SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 4 Issue 1 ǁ January. 2016 ǁ PP.36-45
www.ijres.org 36 | Page
Reduce Resources for Privacy in Mobile Cloud Computing Using
Blowfish and DSA Algorithms
Tawfiq S. Barhoom, Mahmoud M. Abu Ghosh
Faculty of Information Technology Islamic University of Gaza (IUG) Gaza, Palestine
Faculty of Information Technology Islamic University of Gaza (IUG) Gaza, Palestine
Abstract: Mobile cloud computing in light of the increasing popularity among users of mobile smart
technology which is the next indispensable that enables users to take advantage of the storage cloud computing
services. However, mobile cloud computing, the migration of information on the cloud is reliable their privacy
and security issues. Moreover, mobile cloud computing has limitations in resources such as power energy,
processor, Memory and storage. In this paper, we propose a solution to the problem of privacy with saving and
reducing resources power energy, processor and Memory. This is done through data encryption in the mobile
cloud computing by symmetric algorithm and sent to the private cloud and then the data is encrypted again and
sent to the public cloud through Asymmetric algorithm. The experimental results showed after a comparison
between encryption algorithms less time and less time to decryption are as follows: Blowfish algorithm for
symmetric and the DSA algorithm for Asymmetric. The analysis results showed a significant improvement in
reducing the resources in the period of time and power energy consumption and processor.
Keywords: Mobile Cloud Computing, Security, Privacy, Blowfish, DSA.
I. INTRODUCTION
A. Cloud Computing
The Cloud Computing is gaining popularity with its main advantage of reducing the computational burden
of the client and thus reducing the complexity and other infrastructure requirements at the client end. However,
it is important to realize that the market is still deprived of cloud service providers because of following
important issues [1]:
 Data replication
 Consistency
 Limited scalability
 Unreliability
 Unreliable availability of cloud resources
 Portability
 Trust
 Security
 Privacy
Data privacy is also important and is one of the main bottlenecks that restrict consumers from adopting
mobile cloud computing. The users’ data stored in the cloud may include emails, tax reports, personal images,
salary and health reports etc, and may contain sensitive information. Therefore, the consumers cannot afford any
privacy leakage as it may lead to financial loss and legal issues [2]. The European Union has passed some laws
for the handling of data, according to which the data storage servers must reside in the countries that can provide
sufficient protection. Moreover, in some cases the data storage location must be known. However, this is not
always possible in a cloud environment due to the absence of standards, data privacy, and cloud security.
Therefore, to gain consumers trust in the mobile cloud, the application models must support application
development with privacy protection and implicit authentication mechanisms [2, 3].
The commonly accepted definition of Cloud computing is an IT service being provided to users on demand and
being paid for depending upon amount of usage. It can also be termed as a dynamic service being provided to
users that can add on to the available capacity and capabilities of user entity. Some of the key services of Cloud
Computing as depicted in Fig. 1 are [1]:
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms
www.ijres.org 37 | Page
Fig. 1 Layered architecture of cloud computing [4]
Cloud computing providers offer their services according to several fundamental models:
1- Software as a Service (SaaS): The capability provided to the consumer to use the provider’s applications
running on a cloud infrastructure. The applications are accessible from various client devices through a thin
client interface such as a web browser (e.g., web-based email). The consumer does not manage or control the
underlying cloud infrastructure with the possible exception of limited user-specific application configuration
settings [2, 3, 5].
2- Platform as a Service (PaaS): The capability provided to the consumer to deploy onto the cloud
infrastructure consumer created or acquired applications created using programming languages and tools
supported by the provider. The consumer does not manage or control the underlying cloud infrastructure
including network, servers, operating systems, or storage, but has control over the deployed applications and
possibly application hosting environment configurations [2, 3, 5].
3- Infrastructure as a Service (IaaS): The capability provided to the consumer for provision processing,
storage, networks, and other fundamental computing resources where the consumer is able to deploy and run
arbitrary software, which can include operating systems and applications. The consumer does not manage or
control the underlying cloud infrastructure but has control over operating systems, storage, deployed
applications, and possibly limited control of select networking components (e.g. host firewalls) [2, 3, 5].
B. Mobile Cloud Computing
The application of cloud is possible in many domains. One of the domains of our current interest is that of
mobiles. Hence, we will be focusing on utility of cloud computing environment for mobile usage and how can a
cloud add value to the overall functionality and performance of mobile devices? According to Khan et al [4] as
depicted in Fig. 2, Mobile Cloud Computing is a service that allows resource constrained mobile users to
adaptively adjust processing and storage capabilities by transparently partitioning and offloading the
computationally intensive and storage demanding jobs on traditional cloud resources by providing ubiquitous
wireless access.
Fig. 2 Mobile Cloud Computing Architecture [4]
Some of the limitations of mobile devices which drive use of Cloud Computing for mobile devices are [1]:
 Limited battery
 Limited processing power
 Low storage
 Less security
 Unpredictable Internet connectivity
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms
www.ijres.org 38 | Page
 Less energy
The mobile cloud applications execute in two ways. In the first case, the applications execute on the nearby
infrastructure that acts as a (virtual) cloud, for instance, personal computers, laptops, and servers. In the second
case, the applications execute in a real cloud, for instance, Amazon EC2, Google App Engine, and Microsoft
Live Mesh. Therefore, the mobile cloud application models may support execution of the applications on either
nearby infrastructure, cloud or both [1]. Execution resource significantly affects the scalability and availability
of the application models. For instance, the availability of a nearby infrastructure is an unrealistic assumption,
particularly when the user is on the move. Therefore, the assumption may be valid only for home and office
environments, where the personal computers or nearby servers are available. However, some application models
may require heavy software installations on the infrastructure to support computational offloading [2]. In
principal, the personal computers do not promise virtually unlimited resources like real cloud platforms.
Moreover, keeping the personal computers always in the ready state, just for the sake of computation offloading
is not an energy efficient solution. Therefore, to make the application models scalable and capable of utilizing
virtually unlimited resources with guaranteed availability; shifting the task of computation from the nearby
infrastructure to the real cloud platforms is an appealing choice. Nevertheless, cloud computing is more energy
efficient and the researchers have proposed different energy efficient techniques, that can get maximum output
from the cloud based servers [2, 3].
TABLE I. CLOUD COMPUTING AND MOBILE CLOUD COMPUTING COMPARISON [2]
Issues
Cloud
Computing
Mobile Cloud
Computing
Device energy  
Bandwidth utilization
cost


