Visible to the public Data security protocol for cloudlet based architecture

TitleData security protocol for cloudlet based architecture
Publication TypeConference Paper
Year of Publication2014
AuthorsJindal, M., Dave, M.
Conference NameRecent Advances and Innovations in Engineering (ICRAIE), 2014
Date PublishedMay
Keywordscloud computing, cloud storage, cloudlet, cloudlet based architecture, Computer architecture, Computers, cryptographic protocols, data security protocol, distributed cloud architecture, Encryption, Internet, mobile cloud computing, mobile cloud computing technology, Mobile communication, mobile computing, mobile devices, resource-rich computer, security, unauthorized user

Mobile cloud computing is a combination of mobile computing and cloud computing that provides a platform for mobile users to offload heavy tasks and data on the cloud, thus, helping them to overcome the limitations of their mobile devices. However, while utilizing the mobile cloud computing technology users lose physical control of their data; this ultimately calls for the need of a data security protocol. Although, numerous such protocols have been proposed,none of them consider a cloudlet based architecture. A cloudlet is a reliable, resource-rich computer/cluster which is well-connected to the internet and is available to nearby mobile devices. In this paper, we propose a data security protocol for a distributed cloud architecture having cloudlet integrated with the base station, using the property of perfect forward secrecy. Our protocol not only protects data from any unauthorized user, but also prevents exposure of data to the cloud owner.

Citation Key6909186