Loading…

Mobile cloud computing using unpredictable queriable cryptography

This study looks at the safety issue of outsourcing user resources from the cloud. There is a specific combination encryption system to search for authenticated user information in the cloud. The framework facilitates parallel fused keyword searches besides matched performance, two essential conside...

Full description

Saved in:
Bibliographic Details
Published in:AIP conference proceedings 2022-10, Vol.2519 (1)
Main Authors: Laxmi, K. Bhagya, Praveena, B. J., Priyanka, M.
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page
container_issue 1
container_start_page
container_title AIP conference proceedings
container_volume 2519
creator Laxmi, K. Bhagya
Praveena, B. J.
Priyanka, M.
description This study looks at the safety issue of outsourcing user resources from the cloud. There is a specific combination encryption system to search for authenticated user information in the cloud. The framework facilitates parallel fused keyword searches besides matched performance, two essential considerations for realistic searchable encryption. A disorderly transformation approach is proposed to help stable indexing, preservation, and query fudge our keyword. A safe sharing list is also generated to identify the corresponding outcomes while protecting user data protection and privacy, saving user mobile device energy. Our strategy means that even the cloud vendor who is semi-trustful in our situation is privately protected for the customer. The suggested approach is intended to effectively recover the encrypted data stored remotely for mobile cloud scenarios using cryptography. Extensive tests are carried out, and test findings indicate that the proposed solution is reliable and ideal for a stable cloud server.
doi_str_mv 10.1063/5.0109781
format article
fullrecord <record><control><sourceid>proquest_scita</sourceid><recordid>TN_cdi_proquest_journals_2720625426</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2720625426</sourcerecordid><originalsourceid>FETCH-LOGICAL-p1331-28888ca98077913152afc1eec805805ed1c547abe7b37de18c92ab22be5011fa3</originalsourceid><addsrcrecordid>eNp9kE9LxDAQxYMoWFcPfoOCN6HrTNI07XFZ_AcrXhS8hTRN1yzdJqapsN_eurvgzeExM4cf84ZHyDXCHKFgd3wOCJUo8YQkyDlmosDilCQAVZ7RnH2ck4th2ADQSogyIYsXV9vOpLpzY5Nqt_VjtP06HYd9730wjdVR1RPzNZpg95sOOx_dOij_ubskZ63qBnN1nDPy_nD_tnzKVq-Pz8vFKvPIGGa0nEqrqgQhKmTIqWo1GqNL4JNMg5rnQtVG1Ew0BktdUVVTWhsOiK1iM3JzuOuDmz4Zoty4MfSTpaSCQkF5TouJuj1Qg7ZRRet66YPdqrCTCPI3IsnlMaL_4G8X_kDpm5b9AIWvZzQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2720625426</pqid></control><display><type>article</type><title>Mobile cloud computing using unpredictable queriable cryptography</title><source>American Institute of Physics:Jisc Collections:Transitional Journals Agreement 2021-23 (Reading list)</source><creator>Laxmi, K. Bhagya ; Praveena, B. J. ; Priyanka, M.</creator><contributor>Loganathan, K. ; Sakthivel, P.</contributor><creatorcontrib>Laxmi, K. Bhagya ; Praveena, B. J. ; Priyanka, M. ; Loganathan, K. ; Sakthivel, P.</creatorcontrib><description>This study looks at the safety issue of outsourcing user resources from the cloud. There is a specific combination encryption system to search for authenticated user information in the cloud. The framework facilitates parallel fused keyword searches besides matched performance, two essential considerations for realistic searchable encryption. A disorderly transformation approach is proposed to help stable indexing, preservation, and query fudge our keyword. A safe sharing list is also generated to identify the corresponding outcomes while protecting user data protection and privacy, saving user mobile device energy. Our strategy means that even the cloud vendor who is semi-trustful in our situation is privately protected for the customer. The suggested approach is intended to effectively recover the encrypted data stored remotely for mobile cloud scenarios using cryptography. Extensive tests are carried out, and test findings indicate that the proposed solution is reliable and ideal for a stable cloud server.</description><identifier>ISSN: 0094-243X</identifier><identifier>EISSN: 1551-7616</identifier><identifier>DOI: 10.1063/5.0109781</identifier><identifier>CODEN: APCPCS</identifier><language>eng</language><publisher>Melville: American Institute of Physics</publisher><subject>Cloud computing ; Cryptography ; Electronic devices ; Encryption ; Mobile computing</subject><ispartof>AIP conference proceedings, 2022-10, Vol.2519 (1)</ispartof><rights>Author(s)</rights><rights>2022 Author(s). Published by AIP Publishing.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>309,310,314,780,784,789,790,23930,23931,25140,27924,27925</link.rule.ids></links><search><contributor>Loganathan, K.</contributor><contributor>Sakthivel, P.</contributor><creatorcontrib>Laxmi, K. Bhagya</creatorcontrib><creatorcontrib>Praveena, B. J.</creatorcontrib><creatorcontrib>Priyanka, M.