Network connectivity  
Mobility  
Context awareness  
Location awareness  
Bandwidth  
Security  
An aim is a solution to the problem of privacy using encryption on fragmentation of the file with saving
reducing resources. such as the time, processor, power energy, processor and memory.
II. RELATED WORK
Many researches have been done related to this field: -
A. Security and privacy issues of Mobile Cloud Computing have been discussed by many researchers.
Somani, Lakhani et al. in [6] have described the cloud storage methodology and proposed algorithm and
Implementing the RSA algorithm through Digital Signature. And proposed the gradually process consumed in
Digital Signature with RSA algorithm. If these implementing algorithms are combined in other encryption
techniques (i.e. DES, AES etc) then it’s became stronger and secure for cloud computing.
Naser, Ghosh et al. in [3, 5] have described a system called Secure Mobile Cloud Computing for sensitive
data: Teacher Services for Palestinian Higher Education Institutions (MCCTSs) which is a mobile application to
facilities access. and proposed the using RSA algorithm to encrypt the data which send and receive through
Cloud computing application.
Zhou and Huang in [7] have described present a comprehensive security data inquiry framework for mobile
cloud computing. solution focuses on the following two research directions: First, present a novel Privacy
Preserving Cipher Policy Attribute-Based Encryption (PP-CP-ABE) to protect sensing data. using PP-CP ABE,
light-weight devices can securely outsource heavy encryption and decryption operations to cloud service
providers, without revealing the data content. Second, propose an Attribute Based Data Storage (ABDS) system
as a cryptographic group based access control mechanism.
Jia, Zhu et al. in [8] have described design a secure mobile user-based data service mechanism (SDSM) to
provide confidentiality and fine-grained access control for data stored in the cloud. the core idea of SDSM is
that SDSM outsources not only the data but also the security management to the mobile cloud in a trust way.
explored identity based proxy re-encryption scheme to make mobile users easily implement fine-grained access
control of data and also guarantee the data privacy in the cloud.
Yang, Wang et al. in [9] have described proposes a novel public PDP scheme, in which the trusted third-
party agent (TPA) takes over most of the calculations from the mobile end-users. by using bilinear signature and
Merkle hash tree (MHT), the scheme aggregates the verification tokens of the data file into one small signature
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms
www.ijres.org 39 | Page
to reduce communication and storage burden. MHT is also helpful to support dynamic data update. mobile
terminal devices only need to generate some secret keys and random numbers with the help of trusted platform
model (TPM) chips, and the needed computing workload and storage space.
Current research initiatives seem to address only one or two parameters of security from the
comprehensive set of authentication, integrity, confidentiality and privacy. These research approaches
favor static security algorithms without considering changing demand for security, quality of service, and
resource usage of mobile.
B. Security and privacy issues and Reduce Resources of Mobile Cloud Computing have been discussed by
many researchers.
Khan, Kiah et al. in [10] have described an improve the resource limitation of mobile devices, mobile users
may utilize cloud-computational and storage services. a light-weight security scheme is proposed for mobile
user in cloud environment to protect the mobile user’s identity with dynamic credentials. scheme offloads the
frequently occurring dynamic credential generation operations on a trusted entity to keep minimum processing
burden on the mobile device. to enhance the security and reliability of the scheme, the credential information is
updated frequently on the basis of mobile-cloud packets exchange. the credentials are encrypted with the mobile
user public key that ensures the confidentiality.
Khan, Kiah et al. in [11] have described an incremental version of proxy re-encryption scheme for
improving the file modification operation and compared with the original version of the proxy re-encryption
scheme on the basis of turnaround time, energy consumption, CPU utilization, and memory consumption while
executing the security operations on mobile device. the incremental version of proxy re-encryption scheme
shows significant improvement in results while performing file modification operations using limited processing
capability of mobile devices.
Othman, Khan et al. in [12] have described article proposes a mobile cloud application development model,
named MobiByte, to enhance mobile device applications’ performance, energy efficiency, and execution
support. MobiByte is a context-aware application model that uses multiple data offloading techniques to support
a wide range of applications. The proposed model is validated using prototype applications and detailed results
are presented.
Khan, Kiah et al. [13] in have described article Cloud-Manager-based Re-Encryption Scheme (CMReS)
that combines the characteristics of manager-based re-encryption and cloud based re-encryption for providing
the better security services with minimum processing burden on the mobile device. the proposed cloud-
manager-based re-encryption scheme shows significant improvement in turnaround time, energy consumption,
and resources utilization on the mobile device as compared to existing re-encryption schemes. in the
CMReS, most of the encryption, decryption, and re-encryption operations are offloaded on trusted entity and
cloud that improve the resource utilization on the mobile device.
Current research initiatives seem to address only parameters of security from the comprehensive set of
authentication, integrity, confidentiality and privacy. and these research approaches favor static security
algorithms with considering changing demand for security, quality of service, and reduce resource usage
Such as (time, processor and power battery) of mobile.
An aim is to leverage cloud computing capabilities for augmenting resource-constraint mobile devices,
