SlideShare a Scribd company logo
1 of 15
Mobile Cloud Computing Using
Cryptographic Hash Function
Algorithm
UNDER THE GUIDANCE OF PRESENTED BY
Ms. Swetha K.H., Lakshmi S.
Asst. Professor, B.E., MTECH, 1SV13CS401
Dept. Of CSE,SIET
TECHNICAL SEMINAR
ON
CONTENT
1. INTRODUCTION
2. THEORY
Mobile Cloud Computing
Cloud Computing
Cryptographic Hash Function Algorithm
3. RESULTS AND DISCUSSION
4. CONCLUSION AND FUTURE WORK
INTRODUCTION
• Mobile cloud computing has become one of the important
part of human life.
• According to ABI research ,the number of users are
increasing each year ,as it was 42.8 million in 2008 and
increased to 998 million in 2014.
• However still some companies are not interested in adopting
the mobile computing because of risks of security & privacy
• It is necessary to build mobile cloud computing security
system that can reduce the risks of security and privacy
• The security system will use an algorithm Hash Function
Cryptographic & Hence the process of decryption becomes
more complicated and company's data are better protected.
THEORY
MOBILE CLOUD COMPUTING
• Technology which utilizes device resources and integrate
networks so that limited storage and high mobility will meet
cloud, which is capable of servicing many mobile devices
anywhere, anytime via the Internet, irrespective of platform.
• Mobile Cloud Computing consists
of three heterogenic domains, i.e
mobile phone, cloud computing,
and wireless network by ignoring
heterogenic environmental factors.
• Applications run on the service providers' servers and then
sent to the user via the mobile browser transactions.
CLOUD COMPUTING
Cloud computing model consists of five characteristics, three
service models, and four deployment models.
Three service models are:-
• Software as a Service (SaaS)
• Platform as a Service (PaaS)
• Infrastructure as a Service (IaaS)
Four Deployment models are:-
• Private Cloud
• Community Cloud
• Public Cloud
• Hybrid Cloud
 CRYPTOGRAPHIC HASH FUNCTION
• The hash function is an algorithm that converts the
message into a text or a series of random characters.
• Hash function is function that
accepts input of plaintext string
& converts it into a fixed length
output string.
• Hash change a message that can
be read (readable text)into a
random message (Unreadable text) same as encryption
process.
RESULTS AND DISCUSSION
 This process starts with recognizing further objects &
existing theories of related system to explore the situation of
developed system .
 Then consultation with business that process data in cloud is
observed and determined..
 Once data is obtained, the next step is to determine either
system is running well or not.
 Finally, the result of this activity is studied to complete the
process .
 Further it can be discussed on basis of following topics:-
A. System Design B. Database Design
SYSTEM DESIGN
• The system design process aims to find the right
implementation model.
• The system design can be a model or visual design.
• Users will use a portal as a gateway to enter into the service of
Mobile Cloud.
• Mobile Cloud is built using two units of servers viz. Database
server & web server using virtualization techniques.
• The process is then followed by:-
Adding a buffer bits booster, Increasing the value of the key
length, Initializing buffer and Processing key in block 512 bits.
Hash Function Application Hash Function Process
DATABASE DESIGN
• The main Hash Function algorithm operates on a 128-bit state,
32 bit words, divided into A, B, C, and D notation which are
initialized into fixed constant.
• The main algorithm then uses each 512-bit message block in
turn to modify the state.
• The processing of a message block consists of four similar
stages, termed rounds.
• Each round is composed of 16 similar operations based on a
non-linear function F, modular addition, and left rotation.
• The database is used as a container in taking the data in
information systems.
• To retrieve data hash algorithm, online sales system
embedded with hash algorithm on the server side and mobile
applications is used.
• Applications is designed for users who will interact with the
system.
• It allows an administrator to manage transactions easily
• Each transmitted data is going through encryption process
with hash algorithms
• The next test is intended to determine the feasibility of a
system that has been designed above.
• The results of these tests if accepted, the next step is
implementation, if not it should be reviewed and improved.
• From the test which has been done, it is known that all
functions can run normally, as well as the content displayed
get positive response from users.
CONCLUSION
• Increasing security of data on Mobile Cloud Computing has to
go through hash encryption mechanism so every line of
plaintext will be transmitted in encrypted form that can not be
read directly.
• The virtual machines can improve data security of mobile
cloud application by serving mobile embedded hash
algorithm.
• Each virtual machine helps the process of data transmission and
simultaneously acts as the security engine for bits of data are
sent simultaneously
• Encryption process by using a hash algorithm will make it
difficult for hackers to retrieve the information on cloud-based
computing.
FUTURE WORK
• Hash algorithm is embedded in a mobile application
connected to centralized database.
• The system built does not apply in mobile applications to
distributed systems.
• The system has not been through the stages of test stress test.
• It is hoped these tests can measure the resistance of mobile
cloud server in serving users.
• From these results we obtained cloud sever ability to serve
mobile users.
Mobile Cloud Computing Using Cryptographic Hash

