Enhanced Secure Big Data in Distributed Mobile Cloud Computing Using Fuzzy Encryption Model

Abstract

This paper proposes a novel architecture for adaptive encryption of public cloud databases that offers a proxy-free alternative to the system. cloud system is difficult to synchronize login and authentication data between external clouds and internal systems without exposing internal security data. The cloud technologies are rapidly being adopted throughout the Information Technology (IT) due to their various attractive properties. In spite of their spread, they have raised a range of significant security and privacy concerns which interrupt their adoption in sensitive environments. The cloud computing technology provides IT services and resources to the customers through public network such as internet. The cloud computing services and infrastructure are mostly owned by a third party called cloud service providers. Cloud computing provides an innovative model for the organizations to use software applications, storage and processing capabilities of cloud without investing on the infrastructure. Mobile cloud computing provides a novel ecommerce mode for organizations without any upfront investment. Since cloud computing uses distributed resources in open environment, it is important to provide secure keys to share the data for developing cloud computing applications. To ensure a correctness of users? data in the cloud, we propose an effective and secure distributed model including a Self-Proxy Server (SPS) with self-created algorithm. The model resolves a communication bottleneck due to re-encryption of a shared data in the cloud whenever users are revoked. It offers to reduce security risks and protect their resources because a distributed SPS dynamically interacts with Key Manager (KM) when the mobile users take on cloud services. This paper presents a comprehensive mobile cloud design which provides an effective and secure cloud computing services on mobile devices. This proposed system provides fuzzy authorization technique to ensure the correctness of username and the password for that fuzzy technique is used. This technique includes if the fake user to know the details about the password that is using the hint given. If the hacker know about the original password when he reenter. To avoid this type of the situation fuzzy authorization uses the technique if the entered password partially matches the user can get the video that is the fake video. After that hacker stop retrying the username and the password. The original data is taken after real password is given by the real user.

Authors and Affiliations

Pavithra P, Balamurugan K

Keywords

Related Articles

Enhanced Automatically Mining Facets for Queries and Clustering with Side Information Model

In this paper describe a specific type of summaries that Query facet the main topic of given text. Existing summarization algorithms are classified into different categories in terms of their summary construction methods...

Secure Sharing of Sensitive Data on a Big Data Platform

Clients store immense measures of delicate information on a major information stage. Sharing touchy information will help ventures decrease the expense of giving clients customized benefits and offer some incentive inclu...

Pollution Monitoring and Controlling System Using Global System for Mobile Communication Network

The level of pollution has increased with times by lot of factors like the increase in population, increased vehicle use, industrialization and urbanization which results in harmful effects on human wellbeing by directly...

A New Approach to Single Phase AC Microgrid System Using UPQC Device

A single phase AC microgrid system with Unified Power Quality Conditioner (UPQC) and renewable energy source (solar) is combined with minimum number of buses which are interconnected in our system. The UPQC controller is...

Enhanced Scalable Learning for Identifying and Ranking for Big Data Using Social Media Factors

In this paper describe a valuable information from online sources has become a prominent research area in information technology in recent years. In recent period, social media services provide a vast amount of user-gene...

Download PDF file
  • EP ID EP405063
  • DOI 10.9756/BIJSESC.8391
  • Views 124
  • Downloads 0

How To Cite

Pavithra P, Balamurugan K (2018). Enhanced Secure Big Data in Distributed Mobile Cloud Computing Using Fuzzy Encryption Model. Bonfring International Journal of Software Engineering and Soft Computing, 8(2), 21-25. https://europub.co.uk./articles/-A-405063