Anusha R, P. Tara Kumari


The issues of understanding storing and understanding computing in mobile-Internet applications may be overcome by mobile cloud-computing since the new paradigm may also accomplish cloud based multi-user data discussing, finish geographical service limitation, and process real-time tasks efficiently concurrently. With integrating into cloud-computing, security issues for example data confidentiality and user authority may arise within the mobile cloud-computing system, that's concerned because the primary constraints for the developments of mobile cloud-computing. To be able to provide secure operation, a hierarchical access control method using modified hierarchical attribute-based file encryption along with a modified three-layer structure is suggested within this paper. Within this paper, a hierarchical access control method through an altered hierarchical attribute-based file encryption along with a modified three-layer structure is suggested. The ABE based access control method uses several tags to mark the attributes the particular approved user must possess. Within the specific mobile cloud-computing model, enormous data which can be from numerous cell phones, for example smartphones, functioned phones and PDAs and so forth may be controlled and monitored while using the system, combined with data may be conscious to unauthorized 3rd party and constraint to legal users too.


Attribute-Based Access; Access Control. Mobile Cloud Computing


V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proceedings of the 13th ACM conference on Computer and communications security. Acm, 2006, pp. 89–98.

S. Abolfazli, Z. Sanaei, E. Ahmed, A. Gani, and R. Buyya, “Cloudbased augmentation for mobile devices: motivation, taxonomies, and open challenges,” Communications Surveys & Tutorials, IEEE, vol. 16, no. 1, pp. 337–368, 2014.

Yuan peng Xie, Hong Wen, Bin Wu, Yixin Jiang and Jiaxiao Meng, “A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing”, IEEE Transactions on Cloud Computing, 2016.

Q. Han, S. Liang, and H. Zhang, “Mobile cloud sensing, big data, and 5g networks make an intelligent and smart world,” Network, IEEE, vol. 29, no. 2, pp. 40–45, 2015.

J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute based encryption,” in Security and Privacy, 2007. SP’07. IEEE Symposium on. IEEE, 2007, pp. 321–334.

B. R. Moyers, J. P. Dunning, R. C. Marchany, and J. G. Tront, “Effects of wi-fi and bluetooth battery exhaustion attacks on mobile devices,” in System Sciences (HICSS), 2010 43rd Hawaii International Conference on. IEEE, 2010, pp. 1–9.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.