud raises security and privacy issues that need to be addressed. The problem becomes more sophisticated in mobile cloud computing environment due to resource limitation of mobile devices. To cope with the resource limitation of mobile devices, there are two approaches adopted in the literature while providing security services (a) local execution and (b) remote execution. In local execution approach, the computational complexities of cryptographic algorithms are reduced and the entire security operations are executed using limited computational power of mobile devices. In remote execution approach, the computational intensive security operations are migrated from a resource constraint mobile devices to the resource enrich third-party or cloud for execution. This study investigates the impact of the existing data security schemes on resources utilization of mobile device. A novel energy-efficient data security schemes are proposed to improve the resources utilization on the mobile device by (a) reducing the computational complexity of the cryptographic algorithm and (b) by offloading the computationally intensive operation on the trusted entity or cloud. The proposed schemes are compared with the existing schemes on the basis of energy consumption, CPU utilization, memory utilization, encryption time, decryption time, and turnaround time on mobile device. The experimental results indicate that the proposed schemes show significant improvement in results as compared to the existing schemes. Keywords: Cloud Computing, Mobile Cloud Computing, Security, Privacy
format Thesis
id oai:studentsrepo.um.edu.my:4593
institution Universiti Malaya
publishDate 2014
record_format eprints
spelling oai:studentsrepo.um.edu.my:45932015-03-13T06:48:00Z Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan Khan, Abdul Nasir QA75 Electronic computers. Computer science T Technology (General) Cloud computing is an emerging computing paradigm that offers on-demand, flexible, and elastic IT services for the end-users. The small and medium-sized business organization having limited budget can enjoy the scalable services of the cloud. However, the migration of the organizational data on the cloud raises security and privacy issues that need to be addressed. The problem becomes more sophisticated in mobile cloud computing environment due to resource limitation of mobile devices. To cope with the resource limitation of mobile devices, there are two approaches adopted in the literature while providing security services (a) local execution and (b) remote execution. In local execution approach, the computational complexities of cryptographic algorithms are reduced and the entire security operations are executed using limited computational power of mobile devices. In remote execution approach, the computational intensive security operations are migrated from a resource constraint mobile devices to the resource enrich third-party or cloud for execution. This study investigates the impact of the existing data security schemes on resources utilization of mobile device. A novel energy-efficient data security schemes are proposed to improve the resources utilization on the mobile device by (a) reducing the computational complexity of the cryptographic algorithm and (b) by offloading the computationally intensive operation on the trusted entity or cloud. The proposed schemes are compared with the existing schemes on the basis of energy consumption, CPU utilization, memory utilization, encryption time, decryption time, and turnaround time on mobile device. The experimental results indicate that the proposed schemes show significant improvement in results as compared to the existing schemes. Keywords: Cloud Computing, Mobile Cloud Computing, Security, Privacy 2014 Thesis NonPeerReviewed Khan, Abdul Nasir (2014) Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan. PhD thesis, University of Malaya. http://studentsrepo.um.edu.my/4593/
spellingShingle QA75 Electronic computers. Computer science
T Technology (General)
Khan, Abdul Nasir
Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan
title Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan
title_full Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan
title_fullStr Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan
title_full_unstemmed Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan
title_short Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan
title_sort energy efficient data security schemes for mobile users in cloud environment abdul nasir khan
topic QA75 Electronic computers. Computer science
T Technology (General)
url-record http://studentsrepo.um.edu.my/4593/
work_keys_str_mv AT khanabdulnasir energyefficientdatasecurityschemesformobileusersincloudenvironmentabdulnasirkhan