Securing Mobile Cloud Environment with Unified Reliable Encryption Algorithm, Security Key and Authentication

Provided by: Science & Engineering Research Support soCiety (SERSC)
Topic: Cloud
Format: PDF
Building applications on on-demand infrastructures instead of building applications on fixed and rigid infrastructures was provided by cloud computing providers. By simply positing into the cloud, it gains fast access to business applications or infrastructure resources with reduced capital expenditures. Dramatic increase in amount of information's are placed into the cloud by individuals and industries, security issues are vital concern in mobile computing and impends fast deployment of applications on the cloud. This paper presents the different security issues that arises about how safe the mobile cloud computing environment is and provides a unified reliable security mechanism. There are two different types of the cloud users are: on-demand and optimistic.

Find By Topic