Lightweight Security Framework for Data Outsourcing and Storage in Mobile Cloud Computing
Manzamasso Kpelou1, Keshav Kishore2 

1Manzamasso KPELOU, is Currently Student of Computer Science & Engineering at Alakh Prakash Goyal Shimla University, Shimla.
2Keshav Kishore is Currently Working as Faculty of Computer Science & Engineering at Alakh Prakash Goyal Shimla University, Shimla.

Manuscript received on 11 March 2019 | Revised Manuscript received on 19 March 2019 | Manuscript published on 30 July 2019 | PP: 3405-3412 | Volume-8 Issue-2, July 2019 | Retrieval Number: B2239078219/19©BEIESP | DOI: 10.35940/ijrte.B2239.078219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Mobile Cloud computing is define as the new paradigm, and in this new paradigm computational power is on demand service and accessible through mobiles and tablets. When user decides to go towards cloud computing, there is a risk of losing control on his own data. So providing security of the data during transmission and when saved on the cloud storage is a major issue. Any application relying upon an emerging technology should consider the different possible threats. The principal reason why people are afraid of using Cloud technology is that data security and integrity among all other issues involved in Cloud technology constitute a great challenge. As data security issues, access control as well as key management are also a reason why Cloud technology is not widely adopted. In mobile cloud computing, the security related to data involving data integrity, confidentiality, availability and traceability is the most critical concern of cloud users. As now mobile cloud is changing how users used to work over the network, by helping them in terms of cost and reduction of tasks complexity. Hence, it is very important for the user to be ensured that the transmission of the data is secure, that the consistency as well as the storage of the data on the cloud provider side is secured. Hence the necessity for developing trust security model is demanding.
Keywords: Mobile Cloud Computing, Cloud Computing, Data Encryption, Mobile Cloud Security.

Scope of the Article: Cloud Computing