this approach is the base for this research.
III. A PROPOSED REDUCE RESOURCES FOR PRIVACY IN MOBILE CLOUD COMPUTING
The proposed solution to the problem of privacy with saving and reducing energy and resources. the
resources such as the processor and Memory, in mobile cloud environment with minimum processing burden,
communication delay, and energy loss on the mobile device.
To achieve the requirements of the Privacy encryption algorithms using and there are a lot of them. It was a
choice of two of each type of algorithms symmetric and asymmetric according to their popularity in the
experiment are as follows [14, 15]:
• symmetrical algorithms (Blowfish, AES)
• asymmetric algorithms (RSA, DES)
The components used in the system model are (a) Public Cloud service provider, (b) mobile users, and (c)
trusted entity called Private Cloud service provider as illustrated in Fig. 3.
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms
www.ijres.org 40 | Page
Fig. 3 The model proposed for Architecture Mechanism
This is done through data encryption in the mobile cloud computing by symmetric algorithm and sent to the
private cloud and then the data is encrypted again and sent to the public cloud through Asymmetric algorithm as
illustrated in Fig. 3.
During the experiment is to switch between the selected algorithms in encryption between mobile and
private and public cloud, either symmetric or asymmetric, then compare the results and choose the least the time
it takes the algorithm and processor power, memory and energy consumption.
Experimental setup
In the experiment it was installed the same private and public cloud to calculate the most accurate results, as
in the specification Table I. the experiments are performed on private and public cloud using Samsung Galaxy
S3 smartphone to evaluate the energy consumption and turnaround. The Samsung Galaxy S3 JDE 7.0.0 and
Android SDK tools are used for the development of the mobile client applications. The mobile client
applications interact with the manager and Public cloud service provider through socket programming and http
post request/response methods, respectively. implemented using JDK 1.6, which updates the cloud and mobile
secrets on behalf of the cloud service provider and mobile device. A single frontend web instant of class F4
having 1 GB of memory and 1.5 GHz of CPU capacity is hosted on the Google App Engine (GAE). The mobile
client application interacts with the web instant hosted on GAE through the Private Cloud service provider. The
hardware specifications of the smartphones and Cloud are presented in the Table II.
TABLE II. HARDWARE SPECIFICATIONS OF SMARTPHONES AND CLOUD
Specifications
Device type
Mobile Private Cloud Public Cloud
CPU
Dual-core 1.5
GHz
2 NO. Of
Processors
4 NO. Of
Processors
Memory 1 GB 4 GB 16 GB
Storage 8 GB 100 GB 500 GB
OS Android OS v4.3 Linux Linux
Battery mAh1750 - -
Internet Wi-Fi Lan Lan
HTTP Yes NO NO
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms
www.ijres.org 41 | Page
IV. RESULTS & DISCUSSION
Experimental Results:-
The schemes are evaluated on the mobile device and (Private, Public) Cloud while performing encryption,
decryption on the basis of as follows:
 Total turnaround time in seconds as illustrated in Fig. 4.
 Total power energy consumption in percentage as illustrated in Fig. 5.
 Total CPU utilization in percentage as illustrated in Fig. 6.
 Total memory consumption in megabytes as illustrated in Fig. 7.
Fig. 4 Total Turnaround time according to type encryption
Fig. 5 Total Processor Utilization according to type encryption
Fig. 6 Total Power Energy Consumption according to type encryption
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms
www.ijres.org 42 | Page
Fig. 7 Total Memory Consumption according to type encryption
The final results showed that the following algorithms are Blowfish and DSA least in the total time
encryption and decryption Moreover least in the processor, memory and power energy consumption.
So, it has been adopted in this model they make the privacy clause and with the least resources such as time and
processor, memory and power energy consumption.
The data is encrypted in the mobile by symmetry algorithm (Blowfish) and send public key to the private cloud
and are decryption versa as in Fig. 8.
Fig. 8 Encryption and decryption Architecture Mechanism between the mobile and the private cloud
TABLE III. BLOWFISH OF ENCRYPTION (FROM MOBILE TO PRIVATE CLOUD) AND DECRYPTION TIME (FROM
PRIVATE CLOUD TO MOBILE)
PacketSize
(KB)
Encr.Time
(Sec)
Decr.
Time (Sec)
CPU
)%(
Memor
y(MB)
Power
)%(
64 0.6 0.3 5.4 12.9 0.0011
128 0.8 0.5 6.2 14.2 0.0012
256 1 0.9 7.3 15 0.0013
512 1.1 1.1 8.2 15.9 0.0014
1024 1.2 1.3 9.1 15.3 0.0015
2048 1.4 1.5 9.3 15.08 0.0016
The data is encrypted in the private cloud by symmetry algorithm (DSA) and send public key to the public
cloud and are decryption versa as in Fig. 9.
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms
www.ijres.org 43 | Page
Fig. 9 Encryption and decryption Architecture Mechanism between the private cloud and the public cloud
TABLE. IV DSA OF ENCRYPTION (FROM PRIVATE CLOUD TO PUBLIC CLOUD) AND DECRYPTION TIME (FROM
PUBLIC CLOUD TO PRIVATE CLOUD)
PacketSize (KB)
Encr.Time
(Sec)
Decr.
Time (Sec)
CPU
)%(
Memory(MB)
64 4.7 3.5 0.3 2.8
128 5.6 4.1 0.5 3.1
256 6.4 4.3 0.5 3.7
512 6.5 5.5 0.7 3.8
1024 6.8 6.1 0.9 5.3
2048 7.1 6.4 1.1 5.6
The results showed on the basis of turnaround time in seconds, energy consumption in percentage, CPU
utilization in percentage, and memory consumption in megabytes on the mobile device to private cloud as in
Fig. 8 while performing encryption, decryption Using Blowfish encryption and decryption, and Private Cloud to
Public Cloud as in Fig. 9 while performing encryption, decryption Using DSA encryption and decryption.
Show that with increased package size with double the number 2 (X2
) there is a significant increase in the time,
CPU, memory and Power Energy consumption gradually in the Table III, Table IV.
Difference Between two Algorithms:-
The Table V Blowfish and DES algorithms also shows the difference between the Table VI Blowfish and
RSA algorithms in less resources such as time and processor, memory and power energy consumption.
