Ghost encryption: Mobile data security model encrypting data before moving it to the cloud service provider

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Cloud Computing is the current technology that revolutionize the mobile and IT industry. Most of the mobile vendors are providing extended data storage over the cloud either with the third party cloud service provider such as Samsung Android smart phones with DropBox storage. On the other hand, Apple iPhone and Windows Phone has their own cloud data storage such as iCloud and SkyDrive respectively. However, mobile phone cloud application users are hesitant to move their data from their mobile phone to the cloud service provider because of increasing data security and privacy concern. In this paper, a mobile data security encryption model is proposed to encounter this problem. With the technical advancement in the mobile and cloud computing, an encryption algorithm is designed known as Ghost, Geometric Host for Mobile Data Security.

Original languageEnglish
Title of host publication2013 5th International Conference on Advanced Computing, ICoAC 2013
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages512-516
Number of pages5
ISBN (Electronic)9781479934478
DOIs
StatePublished - 12 Oct 2014
Externally publishedYes
Event5th International Conference on Advanced Computing, ICoAC 2013 - Chennai, India
Duration: 18 Dec 201320 Dec 2013

Publication series

Name2013 5th International Conference on Advanced Computing, ICoAC 2013

Conference

Conference5th International Conference on Advanced Computing, ICoAC 2013
Country/TerritoryIndia
CityChennai
Period18/12/1320/12/13

Keywords

  • Cloud computing
  • Data security
  • Encryption
  • Mobile computing

Fingerprint

Dive into the research topics of 'Ghost encryption: Mobile data security model encrypting data before moving it to the cloud service provider'. Together they form a unique fingerprint.

Cite this