Proposed Model for Privacy Preserving in Mobile Cloud Computing

Authors

  • Marjan Soltani Department of Computer Engineering Islamic Azad University, Ashtian, Iran
  • Gholamreza Shahmohammadi Department of Information Technology, Olum Entezami Amin University, Tehran, Iran

Keywords:

Cloud Computing, Security Architecture, Privacy

Abstract

Today one of the issues involved in cloud computing is the authenticity of the outsourced calculations that are delivered by cloud service providers. Moreover, controlling the penetration of the invaders in this system has a great importance. Regarding the ceaseless growing of information, protection of them in the mobile cloud environment has become more difficult. So it is necessary to use the methods such as data mining to extract knowledge and the hidden information in data and to save them. The aim of this study is to present a security architecture to keep privacy in mobile cloud computing. In this study we proposed a framework for preserving the security of the clouds' data using the data mining techniques. Then by extracting useful rules available on exchanged data on cloud environment, a useful information resource is provided for system manager to secure data and reduce the computational overhead. Various methods such as parallel executing of algorithms' associative rules extraction are used for reducing computation of cost and improving process of associative rules extraction.

 

References

L. Wei, Haojin Zhu, Zhenfu Cao, Xiaolei Dong, Weiwei Jia, Yunlu Chen, Athanasios V. Vasilakos, “Security and privacy for storage and computation in cloud computing”, Information Sciences, Vol.258, Issue.3, pp.371–386, 2014.

P. Mell, Grance, “The NIST Definition of Cloud computing version15”, National Institute of standards and Technology (NIST), USA, pp.1-230, 2009.

S.L. Mewada, U.K. Singh, P. Sharma, "Security Enhancement in Cloud Computing (CC)", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.31-37, 2013.

R. Piplode, P. Sharma, U.K. Singh, "Study of Threats, Risk and Challenges in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.26-30, 2013.

B. Paul, M. Azath, "Survey on Preserving Data Privacy in Cloud", International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.57-61, 2014.

PK. Tiwari, B. Mishra," Cloud Computing Security Issues, Challenges and Solution", International Journal of Emerging Technology and Advanced Engineering, Vol.2, Issue.8, pp.533-538, 2012.

Pankaj Sareen," Cloud Computing: Types, Architecture, Applications, Concerns, Virtualization and Role of IT Governance in Cloud", International Journal of Advanced Research in Computer Science and Software Engineering, Vol.3, Issue.3, pp.533-538, 2013.

Q. Zhang, L. Cheng, R. Boutaba, “Cloud computing: state-of-the-art and research challenges,” Journal of Internet Services and Applications, Vol.1, Issue.1, pp.7-18, 2010.

AK. Singh, R Mishra, F Ahmad, RK Sagar, AK. Chaudhary, “A Review of Cloud Computing Open Architecture and Its Security Issues", International Journal of Scientific & Technology Research, Vol.1, Issue. 6, pp.65-67, 2012.

V. Patidar, M. Kumbhkar, "Analysis of Cloud Computing Security Issues in Software as a Service", International Journal of Scientific Research in Computer Science and Engineering, Vol.2, Issue.3, pp.1-5, 2014.

V.P.Muthukumar and R.Saranya, "A Survey on Security Threats and Attacks in Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.120-125, 2014.

Chang-Lung Tsai, 2Uei-Chin Lin, “Information Security of Cloud Computing for Enterprises”, Advances on Information Sciences and Service Sciences, Vol.3, No.1, pp.1-32, 2011.

Waseen Iqbal,Shahid yousaf, "Formal Modeling Of Agent Based Cloud Computing Services Using Petri Nets", VFAST Transactions on Software Engineering, Vol.1, Issue.2, pp.1-6, 2013.

MD. Parekh, R. Sridaran, “An analysis of security challenges in cloud computing”, International Journal of Advanced Computer Science and Applications, Vol.4, Issue.1, pp.38-46, 2013.

K. So, “Cloud computing security issues and challenges”, International Journal of Computer Networks, Vol.3, Issue.5, pp.247-55, 2011.

Swapnil Rajesh Telrandhe and Deepak Kapgate, "Authentication Model on Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.2, Issue.10, pp.33-37, 2014.

S. Ayyub, D. Roy, "Cloud Computing Characteristics and Security Issues", International Journal of Computer Sciences and Engineering, Vol.1, Issue.4, pp.18-22, 2013.

M. Andreolini, M. Colajanni, M. Pietri, S. Tosi, “Adaptive, scalable and reliable monitoring of big data on clouds”, Journal of Parallel and Distributed Computing, Vol.79, Issue.80, pp.67-79, 2015.

P. Sharma, V. Garg, R. Kaur, S. Sonare , "Big Data in Cloud Environment", International Journal of Computer Sciences and Engineering, Vol.1, Issue.3, pp.15-17, 2013.

Bullarao Domathoti, Rajia Begum and Nageswara Rao.P, "Privacy Preserving Collaborative Auditing Data Storage Scheme in Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.212-218, 2015.

HI. Karaca, “Migration of an On-Premise Single-Tenant Enterprise Application to the Azure Cloud: The Multi-Tenancy Case Study”, Master Thesis, TARTU, pp.1-120, 2013.

J. Singh, R. Rana, "Enhance Security Issues Using Data Cipher Algorithm in Cloud", International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.159-162, 2014.

Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, and Hui (Wendy) Wang,” Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases”, IEEE Systems Journal, Vol.7, No.3, pp.385-395, 2013.

Chao-Lung Yang , R.J. Kuo, Chia-Hsuan Chien, Nguyen Thi Phuong Quyen , “Non-dominated sorting genetic algorithm using fuzzy membership chromosome for categorical data clustering”, Applied Soft Computing, Vol.30, pp.113–122, 2015.

R.Nallakumar, Dr.N.Sengottaiyan and S.Nithya, "A Survey of Task Scheduling Methods in Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.2, Issue.10, pp.9-13, 2014.

P. Lingrasa, A. Elagamya, A. Ammarb, Z. Elouedib, “Iterative meta-clustering through granular hierarchy of supermarket customers and products”, Information Sciences, Vol.257, Issue.1, pp.14–31, 2014.

Downloads

Published

2015-12-30

How to Cite

[1]
M. Soltani and G. Shahmohammadi, “Proposed Model for Privacy Preserving in Mobile Cloud Computing”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 3, no. 6, pp. 1–10, Dec. 2015.

Issue

Section

Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.