The results showed on the basis of turnaround Total of time in seconds, energy consumption in percentage, CPU
utilization in percentage, and memory consumption in Megabytes on the mobile device, Public and Private
Cloud while performing encryption, decryption Using Blowfish and DSA encryption and decryption in the
Table V, and Using Blowfish and RSA in the Table VI.
Show that with increased package size with double the number 2 (X2
) there is a significant increase in the time,
CPU, memory and Power Energy consumption gradually in the Table V, Table VI.
TABLE V. TOTAL BLOWFISH AND DSA OF ENCRYPTION TIME (FROM PRIVATE CLOUD TO PUBLIC CLOUD) AND
DECRYPTION TIME (FROM PUBLIC CLOUD TO PRIVATE CLOUD)
PacketSize
(KB)
Encr.Time
(Sec)
Decr.
Time (Sec)
Total Time
(Encr + Decr)
(Sec)
CPU
)%(
Memor
y(MB)
Power
)%(
64 5.3 3.8 9.1 5.7 15.7 0.0011
128 6.4 4.6 11 6.7 17.3 0.0012
256 7.4 5.2 12.6 7.8 18.7 0.0013
512 7.6 6.6 14.2 8.9 19.7 0.0014
1024 8 7.4 15.4 10 20.6 0.0015
2048 8.5 7.9 16.4 10.4 20.68 0.0016
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms
www.ijres.org 44 | Page
TABLE VI. TOTAL BLOWFISH AND RSA OF ENCRY.TIME (FROM PRIVATE CLOUD TO PUBLIC CLOUD) AND DECR.
TIME (FROM PUBLIC CLOUD TO PRIVATE CLOUD)
PacketSize
(KB)
Encr.Time
(Sec)
Decr.
Time (Sec)
Total Time (Encr
+ Decr) (Sec)
CPU
)%(
Memory
(MB)
Power
)%(
64 5.2 4.2 9.4 6.4 17.1 0.0023
128 5.7 4.4 10.1 6.7 17.8 0.0027
256 6.9 5.4 12.3 7.9 20 0.0044
512 7.5 6.1 13.6 9.1 23.3 0.0052
1024 8.1 6.8 14.9 10.2 24.1 0.0063
2048 8.9 7.9 16.8 12 25.8 0.0073
Experimental Results of the Performance:-
After selecting Blowfish and DES Algorithms encryption and decryption, the results show that with
increased package size with double the number 2 (X2
) there is a significant increase progressively in the
Turnaround time, Processor Utilization, Memory and Power Energy Consumption as in Fig. 10,11,12,13.
Fig. 10 Processor Utilization Fig. 11 Turnaround time
Fig. 12 Power Energy Consumption Fig. 13 Memory Consumption
V. CONCLUSIONS
In this paper, we presented a system called: reduce resources for privacy in mobile cloud computing using
blowfish and DSA algorithms, which to reduce resources such as the time it takes the processor, memory and
battery power. Also, a discussion of various symmetric encryption algorithms and asymmetric that can support
dramatically privacy. This is done through data encryption in the mobile cloud computing by symmetric
algorithm and sent to the private cloud and then the data is encrypted again and sent to the public cloud through
Asymmetric algorithm. The experimental results showed after a comparison between encryption algorithms less
time and less time to decryption are as follows: Blowfish algorithm for symmetric and the DSA algorithm for
Asymmetric. The analysis results showed a significant improvement 34.12% from the previous in reducing the
resources in the period of time and energy consumption and processor. It was proposed to apply the program of
Mobile cloud computing services in the Palestinian academic institutions of higher education (MCCAS) who
added privacy and safety while reducing the time in encryption and decryption, power energy consumption and
processor significantly from its predecessor, where the increase in time by 17%, which is reasonable and
acceptable for the end user. Furthermore, it has been compared most of the time until the peak time, which was
not affected on a large which proves the effectiveness of the proposal.
Acknowledgment
We would like to thank all people who provided any type of help in this paper.
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms
www.ijres.org 45 | Page
References
[1.] Chaturvedi, M., et al., Privacy & Security of Mobile Cloud Computing. Ansal University, Sector, 2011.
55.
[2.] Khan, A.R., et al., A survey of mobile cloud computing application models. Communications Surveys
& Tutorials, IEEE, 2014. 16(1): p. 393-413.
[3.] Naser, S.S.A., M.A. Ghosh, and R.R. Atallah, Mobile Cloud Computing: Academic Services for
Palestinian Higher Education Institutions (MCCAS). International Journal of Research in Engineering
and Science (IJRES), 2015.
[4.] Khan, A.N., et al., Towards secure mobile cloud computing: A survey. Future Generation Computer
Systems, 2013. 29(5): p. 1278-1299.
[5.] Naser, S.S.A., M.A. Ghosh, and R.R. Atallah, Secure Mobile Cloud Computing for Sensitive Data:
Teacher Services for Palestinian Higher Education Institutions. International Journal of Advanced
Science and Technology (IJAST), 2016.
[6.] Somani, U., K. Lakhani, and M. Mundra. Implementing digital signature with RSA encryption
algorithm to enhance the Data Security of cloud in Cloud Computing. in Parallel Distributed and Grid
Computing (PDGC), 2010 1st International Conference on. 2010. IEEE.
[7.] Zhou, Z. and D. Huang. Efficient and secure data storage operations for mobile cloud computing. in
Proceedings of the 8th International Conference on Network and Service Management. 2012.
International Federation for Information Processing.
[8.] Jia, W., et al. SDSM: a secure data service mechanism in mobile cloud computing. in Computer
Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on. 2011. IEEE.
[9.] Yang, J., et al., Provable data possession of resource-constrained mobile devices in cloud computing.
Journal of networks, 2011. 6(7): p. 1033-1040.
[10.] Khan, A.N., et al., Enhanced dynamic credential generation scheme for protection of user identity in
mobile-cloud computing. The Journal of Supercomputing, 2013. 66(3): p. 1687-1706.
[11.] Khan, A.N., et al., Incremental proxy re-encryption scheme for mobile cloud computing environment.
The Journal of Supercomputing, 2014. 68(2): p. 624-651.
[12.] Othman, M., et al., MobiByte: An Application Development Model for Mobile Cloud Computing.
Journal of Grid Computing, 2015: p. 1-24.
[13.] Khan, A.N., et al., A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud
Environment: a Hybrid Approach. Journal of Grid Computing, 2015: p. 1-25.
[14.] Chaudhari, M.P. and S.R. Patel, A Survey on Cryptography Algorithms. International Journal, 2014.
2(3).
[15.] Ebrahim, M., S. Khan, and U.B. Khalid, Symmetric algorithm survey: a comparative analysis. arXiv
preprint arXiv:1405.0398, 2014.

