Full Paper View Go Back

Proposed Model for Privacy Preserving in Mobile Cloud Computing

Marjan Soltani1 , Gholamreza Shahmohammadi2

Section:Research Paper, Product Type: Isroset-Journal
Vol.3 , Issue.6 , pp.1-10, Dec-2015


Online published on Jan 02, 2015


Copyright © Marjan Soltani, Gholamreza Shahmohammadi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Marjan Soltani, Gholamreza Shahmohammadi, “Proposed Model for Privacy Preserving in Mobile Cloud Computing,” International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.6, pp.1-10, 2015.

MLA Style Citation: Marjan Soltani, Gholamreza Shahmohammadi "Proposed Model for Privacy Preserving in Mobile Cloud Computing." International Journal of Scientific Research in Computer Science and Engineering 3.6 (2015): 1-10.

APA Style Citation: Marjan Soltani, Gholamreza Shahmohammadi, (2015). Proposed Model for Privacy Preserving in Mobile Cloud Computing. International Journal of Scientific Research in Computer Science and Engineering, 3(6), 1-10.

BibTex Style Citation:
@article{Soltani_2015,
author = {Marjan Soltani, Gholamreza Shahmohammadi},
title = {Proposed Model for Privacy Preserving in Mobile Cloud Computing},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {12 2015},
volume = {3},
Issue = {6},
month = {12},
year = {2015},
issn = {2347-2693},
pages = {1-10},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=229},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=229
TI - Proposed Model for Privacy Preserving in Mobile Cloud Computing
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Marjan Soltani, Gholamreza Shahmohammadi
PY - 2015
DA - 2016/01/02
PB - IJCSE, Indore, INDIA
SP - 1-10
IS - 6
VL - 3
SN - 2347-2693
ER -

2412 Views    2222 Downloads    2116 Downloads
  
  

Abstract :
Today one of the issues involved in cloud computing is the authenticity of the outsourced calculations that are delivered by cloud service providers. Moreover, controlling the penetration of the invaders in this system has a great importance. Regarding the ceaseless growing of information, protection of them in the mobile cloud environment has become more difficult. So it is necessary to use the methods such as data mining to extract knowledge and the hidden information in data and to save them. The aim of this study is to present a security architecture to keep privacy in mobile cloud computing. In this study we proposed a framework for preserving the security of the clouds' data using the data mining techniques. Then by extracting useful rules available on exchanged data on cloud environment, a useful information resource is provided for system manager to secure data and reduce the computational overhead. Various methods such as parallel executing of algorithms' associative rules extraction are used for reducing computation of cost and improving process of associative rules extraction.

