Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Mobile Cloud Computing Using Cryptographic Hash
1. Mobile Cloud Computing Using
Cryptographic Hash Function
Algorithm
UNDER THE GUIDANCE OF PRESENTED BY
Ms. Swetha K.H., Lakshmi S.
Asst. Professor, B.E., MTECH, 1SV13CS401
Dept. Of CSE,SIET
TECHNICAL SEMINAR
ON
2. CONTENT
1. INTRODUCTION
2. THEORY
Mobile Cloud Computing
Cloud Computing
Cryptographic Hash Function Algorithm
3. RESULTS AND DISCUSSION
4. CONCLUSION AND FUTURE WORK
3. INTRODUCTION
• Mobile cloud computing has become one of the important
part of human life.
• According to ABI research ,the number of users are
increasing each year ,as it was 42.8 million in 2008 and
increased to 998 million in 2014.
• However still some companies are not interested in adopting
the mobile computing because of risks of security & privacy
• It is necessary to build mobile cloud computing security
system that can reduce the risks of security and privacy
• The security system will use an algorithm Hash Function
Cryptographic & Hence the process of decryption becomes
more complicated and company's data are better protected.
4. THEORY
MOBILE CLOUD COMPUTING
• Technology which utilizes device resources and integrate
networks so that limited storage and high mobility will meet
cloud, which is capable of servicing many mobile devices
anywhere, anytime via the Internet, irrespective of platform.
• Mobile Cloud Computing consists
of three heterogenic domains, i.e
mobile phone, cloud computing,
and wireless network by ignoring
heterogenic environmental factors.
• Applications run on the service providers' servers and then
sent to the user via the mobile browser transactions.
5. CLOUD COMPUTING
Cloud computing model consists of five characteristics, three
service models, and four deployment models.
Three service models are:-
• Software as a Service (SaaS)
• Platform as a Service (PaaS)
• Infrastructure as a Service (IaaS)
Four Deployment models are:-
• Private Cloud
• Community Cloud
• Public Cloud
• Hybrid Cloud
6. CRYPTOGRAPHIC HASH FUNCTION
• The hash function is an algorithm that converts the
message into a text or a series of random characters.
• Hash function is function that
accepts input of plaintext string
& converts it into a fixed length
output string.
• Hash change a message that can
be read (readable text)into a
random message (Unreadable text) same as encryption
process.
7. RESULTS AND DISCUSSION
This process starts with recognizing further objects &
existing theories of related system to explore the situation of
developed system .
Then consultation with business that process data in cloud is
observed and determined..
Once data is obtained, the next step is to determine either
system is running well or not.
Finally, the result of this activity is studied to complete the
process .
Further it can be discussed on basis of following topics:-
A. System Design B. Database Design
8. SYSTEM DESIGN
• The system design process aims to find the right
implementation model.
• The system design can be a model or visual design.
• Users will use a portal as a gateway to enter into the service of
Mobile Cloud.
• Mobile Cloud is built using two units of servers viz. Database
server & web server using virtualization techniques.
• The process is then followed by:-
Adding a buffer bits booster, Increasing the value of the key
length, Initializing buffer and Processing key in block 512 bits.
10. DATABASE DESIGN
• The main Hash Function algorithm operates on a 128-bit state,
32 bit words, divided into A, B, C, and D notation which are
initialized into fixed constant.
• The main algorithm then uses each 512-bit message block in
turn to modify the state.
• The processing of a message block consists of four similar
stages, termed rounds.
• Each round is composed of 16 similar operations based on a
non-linear function F, modular addition, and left rotation.
11. • The database is used as a container in taking the data in
information systems.
• To retrieve data hash algorithm, online sales system
embedded with hash algorithm on the server side and mobile
applications is used.
• Applications is designed for users who will interact with the
system.
• It allows an administrator to manage transactions easily
• Each transmitted data is going through encryption process
with hash algorithms
12. • The next test is intended to determine the feasibility of a
system that has been designed above.
• The results of these tests if accepted, the next step is
implementation, if not it should be reviewed and improved.
• From the test which has been done, it is known that all
functions can run normally, as well as the content displayed
get positive response from users.
13. CONCLUSION
• Increasing security of data on Mobile Cloud Computing has to
go through hash encryption mechanism so every line of
plaintext will be transmitted in encrypted form that can not be
read directly.
• The virtual machines can improve data security of mobile
cloud application by serving mobile embedded hash
algorithm.
• Each virtual machine helps the process of data transmission and
simultaneously acts as the security engine for bits of data are
sent simultaneously
• Encryption process by using a hash algorithm will make it
difficult for hackers to retrieve the information on cloud-based
computing.
14. FUTURE WORK
• Hash algorithm is embedded in a mobile application
connected to centralized database.
• The system built does not apply in mobile applications to
distributed systems.
• The system has not been through the stages of test stress test.
• It is hoped these tests can measure the resistance of mobile
cloud server in serving users.
• From these results we obtained cloud sever ability to serve
mobile users.