Loading…
Mobile cloud computing using unpredictable queriable cryptography
This study looks at the safety issue of outsourcing user resources from the cloud. There is a specific combination encryption system to search for authenticated user information in the cloud. The framework facilitates parallel fused keyword searches besides matched performance, two essential conside...
Saved in:
Published in: | AIP conference proceedings 2022-10, Vol.2519 (1) |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | 1 |
container_start_page | |
container_title | AIP conference proceedings |
container_volume | 2519 |
creator | Laxmi, K. Bhagya Praveena, B. J. Priyanka, M. |
description | This study looks at the safety issue of outsourcing user resources from the cloud. There is a specific combination encryption system to search for authenticated user information in the cloud. The framework facilitates parallel fused keyword searches besides matched performance, two essential considerations for realistic searchable encryption. A disorderly transformation approach is proposed to help stable indexing, preservation, and query fudge our keyword. A safe sharing list is also generated to identify the corresponding outcomes while protecting user data protection and privacy, saving user mobile device energy. Our strategy means that even the cloud vendor who is semi-trustful in our situation is privately protected for the customer. The suggested approach is intended to effectively recover the encrypted data stored remotely for mobile cloud scenarios using cryptography. Extensive tests are carried out, and test findings indicate that the proposed solution is reliable and ideal for a stable cloud server. |
doi_str_mv | 10.1063/5.0109781 |
format | article |
fullrecord | <record><control><sourceid>proquest_scita</sourceid><recordid>TN_cdi_proquest_journals_2720625426</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2720625426</sourcerecordid><originalsourceid>FETCH-LOGICAL-p1331-28888ca98077913152afc1eec805805ed1c547abe7b37de18c92ab22be5011fa3</originalsourceid><addsrcrecordid>eNp9kE9LxDAQxYMoWFcPfoOCN6HrTNI07XFZ_AcrXhS8hTRN1yzdJqapsN_eurvgzeExM4cf84ZHyDXCHKFgd3wOCJUo8YQkyDlmosDilCQAVZ7RnH2ck4th2ADQSogyIYsXV9vOpLpzY5Nqt_VjtP06HYd9730wjdVR1RPzNZpg95sOOx_dOij_ubskZ63qBnN1nDPy_nD_tnzKVq-Pz8vFKvPIGGa0nEqrqgQhKmTIqWo1GqNL4JNMg5rnQtVG1Ew0BktdUVVTWhsOiK1iM3JzuOuDmz4Zoty4MfSTpaSCQkF5TouJuj1Qg7ZRRet66YPdqrCTCPI3IsnlMaL_4G8X_kDpm5b9AIWvZzQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2720625426</pqid></control><display><type>article</type><title>Mobile cloud computing using unpredictable queriable cryptography</title><source>American Institute of Physics:Jisc Collections:Transitional Journals Agreement 2021-23 (Reading list)</source><creator>Laxmi, K. Bhagya ; Praveena, B. J. ; Priyanka, M.</creator><contributor>Loganathan, K. ; Sakthivel, P.</contributor><creatorcontrib>Laxmi, K. Bhagya ; Praveena, B. J. ; Priyanka, M. ; Loganathan, K. ; Sakthivel, P.</creatorcontrib><description>This study looks at the safety issue of outsourcing user resources from the cloud. There is a specific combination encryption system to search for authenticated user information in the cloud. The framework facilitates parallel fused keyword searches besides matched performance, two essential considerations for realistic searchable encryption. A disorderly transformation approach is proposed to help stable indexing, preservation, and query fudge our keyword. A safe sharing list is also generated to identify the corresponding outcomes while protecting user data protection and privacy, saving user mobile device energy. Our strategy means that even the cloud vendor who is semi-trustful in our situation is privately protected for the customer. The suggested approach is intended to effectively recover the encrypted data stored remotely for mobile cloud scenarios using cryptography. Extensive tests are carried out, and test findings indicate that the proposed solution is reliable and ideal for a stable cloud server.</description><identifier>ISSN: 0094-243X</identifier><identifier>EISSN: 1551-7616</identifier><identifier>DOI: 10.1063/5.0109781</identifier><identifier>CODEN: APCPCS</identifier><language>eng</language><publisher>Melville: American Institute of Physics</publisher><subject>Cloud computing ; Cryptography ; Electronic devices ; Encryption ; Mobile computing</subject><ispartof>AIP conference proceedings, 2022-10, Vol.2519 (1)</ispartof><rights>Author(s)</rights><rights>2022 Author(s). Published by AIP Publishing.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>309,310,314,780,784,789,790,23930,23931,25140,27924,27925</link.rule.ids></links><search><contributor>Loganathan, K.</contributor><contributor>Sakthivel, P.</contributor><creatorcontrib>Laxmi, K. Bhagya</creatorcontrib><creatorcontrib>Praveena, B. J.</creatorcontrib><creatorcontrib>Priyanka, M.