Key-Words / Index Term :
Cloud Computing, Security Architecture, Privacy

References :
[1]. Lifei Wei, Haojin Zhu, Zhenfu Cao, Xiaolei Dong, Weiwei Jia, Yunlu Chen, Athanasios V. Vasilakos, “Security and privacy for storage and computation in cloud computing”, Information Sciences 258, Page No( 371–386) ,Jan 2014.
[2]. The NIST Definition of Cloud computing version15,by peter Mell and Grance, october 7 , 2009 ,National Istitute of standards and Technology (NIST) , Information Technology Laboratory (www.csrc.nist.gov)
[3]. I .Sriram ana A.khajeh-hosseini,"Reserch Agenda in Cloud Technologies", Methodology, 2008.
[4]. L.Wang, G.V.Laszewski, A.Younge, X.He, "Cloud Computing: a Perspective Study," Provider, volume -28,Page No(137-146),Feb 2010.
[5]. A. Lenk, M. Klems, J. Nimis, S. Tai, and T. Sandholm, “What’s inside the Cloud? An architectural map of the Cloud landscape,” 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, Page No(23-31), May. 2009.
[6]. Pradeep Kumar Tiwari, Dr. Bharat Mishra," Cloud Computing Security Issues, Challenges and Solution", International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, Volume 2, Issue 8, August 2012.
[7]. Pankaj Sareen," Cloud Computing: Types, Architecture, Applications, Concerns, Virtualization and Role of IT Governance in Cloud", International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, March 2013.
[8]. Q. Zhang, L. Cheng, and R. Boutaba, “Cloud computing: state-of-the-art and research challenges,” Journal of Internet Services and Applications, Volume-01, Page No(7-18), Apr. 2010.
[9]. Ashutosh Kumar Singh, Dr. Ramapati Mishra, Fuzail Ahmad, Raj Kumar Sagar, Anil Kumar Chaudhary ,"A Review of Cloud Computing Open Architecture and Its Security Issues", International Journal of Scientific & Technology Research Volume-01, Issue-06, ISSN 2277-8616 July 2012
[10]. Kuyoro S.O, Ibikunle F ,Awodele o ,"Cloud Computing Security Issues and Challenges",International Journal Of Computer Network,May 2011
[11]. Flavio Lombardi, Roberto Di Pietro. "Transparent Security for Cloud" SAC '10: Proceedings of the 2010 ACM Symposium on Applied Computing, Page No( 414-415), March 2010.
[12]. Chang-Lung Tsai, 2Uei-Chin Lin,Information Security of Cloud Computing for Enterprises , Advances on Information Sciences and Service Sciences. Volume-03, Number-01, February 2011.
[13]. Waseen Iqbal,Shahid yousaf,"Formal Modeling Of Agent Based Cloud Computing Services Using Petri Nets",VFAST Transactions on Software Engineering,August 2013.
[14]. Sadeghzadeh Payam , Bahrehpoor Davood, Sadeghzadeh Peyman. " Analysis of security challenges in cloud computing”, Eighth Symposium advances in science and technology,December 2014.
[15]. Sadralsadati Seyed Mohsen , Karegar Mohammad Javad ,” Security challenges in cloud computing and solution to improve security in the development of e-government services” Eighth Symposium advances in science and technology, December 2014.
[16]. Talebi Samira, Khotanloo Hasan ,” Check cloud security attacks and strategies to deal with them” The first national workshop on Cloud Computing, Iran, Amirkabir University of Technology, November2012.
[17]. Soltanbaghshahi Somayeh, Soltanbaghshahi Leyla,Khademzadeh Ahmad,Jobehdari Sam.” Analysis of security challenges and their effect on cloud computing” The first national workshop on Cloud Computing,Iran, Amirkabir University of Technology, November2012.
[18]. Adaptive, scalable and reliable monitoring of big data on clouds, Mauro Andreolini, Michele Colajanni, Marcello Pietri, Stefania Tosi, Journal of Parallel and Distributed Computing, Available online 26 August 2014.
[19]. Narzu Tarannum and Nova Ahmed, ”EFFICIENT AND RELIABLE HYBRID CLOUD ARCHITECTURE FOR BIG DATABASE”, International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Volume-03, No-06, December 2013.
[20]. Tilmann Rabl, Mohammad Sadoghi, Hans-Arno Jacobsen, Sergio G ´ omez-Villamor, Victor Munt ´ es-Mulero, Serge Mankovskii, “Solving Big Data Challenges for Enterprise Application Performance Management”, Proceedings of the VLDB Endowment, Volume-05, No-12,March 2012.
[21]. Halil Ibrahim Karaca, Migration of an On-Premise Single-Tenant Enterprise Application to the Azure Cloud: The Multi-Tenancy Case Study, Master Thesis, TARTU, 2013.
[22]. Carlo Curino, Evan P. C. Jones, Raluca Ada Popa, Nirmesh Malviya, Eugene Wu, Sam Madden, Hari Balakrishnan, and Nickolai Zeldovich, Relational Cloud: A Database-as-a-Service for the Cloud, In Proceedings of the 5th Biennial Conference on Innovative Data Systems Research (CIDR), Pacific Grove, CA, January 2011.
[23]. Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, and Hui (Wendy) Wang,” Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases”, IEEE Systems Journal, Volume-07, No-03,Page No(385-395), September 2013.
[24]. Chao-Lung Yang , R.J. Kuo, Chia-Hsuan Chien, Nguyen Thi Phuong Quyen , “Non-dominated sorting genetic algorithm using fuzzy membership chromosome for categorical data clustering”, Applied Soft Computing 30 Page No(113–122),January 2015.
[25]. http://commons.wikimedia.org/wiki/File:Mobile_Cloud_Architecture.pdf
[26]. Pawan Lingrasa, Ahmed Elagamya, Asma Ammarb, Zied Elouedib”, Iterative meta-clustering through granular hierarchy of supermarket customers and products”, Information Sciences, Volume 257, Pages No (14–31),February 2014.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation