Open Access Open Access  Restricted Access Subscription Access

A Secure Cloud Based Chatting Application with Hybrid Cryptography


Affiliations
1 Department of Computer Engineering, Smt. Radhikatai Pandav College of Engineering, Nagpur, India
 

The amount of transmitted data from mobile to cloud computing is becomes larger and larger. Nowadays, Mobile cloud computing is vital field as a result of its availability, usability. Mobile cloud computing is most important role because it connects mobile with cloud computing and cloud data transmitted from mobile to cloud and vice versa, through a network. The purpose of the proposed system is to build an encryption system that can encrypts a data and decrypts the data transmitted from mobile to cloud efficiently. During this system can show system for encrypting mobile to cloud data. In this system, we will help the encryption algorithm. There are multiple hybrid encryption algorithms are used. These algorithms are more secure and end to end will be encrypted.
User
Notifications
Font Size

  • Paranjothi, A., Khan, M. S., &Nijim, M., “Survey on Three Components of Mobile Cloud Computing: Offloading, Distribution and Privacy”, Journal of Computer and Communications, Volume 5(06), 2017.
  • Lakshmi, K., Hemalatha, J., & Basha, F., “K-Anonymous Privacy Preserving Technique for Participatory Sensing with Multimedia Data Over Cloud Computing”, International Journal, Volume 4(2), pp. 48-52, 2017.
  • Ali Abdulridha Taha, Dr. Diaa Salama AbdElminaam, Prof. Khalid M Hosny, “Enhancement the Security of Cloud Computing using Hybrid Cryptography Algorithms”, International Journal of Advancements in Computing Technology (IJACT) Volume9, Number3, Dec. 2017.
  • Barhoom, T. S., & Ghosh, M. M., “Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms”, International Journal of Research in Engineering and Science (IJRES), 2016.
  • Debabrata Sarddar, Enakshmi Nandi, “An Authenticate Cryptography based security model for handling multiple requests from multiple devices for Mobile Cloud Computing”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 5, Issue 1, January 2016.
  • Gill, Q. K., & Kaur, K., “A Review on Energy Efficient Computation Offloading Frameworks for Mobile Cloud Computing”, International Journal of Innovations & Advancement in Computer Science, Volume 5, Issue 1, 2016.
  • Patil, Ms Akanksha R., “Attribute Based Secured Storage Middleware for Mobile Cloud Computing”, International conference on recent innovations in engineering and management, 2016.
  • Alotaibi, Mutlaq B. "Antecedents of software-as-a-service (SaaS) adoption: a structural equation model." International Journal of Advanced Computer Research 6.25, 2016.
  • Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul kader, Mohie Mohamed Hadhoud, “Analyzing the Energy Consumption of Security Algorithms for Wireless LANs”, International Journal of Computer Theory and Engineering (IJCTE), VOL.1 No.4, pp: 351- 359, October 2009.
  • Gurjeet Singh, "Security Threats and Maintenance in Mobile ad hoc networks", IJECT, Vol.2, Issue 3, September 2011.
  • Diaa Salama Abdul.Elminaam, Hatem Mohamed Abdul kader, Mohiy Mohamed Hadhoud."" Evaluating the Effects of Cryptography Algorithms on Power Consumption for Different Data Types", International Journal of Network Security ( IJNS),VOL.11 No.2, pp: 91- 100, Sep 2010.
  • Wenjia Li and Anupam Joshi, "Security Issues in Mobile Adhoc Networks - (A Survey)", The 17 th White House Papers Graduate Research in Informatics at Sussex, 2004.

Abstract Views: 191

PDF Views: 105




  • A Secure Cloud Based Chatting Application with Hybrid Cryptography

Abstract Views: 191  |  PDF Views: 105

Authors

Sanjana Awachat, Ashwini Chahande Sakshi Gadge, Snehal Shastrakar Karishma Gajbhiye
Department of Computer Engineering, Smt. Radhikatai Pandav College of Engineering, Nagpur, India

Abstract


The amount of transmitted data from mobile to cloud computing is becomes larger and larger. Nowadays, Mobile cloud computing is vital field as a result of its availability, usability. Mobile cloud computing is most important role because it connects mobile with cloud computing and cloud data transmitted from mobile to cloud and vice versa, through a network. The purpose of the proposed system is to build an encryption system that can encrypts a data and decrypts the data transmitted from mobile to cloud efficiently. During this system can show system for encrypting mobile to cloud data. In this system, we will help the encryption algorithm. There are multiple hybrid encryption algorithms are used. These algorithms are more secure and end to end will be encrypted.

References