Weitere ähnliche Inhalte

Was ist angesagt?

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computingiosrjce
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource ManagementDr. Amarjeet Singh
 
IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Servicesijtsrd
 
Opportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computingOpportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computingijccsa
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Zuhair Haroon khan
 
Understanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewUnderstanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewIJEACS
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelscloudresearcher
 
Literature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and TechniquesLiterature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and TechniquesIJCSIS Research Publications
 
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...Eswar Publications
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utilityiosrjce
 

Was ist angesagt? (20)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
 
Cloud versus cloud
Cloud versus cloudCloud versus cloud
Cloud versus cloud
 
IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED-V1I1P1
IJSRED-V1I1P1
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Services
 
Opportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computingOpportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computing
 
H046053944
H046053944H046053944
H046053944
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
 
Understanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewUnderstanding the Cloud Computing: A Review
Understanding the Cloud Computing: A Review
 
D045031724
D045031724D045031724
D045031724
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery models
 
E04432934
E04432934E04432934
E04432934
 
Literature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and TechniquesLiterature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and Techniques
 
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
 

Ähnlich wie Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms

Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433IJRAT
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)ahmed elmeghiny
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Mervat Bamiah
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...IIJSRJournal
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
 
A brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsA brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsTELKOMNIKA JOURNAL
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesIJCSIS Research Publications
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingEditor IJCATR
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Computing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfComputing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfHODCS6
 

Ähnlich wie Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms (20)

Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
G0314043
G0314043G0314043
G0314043
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
 
A brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsA brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutions
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
 
B017660813
B017660813B017660813
B017660813
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Computing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfComputing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdf
 

Mehr von IJRES Journal

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...IJRES Journal
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...IJRES Journal
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityIJRES Journal
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...IJRES Journal
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesIJRES Journal
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresIJRES Journal
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...IJRES Journal
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodIJRES Journal
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionIJRES Journal
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningIJRES Journal
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchIJRES Journal
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowIJRES Journal
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...IJRES Journal
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsIJRES Journal
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalIJRES Journal
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...IJRES Journal
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...IJRES Journal
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesIJRES Journal
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...IJRES Journal
 
An understanding of the electronic bipolar resistance switching behavior in C...
An understanding of the electronic bipolar resistance switching behavior in C...An understanding of the electronic bipolar resistance switching behavior in C...
An understanding of the electronic bipolar resistance switching behavior in C...IJRES Journal
 

Mehr von IJRES Journal (20)

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil properties
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their Structures
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible Rod
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioning
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision Workbench
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and Now
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirs
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound Signal
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubes
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
 
An understanding of the electronic bipolar resistance switching behavior in C...
An understanding of the electronic bipolar resistance switching behavior in C...An understanding of the electronic bipolar resistance switching behavior in C...
An understanding of the electronic bipolar resistance switching behavior in C...
 

Kürzlich hochgeladen

Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书rnrncn29
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 
Forming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptForming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptNoman khan
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProRay Yuan Liu
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 

Kürzlich hochgeladen (20)

Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 
Forming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptForming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).ppt
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision Pro
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 

Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms

  • 1. International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 www.ijres.org Volume 4 Issue 1 ǁ January. 2016 ǁ PP.36-45 www.ijres.org 36 | Page Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms Tawfiq S. Barhoom, Mahmoud M. Abu Ghosh Faculty of Information Technology Islamic University of Gaza (IUG) Gaza, Palestine Faculty of Information Technology Islamic University of Gaza (IUG) Gaza, Palestine Abstract: Mobile cloud computing in light of the increasing popularity among users of mobile smart technology which is the next indispensable that enables users to take advantage of the storage cloud computing services. However, mobile cloud computing, the migration of information on the cloud is reliable their privacy and security issues. Moreover, mobile cloud computing has limitations in resources such as power energy, processor, Memory and storage. In this paper, we propose a solution to the problem of privacy with saving and reducing resources power energy, processor and Memory. This is done through data encryption in the mobile cloud computing by symmetric algorithm and sent to the private cloud and then the data is encrypted again and sent to the public cloud through Asymmetric algorithm. The experimental results showed after a comparison between encryption algorithms less time and less time to decryption are as follows: Blowfish algorithm for symmetric and the DSA algorithm for Asymmetric. The analysis results showed a significant improvement in reducing the resources in the period of time and power energy consumption and processor. Keywords: Mobile Cloud Computing, Security, Privacy, Blowfish, DSA. I. INTRODUCTION A. Cloud Computing The Cloud Computing is gaining popularity with its main advantage of reducing the computational burden of the client and thus reducing the complexity and other infrastructure requirements at the client end. However, it is important to realize that the market is still deprived of cloud service providers because of following important issues [1]:  Data replication  Consistency  Limited scalability  Unreliability  Unreliable availability of cloud resources  Portability  Trust  Security  Privacy Data privacy is also important and is one of the main bottlenecks that restrict consumers from adopting mobile cloud computing. The users’ data stored in the cloud may include emails, tax reports, personal images, salary and health reports etc, and may contain sensitive information. Therefore, the consumers cannot afford any privacy leakage as it may lead to financial loss and legal issues [2]. The European Union has passed some laws for the handling of data, according to which the data storage servers must reside in the countries that can provide sufficient protection. Moreover, in some cases the data storage location must be known. However, this is not always possible in a cloud environment due to the absence of standards, data privacy, and cloud security. Therefore, to gain consumers trust in the mobile cloud, the application models must support application development with privacy protection and implicit authentication mechanisms [2, 3]. The commonly accepted definition of Cloud computing is an IT service being provided to users on demand and being paid for depending upon amount of usage. It can also be termed as a dynamic service being provided to users that can add on to the available capacity and capabilities of user entity. Some of the key services of Cloud Computing as depicted in Fig. 1 are [1]:
  • 2. Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms www.ijres.org 37 | Page Fig. 1 Layered architecture of cloud computing [4] Cloud computing providers offer their services according to several fundamental models: 1- Software as a Service (SaaS): The capability provided to the consumer to use the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email). The consumer does not manage or control the underlying cloud infrastructure with the possible exception of limited user-specific application configuration settings [2, 3, 5]. 2- Platform as a Service (PaaS): The capability provided to the consumer to deploy onto the cloud infrastructure consumer created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations [2, 3, 5]. 3- Infrastructure as a Service (IaaS): The capability provided to the consumer for provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g. host firewalls) [2, 3, 5]. B. Mobile Cloud Computing The application of cloud is possible in many domains. One of the domains of our current interest is that of mobiles. Hence, we will be focusing on utility of cloud computing environment for mobile usage and how can a cloud add value to the overall functionality and performance of mobile devices? According to Khan et al [4] as depicted in Fig. 2, Mobile Cloud Computing is a service that allows resource constrained mobile users to adaptively adjust processing and storage capabilities by transparently partitioning and offloading the computationally intensive and storage demanding jobs on traditional cloud resources by providing ubiquitous wireless access. Fig. 2 Mobile Cloud Computing Architecture [4] Some of the limitations of mobile devices which drive use of Cloud Computing for mobile devices are [1]:  Limited battery  Limited processing power  Low storage  Less security  Unpredictable Internet connectivity
  • 3. Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms www.ijres.org 38 | Page  Less energy The mobile cloud applications execute in two ways. In the first case, the applications execute on the nearby infrastructure that acts as a (virtual) cloud, for instance, personal computers, laptops, and servers. In the second case, the applications execute in a real cloud, for instance, Amazon EC2, Google App Engine, and Microsoft Live Mesh. Therefore, the mobile cloud application models may support execution of the applications on either nearby infrastructure, cloud or both [1]. Execution resource significantly affects the scalability and availability of the application models. For instance, the availability of a nearby infrastructure is an unrealistic assumption, particularly when the user is on the move. Therefore, the assumption may be valid only for home and office environments, where the personal computers or nearby servers are available. However, some application models may require heavy software installations on the infrastructure to support computational offloading [2]. In principal, the personal computers do not promise virtually unlimited resources like real cloud platforms. Moreover, keeping the personal computers always in the ready state, just for the sake of computation offloading is not an energy efficient solution. Therefore, to make the application models scalable and capable of utilizing virtually unlimited resources with guaranteed availability; shifting the task of computation from the nearby infrastructure to the real cloud platforms is an appealing choice. Nevertheless, cloud computing is more energy efficient and the researchers have proposed different energy efficient techniques, that can get maximum output from the cloud based servers [2, 3]. TABLE I. CLOUD COMPUTING AND MOBILE CLOUD COMPUTING COMPARISON [2] Issues Cloud Computing Mobile Cloud Computing Device energy   Bandwidth utilization cost   Network connectivity   Mobility   Context awareness   Location awareness   Bandwidth   Security   An aim is a solution to the problem of privacy using encryption on fragmentation of the file with saving reducing resources. such as the time, processor, power energy, processor and memory. II. RELATED WORK Many researches have been done related to this field: - A. Security and privacy issues of Mobile Cloud Computing have been discussed by many researchers. Somani, Lakhani et al. in [6] have described the cloud storage methodology and proposed algorithm and Implementing the RSA algorithm through Digital Signature. And proposed the gradually process consumed in Digital Signature with RSA algorithm. If these implementing algorithms are combined in other encryption techniques (i.e. DES, AES etc) then it’s became stronger and secure for cloud computing. Naser, Ghosh et al. in [3, 5] have described a system called Secure Mobile Cloud Computing for sensitive data: Teacher Services for Palestinian Higher Education Institutions (MCCTSs) which is a mobile application to facilities access. and proposed the using RSA algorithm to encrypt the data which send and receive through Cloud computing application. Zhou and Huang in [7] have described present a comprehensive security data inquiry framework for