More Related Content

Similar to Mobile Cloud Computing Using Cryptographic Hash

Cloudera Federal Forum 2014: EzBake, the DoDIIS App Engine
Cloudera Federal Forum 2014: EzBake, the DoDIIS App EngineCloudera Federal Forum 2014: EzBake, the DoDIIS App Engine
Cloudera Federal Forum 2014: EzBake, the DoDIIS App EngineCloudera, Inc.
 
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...RahulJain989779
 
Web services have made the development of mobile Web applications much easier...
Web services have made the development of mobile Web applications much easier...Web services have made the development of mobile Web applications much easier...
Web services have made the development of mobile Web applications much easier...Respa Peter
 
Company profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private LimitedCompany profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private LimitedSubodh Deshpande
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Dr. Richard Otieno
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Yashwanth Reddy
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabusViolet Violet
 
System Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docxSystem Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docxdeanmtaylor1545
 
Online talent sourcing - a future essentia
Online talent sourcing - a future essentiaOnline talent sourcing - a future essentia
Online talent sourcing - a future essentiaHSE Guru
 
E-Score Data Management system on mobiles to survey the electrical usage
E-Score Data Management system on mobiles to survey the electrical usageE-Score Data Management system on mobiles to survey the electrical usage
E-Score Data Management system on mobiles to survey the electrical usageMike Taylor
 
Lecture 3.31 3.32.pptx
Lecture 3.31  3.32.pptxLecture 3.31  3.32.pptx
Lecture 3.31 3.32.pptxRATISHKUMAR32
 
Technology insights: Decision Science Platform
Technology insights: Decision Science PlatformTechnology insights: Decision Science Platform
Technology insights: Decision Science PlatformDecision Science Community
 
Do I Need A Service Mesh.pptx
Do I Need A Service Mesh.pptxDo I Need A Service Mesh.pptx
Do I Need A Service Mesh.pptxPINGXIONG3
 
A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...
A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...
A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...Fatima Qayyum
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud ComputingSripati Mahapatra
 
Trends in recent technology
Trends in recent technologyTrends in recent technology
Trends in recent technologysai krishna
 
An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...IOSR Journals
 

Similar to Mobile Cloud Computing Using Cryptographic Hash (20)

Cloudera Federal Forum 2014: EzBake, the DoDIIS App Engine
Cloudera Federal Forum 2014: EzBake, the DoDIIS App EngineCloudera Federal Forum 2014: EzBake, the DoDIIS App Engine
Cloudera Federal Forum 2014: EzBake, the DoDIIS App Engine
 
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
 
Cloud Networking
Cloud NetworkingCloud Networking
Cloud Networking
 
N1803048386
N1803048386N1803048386
N1803048386
 
Web services have made the development of mobile Web applications much easier...
Web services have made the development of mobile Web applications much easier...Web services have made the development of mobile Web applications much easier...
Web services have made the development of mobile Web applications much easier...
 
Company profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private LimitedCompany profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private Limited
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabus
 
System Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docxSystem Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docx
 
Online talent sourcing - a future essentia
Online talent sourcing - a future essentiaOnline talent sourcing - a future essentia
Online talent sourcing - a future essentia
 
E-Score Data Management system on mobiles to survey the electrical usage
E-Score Data Management system on mobiles to survey the electrical usageE-Score Data Management system on mobiles to survey the electrical usage
E-Score Data Management system on mobiles to survey the electrical usage
 
Lecture 3.31 3.32.pptx
Lecture 3.31  3.32.pptxLecture 3.31  3.32.pptx
Lecture 3.31 3.32.pptx
 
Technology insights: Decision Science Platform
Technology insights: Decision Science PlatformTechnology insights: Decision Science Platform
Technology insights: Decision Science Platform
 
Do I Need A Service Mesh.pptx
Do I Need A Service Mesh.pptxDo I Need A Service Mesh.pptx
Do I Need A Service Mesh.pptx
 
A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...
A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...
A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
Trends in recent technology
Trends in recent technologyTrends in recent technology
Trends in recent technology
 
An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...
 
