Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan

Cloud computing is an emerging computing paradigm that offers on-demand, flexible, and elastic IT services for the end-users. The small and medium-sized business organization having limited budget can enjoy the scalable services of the cloud. However, the migration of the organizational data on the...

Full description

Saved in:
Bibliographic Details
Main Author: Khan, Abdul Nasir
Format: Thesis
Published: 2014
Subjects:
Online Access:http://studentsrepo.um.edu.my/4593/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.um.stud.4593
record_format eprints
spelling my.um.stud.45932015-03-13T06:48:00Z Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan Khan, Abdul Nasir QA75 Electronic computers. Computer science T Technology (General) Cloud computing is an emerging computing paradigm that offers on-demand, flexible, and elastic IT services for the end-users. The small and medium-sized business organization having limited budget can enjoy the scalable services of the cloud. However, the migration of the organizational data on the cloud raises security and privacy issues that need to be addressed. The problem becomes more sophisticated in mobile cloud computing environment due to resource limitation of mobile devices. To cope with the resource limitation of mobile devices, there are two approaches adopted in the literature while providing security services (a) local execution and (b) remote execution. In local execution approach, the computational complexities of cryptographic algorithms are reduced and the entire security operations are executed using limited computational power of mobile devices. In remote execution approach, the computational intensive security operations are migrated from a resource constraint mobile devices to the resource enrich third-party or cloud for execution. This study investigates the impact of the existing data security schemes on resources utilization of mobile device. A novel energy-efficient data security schemes are proposed to improve the resources utilization on the mobile device by (a) reducing the computational complexity of the cryptographic algorithm and (b) by offloading the computationally intensive operation on the trusted entity or cloud. The proposed schemes are compared with the existing schemes on the basis of energy consumption, CPU utilization, memory utilization, encryption time, decryption time, and turnaround time on mobile device. The experimental results indicate that the proposed schemes show significant improvement in results as compared to the existing schemes. Keywords: Cloud Computing, Mobile Cloud Computing, Security, Privacy 2014 Thesis NonPeerReviewed Khan, Abdul Nasir (2014) Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan. PhD thesis, University of Malaya. http://studentsrepo.um.edu.my/4593/
institution Universiti Malaya
building UM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaya
content_source UM Student Repository
url_provider http://studentsrepo.um.edu.my/
topic QA75 Electronic computers. Computer science
T Technology (General)
spellingShingle QA75 Electronic computers. Computer science
T Technology (General)
Khan, Abdul Nasir
Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan
description Cloud computing is an emerging computing paradigm that offers on-demand, flexible, and elastic IT services for the end-users. The small and medium-sized business organization having limited budget can enjoy the scalable services of the cloud. However, the migration of the organizational data on the cloud raises security and privacy issues that need to be addressed. The problem becomes more sophisticated in mobile cloud computing environment due to resource limitation of mobile devices. To cope with the resource limitation of mobile devices, there are two approaches adopted in the literature while providing security services (a) local execution and (b) remote execution. In local execution approach, the computational complexities of cryptographic algorithms are reduced and the entire security operations are executed using limited computational power of mobile devices. In remote execution approach, the computational intensive security operations are migrated from a resource constraint mobile devices to the resource enrich third-party or cloud for execution. This study investigates the impact of the existing data security schemes on resources utilization of mobile device. A novel energy-efficient data security schemes are proposed to improve the resources utilization on the mobile device by (a) reducing the computational complexity of the cryptographic algorithm and (b) by offloading the computationally intensive operation on the trusted entity or cloud. The proposed schemes are compared with the existing schemes on the basis of energy consumption, CPU utilization, memory utilization, encryption time, decryption time, and turnaround time on mobile device. The experimental results indicate that the proposed schemes show significant improvement in results as compared to the existing schemes. Keywords: Cloud Computing, Mobile Cloud Computing, Security, Privacy
format Thesis
author Khan, Abdul Nasir
author_facet Khan, Abdul Nasir
author_sort Khan, Abdul Nasir
title Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan
title_short Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan
title_full Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan
title_fullStr Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan
title_full_unstemmed Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan
title_sort energy-efficient data security schemes for mobile users in cloud environment / abdul nasir khan
publishDate 2014
url http://studentsrepo.um.edu.my/4593/
_version_ 1738505688431198208
score 13.211869