</creatorcontrib><title>Mobile cloud computing using unpredictable queriable cryptography</title><title>AIP conference proceedings</title><description>This study looks at the safety issue of outsourcing user resources from the cloud. There is a specific combination encryption system to search for authenticated user information in the cloud. The framework facilitates parallel fused keyword searches besides matched performance, two essential considerations for realistic searchable encryption. A disorderly transformation approach is proposed to help stable indexing, preservation, and query fudge our keyword. A safe sharing list is also generated to identify the corresponding outcomes while protecting user data protection and privacy, saving user mobile device energy. Our strategy means that even the cloud vendor who is semi-trustful in our situation is privately protected for the customer. The suggested approach is intended to effectively recover the encrypted data stored remotely for mobile cloud scenarios using cryptography. Extensive tests are carried out, and test findings indicate that the proposed solution is reliable and ideal for a stable cloud server.</description><subject>Cloud computing</subject><subject>Cryptography</subject><subject>Electronic devices</subject><subject>Encryption</subject><subject>Mobile computing</subject><issn>0094-243X</issn><issn>1551-7616</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNp9kE9LxDAQxYMoWFcPfoOCN6HrTNI07XFZ_AcrXhS8hTRN1yzdJqapsN_eurvgzeExM4cf84ZHyDXCHKFgd3wOCJUo8YQkyDlmosDilCQAVZ7RnH2ck4th2ADQSogyIYsXV9vOpLpzY5Nqt_VjtP06HYd9730wjdVR1RPzNZpg95sOOx_dOij_ubskZ63qBnN1nDPy_nD_tnzKVq-Pz8vFKvPIGGa0nEqrqgQhKmTIqWo1GqNL4JNMg5rnQtVG1Ew0BktdUVVTWhsOiK1iM3JzuOuDmz4Zoty4MfSTpaSCQkF5TouJuj1Qg7ZRRet66YPdqrCTCPI3IsnlMaL_4G8X_kDpm5b9AIWvZzQ</recordid><startdate>20221003</startdate><enddate>20221003</enddate><creator>Laxmi, K. Bhagya</creator><creator>Praveena, B. J.</creator><creator>Priyanka, M.</creator><general>American Institute of Physics</general><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20221003</creationdate><title>Mobile cloud computing using unpredictable queriable cryptography</title><author>Laxmi, K. Bhagya ; Praveena, B. J. ; Priyanka, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p1331-28888ca98077913152afc1eec805805ed1c547abe7b37de18c92ab22be5011fa3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Cloud computing</topic><topic>Cryptography</topic><topic>Electronic devices</topic><topic>Encryption</topic><topic>Mobile computing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Laxmi, K. Bhagya</creatorcontrib><creatorcontrib>Praveena, B. J.</creatorcontrib><creatorcontrib>Priyanka, M.</creatorcontrib><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>AIP conference proceedings</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Laxmi, K. Bhagya</au><au>Praveena, B. J.</au><au>Priyanka, M.</au><au>Loganathan, K.</au><au>Sakthivel, P.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Mobile cloud computing using unpredictable queriable cryptography</atitle><jtitle>AIP conference proceedings</jtitle><date>2022-10-03</date><risdate>2022</risdate><volume>2519</volume><issue>1</issue><issn>0094-243X</issn><eissn>1551-7616</eissn><coden>APCPCS</coden><abstract>This study looks at the safety issue of outsourcing user resources from the cloud. There is a specific combination encryption system to search for authenticated user information in the cloud. The framework facilitates parallel fused keyword searches besides matched performance, two essential considerations for realistic searchable encryption. A disorderly transformation approach is proposed to help stable indexing, preservation, and query fudge our keyword. A safe sharing list is also generated to identify the corresponding outcomes while protecting user data protection and privacy, saving user mobile device energy. Our strategy means that even the cloud vendor who is semi-trustful in our situation is privately protected for the customer. The suggested approach is intended to effectively recover the encrypted data stored remotely for mobile cloud scenarios using cryptography. Extensive tests are carried out, and test findings indicate that the proposed solution is reliable and ideal for a stable cloud server.</abstract><cop>Melville</cop><pub>American Institute of Physics</pub><doi>10.1063/5.0109781</doi><tpages>6</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0094-243X
ispartof AIP conference proceedings, 2022-10, Vol.2519 (1)
issn 0094-243X
1551-7616
language eng
recordid cdi_proquest_journals_2720625426
source American Institute of Physics:Jisc Collections:Transitional Journals Agreement 2021-23 (Reading list)
subjects Cloud computing
Cryptography
Electronic devices
Encryption
Mobile computing
title Mobile cloud computing using unpredictable queriable cryptography
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-30T08%3A44%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_scita&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Mobile%20cloud%20computing%20using%20unpredictable%20queriable%20cryptography&rft.jtitle=AIP%20conference%20proceedings&rft.au=Laxmi,%20K.%20Bhagya&rft.date=2022-10-03&rft.volume=2519&rft.issue=1&rft.issn=0094-243X&rft.eissn=1551-7616&rft.coden=APCPCS&rft_id=info:doi/10.1063/5.0109781&rft_dat=%3Cproquest_scita%3E2720625426%3C/proquest_scita%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-p1331-28888ca98077913152afc1eec805805ed1c547abe7b37de18c92ab22be5011fa3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2720625426&rft_id=info:pmid/&rfr_iscdi=true