H017113842
H017113842H017113842
H017113842
 

Recently uploaded

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 

Recently uploaded (20)

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 

Mobile Cloud Computing Using Cryptographic Hash

  • 1. Mobile Cloud Computing Using Cryptographic Hash Function Algorithm UNDER THE GUIDANCE OF PRESENTED BY Ms. Swetha K.H., Lakshmi S. Asst. Professor, B.E., MTECH, 1SV13CS401 Dept. Of CSE,SIET TECHNICAL SEMINAR ON
  • 2. CONTENT 1. INTRODUCTION 2. THEORY Mobile Cloud Computing Cloud Computing Cryptographic Hash Function Algorithm 3. RESULTS AND DISCUSSION 4. CONCLUSION AND FUTURE WORK
  • 3. INTRODUCTION • Mobile cloud computing has become one of the important part of human life. • According to ABI research ,the number of users are increasing each year ,as it was 42.8 million in 2008 and increased to 998 million in 2014. • However still some companies are not interested in adopting the mobile computing because of risks of security & privacy • It is necessary to build mobile cloud computing security system that can reduce the risks of security and privacy • The security system will use an algorithm Hash Function Cryptographic & Hence the process of decryption becomes more complicated and company's data are better protected.
  • 4. THEORY MOBILE CLOUD COMPUTING • Technology which utilizes device resources and integrate networks so that limited storage and high mobility will meet cloud, which is capable of servicing many mobile devices anywhere, anytime via the Internet, irrespective of platform. • Mobile Cloud Computing consists of three heterogenic domains, i.e mobile phone, cloud computing, and wireless network by ignoring heterogenic environmental factors. • Applications run on the service providers' servers and then sent to the user via the mobile browser transactions.
  • 5. CLOUD COMPUTING Cloud computing model consists of five characteristics, three service models, and four deployment models. Three service models are:- • Software as a Service (SaaS) • Platform as a Service (PaaS) • Infrastructure as a Service (IaaS) Four Deployment models are:- • Private Cloud • Community Cloud • Public Cloud • Hybrid Cloud
  • 6.  CRYPTOGRAPHIC HASH FUNCTION • The hash function is an algorithm that converts the message into a text or a series of random characters. • Hash function is function that accepts input of plaintext string & converts it into a fixed length output string. • Hash change a message that can be read (readable text)into a random message (Unreadable text) same as encryption process.
  • 7. RESULTS AND DISCUSSION  This process starts with recognizing further objects & existing theories of related system to explore the situation of developed system .  Then consultation with business that process data in cloud is observed and determined..  Once data is obtained, the next step is to determine either system is running well or not.  Finally, the result of this activity is studied to complete the process .  Further it can be discussed on basis of following topics:- A. System Design B. Database Design
  • 8. SYSTEM DESIGN • The system design process aims to find the right implementation model. • The system design can be a model or visual design. • Users will use a portal as a gateway to enter into the service of Mobile Cloud. • Mobile Cloud is built using two units of servers viz. Database server & web server using virtualization techniques. • The process is then followed by:- Adding a buffer bits booster, Increasing the value of the key length, Initializing buffer and Processing key in block 512 bits.
  • 9. Hash Function Application Hash Function Process
  • 10. DATABASE DESIGN • The main Hash Function algorithm operates on a 128-bit state, 32 bit words, divided into A, B, C, and D notation which are initialized into fixed constant. • The main algorithm then uses each 512-bit message block in turn to modify the state. • The processing of a message block consists of four similar stages, termed rounds. • Each round is composed of 16 similar operations based on a non-linear function F, modular addition, and left rotation.
  • 11. • The database is used as a container in taking the data in information systems. • To retrieve data hash algorithm, online sales system embedded with hash algorithm on the server side and mobile applications is used. • Applications is designed for users who will interact with the system. • It allows an administrator to manage transactions easily • Each transmitted data is going through encryption process with hash algorithms
  • 12. • The next test is intended to determine the feasibility of a system that has been designed above. • The results of these tests if accepted, the next step is implementation, if not it should be reviewed and improved. • From the test which has been done, it is known that all functions can run normally, as well as the content displayed get positive response from users.
  • 13. CONCLUSION • Increasing security of data on Mobile Cloud Computing has to go through hash encryption mechanism so every line of plaintext will be transmitted in encrypted form that can not be read directly. • The virtual machines can improve data security of mobile cloud application by serving mobile embedded hash algorithm. • Each virtual machine helps the process of data transmission and simultaneously acts as the security engine for bits of data are sent simultaneously • Encryption process by using a hash algorithm will make it difficult for hackers to retrieve the information on cloud-based computing.
  • 14. FUTURE WORK • Hash algorithm is embedded in a mobile application connected to centralized database. • The system built does not apply in mobile applications to distributed systems. • The system has not been through the stages of test stress test. • It is hoped these tests can measure the resistance of mobile cloud server in serving users. • From these results we obtained cloud sever ability to serve mobile users.