mobile cloud computing. solution focuses on the following two research directions: First, present a novel Privacy Preserving Cipher Policy Attribute-Based Encryption (PP-CP-ABE) to protect sensing data. using PP-CP ABE, light-weight devices can securely outsource heavy encryption and decryption operations to cloud service providers, without revealing the data content. Second, propose an Attribute Based Data Storage (ABDS) system as a cryptographic group based access control mechanism. Jia, Zhu et al. in [8] have described design a secure mobile user-based data service mechanism (SDSM) to provide confidentiality and fine-grained access control for data stored in the cloud. the core idea of SDSM is that SDSM outsources not only the data but also the security management to the mobile cloud in a trust way. explored identity based proxy re-encryption scheme to make mobile users easily implement fine-grained access control of data and also guarantee the data privacy in the cloud. Yang, Wang et al. in [9] have described proposes a novel public PDP scheme, in which the trusted third- party agent (TPA) takes over most of the calculations from the mobile end-users. by using bilinear signature and Merkle hash tree (MHT), the scheme aggregates the verification tokens of the data file into one small signature
  • 4. Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms www.ijres.org 39 | Page to reduce communication and storage burden. MHT is also helpful to support dynamic data update. mobile terminal devices only need to generate some secret keys and random numbers with the help of trusted platform model (TPM) chips, and the needed computing workload and storage space. Current research initiatives seem to address only one or two parameters of security from the comprehensive set of authentication, integrity, confidentiality and privacy. These research approaches favor static security algorithms without considering changing demand for security, quality of service, and resource usage of mobile. B. Security and privacy issues and Reduce Resources of Mobile Cloud Computing have been discussed by many researchers. Khan, Kiah et al. in [10] have described an improve the resource limitation of mobile devices, mobile users may utilize cloud-computational and storage services. a light-weight security scheme is proposed for mobile user in cloud environment to protect the mobile user’s identity with dynamic credentials. scheme offloads the frequently occurring dynamic credential generation operations on a trusted entity to keep minimum processing burden on the mobile device. to enhance the security and reliability of the scheme, the credential information is updated frequently on the basis of mobile-cloud packets exchange. the credentials are encrypted with the mobile user public key that ensures the confidentiality. Khan, Kiah et al. in [11] have described an incremental version of proxy re-encryption scheme for improving the file modification operation and compared with the original version of the proxy re-encryption scheme on the basis of turnaround time, energy consumption, CPU utilization, and memory consumption while executing the security operations on mobile device. the incremental version of proxy re-encryption scheme shows significant improvement in results while performing file modification operations using limited processing capability of mobile devices. Othman, Khan et al. in [12] have described article proposes a mobile cloud application development model, named MobiByte, to enhance mobile device applications’ performance, energy efficiency, and execution support. MobiByte is a context-aware application model that uses multiple data offloading techniques to support a wide range of applications. The proposed model is validated using prototype applications and detailed results are presented. Khan, Kiah et al. [13] in have described article Cloud-Manager-based Re-Encryption Scheme (CMReS) that combines the characteristics of manager-based re-encryption and cloud based re-encryption for providing the better security services with minimum processing burden on the mobile device. the proposed cloud- manager-based re-encryption scheme shows significant improvement in turnaround time, energy consumption, and resources utilization on the mobile device as compared to existing re-encryption schemes. in the CMReS, most of the encryption, decryption, and re-encryption operations are offloaded on trusted entity and cloud that improve the resource utilization on the mobile device. Current research initiatives seem to address only parameters of security from the comprehensive set of authentication, integrity, confidentiality and privacy. and these research approaches favor static security algorithms with considering changing demand for security, quality of service, and reduce resource usage Such as (time, processor and power battery) of mobile. An aim is to leverage cloud computing capabilities for augmenting resource-constraint mobile devices, this approach is the base for this research. III. A PROPOSED REDUCE RESOURCES FOR PRIVACY IN MOBILE CLOUD COMPUTING The proposed solution to the problem of privacy with saving and reducing energy and resources. the resources such as the processor and Memory, in mobile cloud environment with minimum processing burden, communication delay, and energy loss on the mobile device. To achieve the requirements of the Privacy encryption algorithms using and there are a lot of them. It was a choice of two of each type of algorithms symmetric and asymmetric according to their popularity in the experiment are as follows [14, 15]: • symmetrical algorithms (Blowfish, AES) • asymmetric algorithms (RSA, DES) The components used in the system model are (a) Public Cloud service provider, (b) mobile users, and (c) trusted entity called Private Cloud service provider as illustrated in Fig. 3.
  • 5. Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms www.ijres.org 40 | Page Fig. 3 The model proposed for Architecture Mechanism This is done through data encryption in the mobile cloud computing by symmetric algorithm and sent to the private cloud and then the data is encrypted again and sent to the public cloud through Asymmetric algorithm as illustrated in Fig. 3. During the experiment is to switch between the selected algorithms in encryption between mobile and private and public cloud, either symmetric or asymmetric, then compare the results and choose the least the time it takes the algorithm and processor power, memory and energy consumption. Experimental setup In the experiment it was installed the same private and public cloud to calculate the most accurate results, as in the specification Table I. the experiments are performed on private and public cloud using Samsung Galaxy S3 smartphone to evaluate the energy consumption and turnaround. The Samsung Galaxy S3 JDE 7.0.0 and Android SDK tools are used for the development of the mobile client applications. The mobile client applications interact with the manager and Public cloud service provider through socket programming and http post request/response methods, respectively. implemented using JDK 1.6, which updates the cloud and mobile secrets on behalf of the cloud service provider and mobile device. A single frontend web instant of class F4 having 1 GB of memory and 1.5 GHz of CPU capacity is hosted on the Google App Engine (GAE). The mobile client application interacts with the web instant hosted on GAE through the Private Cloud service provider. The hardware specifications of the smartphones and Cloud are presented in the Table II. TABLE II. HARDWARE SPECIFICATIONS OF SMARTPHONES AND CLOUD Specifications Device type Mobile Private Cloud Public Cloud CPU Dual-core 1.5 GHz 2 NO. Of Processors 4 NO. Of Processors Memory 1 GB 4 GB 16 GB Storage 8 GB 100 GB 500 GB OS Android OS v4.3 Linux Linux Battery mAh1750 - - Internet Wi-Fi Lan Lan HTTP Yes NO NO
  • 6. Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms www.ijres.org 41 | Page IV. RESULTS & DISCUSSION Experimental Results:- The schemes are evaluated on the mobile device and (Private, Public) Cloud while performing encryption, decryption on the basis of as follows:  Total turnaround time in seconds as illustrated in Fig. 4.  Total power energy consumption in percentage as illustrated in Fig. 5.  Total CPU utilization in percentage as illustrated in Fig. 6.  Total memory consumption in megabytes as illustrated in Fig. 7. Fig. 4 Total Turnaround time according to type encryption Fig. 5 Total Processor Utilization according to type encryption Fig. 6 Total Power Energy Consumption according to type encryption