</creatorcontrib><title>Mobile cloud computing using unpredictable queriable cryptography</title><title>AIP conference proceedings</title><description>This study looks at the safety issue of outsourcing user resources from the cloud. There is a specific combination encryption system to search for authenticated user information in the cloud. The framework facilitates parallel fused keyword searches besides matched performance, two essential considerations for realistic searchable encryption. A disorderly transformation approach is proposed to help stable indexing, preservation, and query fudge our keyword. A safe sharing list is also generated to identify the corresponding outcomes while protecting user data protection and privacy, saving user mobile device energy. Our strategy means that even the cloud vendor who is semi-trustful in our situation is privately protected for the customer. The suggested approach is intended to effectively recover the encrypted data stored remotely for mobile cloud scenarios using cryptography. Extensive tests are carried out, and test findings indicate that the proposed solution is reliable and ideal for a stable cloud server.</description><subject>Cloud computing</subject><subject>Cryptography</subject><subject>Electronic devices</subject><subject>Encryption</subject><subject>Mobile computing</subject><issn>0094-243X</issn><issn>1551-7616</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNp9kE9LxDAQxYMoWFcPfoOCN6HrTNI07XFZ_AcrXhS8hTRN1yzdJqapsN_eurvgzeExM4cf84ZHyDXCHKFgd3wOCJUo8YQkyDlmosDilCQAVZ7RnH2ck4th2ADQSogyIYsXV9vOpLpzY5Nqt_VjtP06HYd9730wjdVR1RPzNZpg95sOOx_dOij_ubskZ63qBnN1nDPy_nD_tnzKVq-Pz8vFKvPIGGa0nEqrqgQhKmTIqWo1GqNL4JNMg5rnQtVG1Ew0BktdUVVTWhsOiK1iM3JzuOuDmz4Zoty4MfSTpaSCQkF5TouJuj1Qg7ZRRet66YPdqrCTCPI3IsnlMaL_4G8X_kDpm5b9AIWvZzQ</recordid><startdate>20221003</startdate><enddate>20221003</enddate><creator>Laxmi, K. Bhagya</creator><creator>Praveena, B. J.</creator><creator>Priyanka, M.</creator><general>American Institute of Physics</general><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20221003</creationdate><title>Mobile cloud computing using unpredictable queriable cryptography</title><author>Laxmi, K. Bhagya ; Praveena, B. J. ; Priyanka, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p1331-28888ca98077913152afc1eec805805ed1c547abe7b37de18c92ab22be5011fa3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Cloud computing</topic><topic>Cryptography</topic><topic>Electronic devices</topic><topic>Encryption</topic><topic>Mobile computing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Laxmi, K. Bhagya</creatorcontrib><creatorcontrib>Praveena, B. J.</creatorcontrib><creatorcontrib>Priyanka, M.</creatorcontrib><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>AIP conference proceedings</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Laxmi, K. Bhagya</au><au>Praveena, B. J.</au><au>Priyanka, M.</au><au>Loganathan, K.</au><au>Sakthivel, P.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Mobile cloud computing using unpredictable queriable cryptography</atitle><jtitle>AIP conference proceedings</jtitle><date>2022-10-03</date><risdate>2022</risdate><volume>2519</volume><issue>1</issue><issn>0094-243X</issn><eissn>1551-7616</eissn><coden>APCPCS</coden><abstract>This study looks at the safety issue of outsourcing user resources from the cloud. There is a specific combination encryption system to search for authenticated user information in the cloud. The framework facilitates parallel fused keyword searches besides matched performance, two essential considerations for realistic searchable encryption. A disorderly transformation approach is proposed to help stable indexing, preservation, and query fudge our keyword. A safe sharing list is also generated to identify the corresponding outcomes while protecting user data protection and privacy, saving user mobile device energy. Our strategy means that even the cloud vendor who is semi-trustful in our situation is privately protected for the customer. The suggested approach is intended to effectively recover the encrypted data stored remotely for mobile cloud scenarios using cryptography. Extensive tests are carried out, and test findings indicate that the proposed solution is reliable and ideal for a stable cloud server.</abstract><cop>Melville</cop><pub>American Institute of Physics</pub><doi>10.1063/5.0109781</doi><tpages>6</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0094-243X |
ispartof | AIP conference proceedings, 2022-10, Vol.2519 (1) |
issn | 0094-243X 1551-7616 |
language | eng |
recordid | cdi_proquest_journals_2720625426 |
source | American Institute of Physics:Jisc Collections:Transitional Journals Agreement 2021-23 (Reading list) |
subjects | Cloud computing Cryptography Electronic devices Encryption Mobile computing |
title | Mobile cloud computing using unpredictable queriable cryptography |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-30T08%3A44%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_scita&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Mobile%20cloud%20computing%20using%20unpredictable%20queriable%20cryptography&rft.jtitle=AIP%20conference%20proceedings&rft.au=Laxmi,%20K.%20Bhagya&rft.date=2022-10-03&rft.volume=2519&rft.issue=1&rft.issn=0094-243X&rft.eissn=1551-7616&rft.coden=APCPCS&rft_id=info:doi/10.1063/5.0109781&rft_dat=%3Cproquest_scita%3E2720625426%3C/proquest_scita%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-p1331-28888ca98077913152afc1eec805805ed1c547abe7b37de18c92ab22be5011fa3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2720625426&rft_id=info:pmid/&rfr_iscdi=true |