  • 7. Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms www.ijres.org 42 | Page Fig. 7 Total Memory Consumption according to type encryption The final results showed that the following algorithms are Blowfish and DSA least in the total time encryption and decryption Moreover least in the processor, memory and power energy consumption. So, it has been adopted in this model they make the privacy clause and with the least resources such as time and processor, memory and power energy consumption. The data is encrypted in the mobile by symmetry algorithm (Blowfish) and send public key to the private cloud and are decryption versa as in Fig. 8. Fig. 8 Encryption and decryption Architecture Mechanism between the mobile and the private cloud TABLE III. BLOWFISH OF ENCRYPTION (FROM MOBILE TO PRIVATE CLOUD) AND DECRYPTION TIME (FROM PRIVATE CLOUD TO MOBILE) PacketSize (KB) Encr.Time (Sec) Decr. Time (Sec) CPU )%( Memor y(MB) Power )%( 64 0.6 0.3 5.4 12.9 0.0011 128 0.8 0.5 6.2 14.2 0.0012 256 1 0.9 7.3 15 0.0013 512 1.1 1.1 8.2 15.9 0.0014 1024 1.2 1.3 9.1 15.3 0.0015 2048 1.4 1.5 9.3 15.08 0.0016 The data is encrypted in the private cloud by symmetry algorithm (DSA) and send public key to the public cloud and are decryption versa as in Fig. 9.
  • 8. Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms www.ijres.org 43 | Page Fig. 9 Encryption and decryption Architecture Mechanism between the private cloud and the public cloud TABLE. IV DSA OF ENCRYPTION (FROM PRIVATE CLOUD TO PUBLIC CLOUD) AND DECRYPTION TIME (FROM PUBLIC CLOUD TO PRIVATE CLOUD) PacketSize (KB) Encr.Time (Sec) Decr. Time (Sec) CPU )%( Memory(MB) 64 4.7 3.5 0.3 2.8 128 5.6 4.1 0.5 3.1 256 6.4 4.3 0.5 3.7 512 6.5 5.5 0.7 3.8 1024 6.8 6.1 0.9 5.3 2048 7.1 6.4 1.1 5.6 The results showed on the basis of turnaround time in seconds, energy consumption in percentage, CPU utilization in percentage, and memory consumption in megabytes on the mobile device to private cloud as in Fig. 8 while performing encryption, decryption Using Blowfish encryption and decryption, and Private Cloud to Public Cloud as in Fig. 9 while performing encryption, decryption Using DSA encryption and decryption. Show that with increased package size with double the number 2 (X2 ) there is a significant increase in the time, CPU, memory and Power Energy consumption gradually in the Table III, Table IV. Difference Between two Algorithms:- The Table V Blowfish and DES algorithms also shows the difference between the Table VI Blowfish and RSA algorithms in less resources such as time and processor, memory and power energy consumption. The results showed on the basis of turnaround Total of time in seconds, energy consumption in percentage, CPU utilization in percentage, and memory consumption in Megabytes on the mobile device, Public and Private Cloud while performing encryption, decryption Using Blowfish and DSA encryption and decryption in the Table V, and Using Blowfish and RSA in the Table VI. Show that with increased package size with double the number 2 (X2 ) there is a significant increase in the time, CPU, memory and Power Energy consumption gradually in the Table V, Table VI. TABLE V. TOTAL BLOWFISH AND DSA OF ENCRYPTION TIME (FROM PRIVATE CLOUD TO PUBLIC CLOUD) AND DECRYPTION TIME (FROM PUBLIC CLOUD TO PRIVATE CLOUD) PacketSize (KB) Encr.Time (Sec) Decr. Time (Sec) Total Time (Encr + Decr) (Sec) CPU )%( Memor y(MB) Power )%( 64 5.3 3.8 9.1 5.7 15.7 0.0011 128 6.4 4.6 11 6.7 17.3 0.0012 256 7.4 5.2 12.6 7.8 18.7 0.0013 512 7.6 6.6 14.2 8.9 19.7 0.0014 1024 8 7.4 15.4 10 20.6 0.0015 2048 8.5 7.9 16.4 10.4 20.68 0.0016
  • 9. Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms www.ijres.org 44 | Page TABLE VI. TOTAL BLOWFISH AND RSA OF ENCRY.TIME (FROM PRIVATE CLOUD TO PUBLIC CLOUD) AND DECR. TIME (FROM PUBLIC CLOUD TO PRIVATE CLOUD) PacketSize (KB) Encr.Time (Sec) Decr. Time (Sec) Total Time (Encr + Decr) (Sec) CPU )%( Memory (MB) Power )%( 64 5.2 4.2 9.4 6.4 17.1 0.0023 128 5.7 4.4 10.1 6.7 17.8 0.0027 256 6.9 5.4 12.3 7.9 20 0.0044 512 7.5 6.1 13.6 9.1 23.3 0.0052 1024 8.1 6.8 14.9 10.2 24.1 0.0063 2048 8.9 7.9 16.8 12 25.8 0.0073 Experimental Results of the Performance:- After selecting Blowfish and DES Algorithms encryption and decryption, the results show that with increased package size with double the number 2 (X2 ) there is a significant increase progressively in the Turnaround time, Processor Utilization, Memory and Power Energy Consumption as in Fig. 10,11,12,13. Fig. 10 Processor Utilization Fig. 11 Turnaround time Fig. 12 Power Energy Consumption Fig. 13 Memory Consumption V. CONCLUSIONS In this paper, we presented a system called: reduce resources for privacy in mobile cloud computing using blowfish and DSA algorithms, which to reduce resources such as the time it takes the processor, memory and battery power. Also, a discussion of various symmetric encryption algorithms and asymmetric that can support dramatically privacy. This is done through data encryption in the mobile cloud computing by symmetric algorithm and sent to the private cloud and then the data is encrypted again and sent to the public cloud through Asymmetric algorithm. The experimental results showed after a comparison between encryption algorithms less time and less time to decryption are as follows: Blowfish algorithm for symmetric and the DSA algorithm for Asymmetric. The analysis results showed a significant improvement 34.12% from the previous in reducing the resources in the period of time and energy consumption and processor. It was proposed to apply the program of Mobile cloud computing services in the Palestinian academic institutions of higher education (MCCAS) who added privacy and safety while reducing the time in encryption and decryption, power energy consumption and processor significantly from its predecessor, where the increase in time by 17%, which is reasonable and acceptable for the end user. Furthermore, it has been compared most of the time until the peak time, which was not affected on a large which proves the effectiveness of the proposal. Acknowledgment We would like to thank all people who provided any type of help in this paper.
  • 10. Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms www.ijres.org 45 | Page References [1.] Chaturvedi, M., et al., Privacy & Security of Mobile Cloud Computing. Ansal University, Sector, 2011. 55. [2.] Khan, A.R., et al., A survey of mobile cloud computing application models. Communications Surveys & Tutorials, IEEE, 2014. 16(1): p. 393-413. [3.] Naser, S.S.A., M.A. Ghosh, and R.R. Atallah, Mobile Cloud Computing: Academic Services for Palestinian Higher Education Institutions (MCCAS). International Journal of Research in Engineering and Science (IJRES), 2015. [4.] Khan, A.N., et al., Towards secure mobile cloud computing: A survey. Future Generation Computer Systems, 2013. 29(5): p. 1278-1299. [5.] Naser, S.S.A., M.A. Ghosh, and R.R. Atallah, Secure Mobile Cloud Computing for Sensitive Data: Teacher Services for Palestinian Higher Education Institutions. International Journal of Advanced Science and Technology (IJAST), 2016. [6.] Somani, U., K. Lakhani, and M. Mundra. Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing. in Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference on. 2010. IEEE. [7.] Zhou, Z. and D. Huang. Efficient and secure data storage operations for mobile cloud computing. in Proceedings of the 8th International Conference on Network and Service Management. 2012. International Federation for Information Processing. [8.] Jia, W., et al. SDSM: a secure data service mechanism in mobile cloud computing. in Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on. 2011. IEEE. [9.] Yang, J., et al., Provable data possession of resource-constrained mobile devices in cloud computing. Journal of networks, 2011. 6(7): p. 1033-1040. [10.] Khan, A.N., et al., Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. The Journal of Supercomputing, 2013. 66(3): p. 1687-1706. [11.] Khan, A.N., et al., Incremental proxy re-encryption scheme for mobile cloud computing environment. The Journal of Supercomputing, 2014. 68(2): p. 624-651. [12.] Othman, M., et al., MobiByte: An Application Development Model for Mobile Cloud Computing. Journal of Grid Computing, 2015: p. 1-24. [13.] Khan, A.N., et al., A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach. Journal of Grid Computing, 2015: p. 1-25. [14.] Chaudhari, M.P. and S.R. Patel, A Survey on Cryptography Algorithms. International Journal, 2014. 2(3). [15.] Ebrahim, M., S. Khan, and U.B. Khalid, Symmetric algorithm survey: a comparative analysis. arXiv preprint arXiv:1405.0398, 2014.