Вы находитесь на странице: 1из 6

SECURITY AND STORAGE IMPROVEMENT IN MOBILE CLOUD COMPUTING

Prof. Madke Nilesh Bajirao (14nileshmadke@gmail.com)

Savitribai Phule Pune University.Dept. of Computer Engineering,


G.S. Moze College of Engineering, Balewadi, Pune , Maharashtra, India

Abstract: We know now we are ready to go with new technology over currently used technology that is
computer cloud computing (personal computer wi-fi network). In this paper implementing the heart of any
technology i.e. for storage & security purpose, we must define the client side and server side framework. This
framework is must to form any cloud. At the time of implementation considering the power consumption and
database availability terms, also we will check the status of mobile application about its usage in the device and
manage storage by interfacing with the server.I would like to express the technique implemented in this paper
i.e. current technology, Mobile threats, security, storage, Data privacy.

Keywords: Application Analysis, Application Security, Blackappmine Mobile mob safe, Data Storage, Data
Mining.

I. INTRODUCTION
I would like to introduce the proposed techniques in this paper,

1. Current Technology-

Now currently we used Antivirus of any Android mobile when threats can occur. Another technique we
can format our mobile, this is not beneficial to anyone. Some drawbacks of current technology
Antivirus works continuously means consumption of power and antivirus are expensive. Even in some
cases when we format our mobile then we lost our database [1].

2. Mobile Threats-
Everyone knows about wi-fi Techniques which is implemented for the computer system, then why it
should not for mobile system even mobile hardware is more feasible with computer hardware, then
many computer software can be used in a mobile system because of, this reason mobile can be accessed
multiple application in general purpose use and online application stores to provide many platforms [1].
when so many software available in the market, at the same time different threats should be available
then we are using many antivirus for malware detection utilities however some malware can be escape
securely from detection and spread it in the mobile application market. So many fake applications are
in the market they discovered malware with that application. When malware enters in the mobile
system then mobile controlled by malware without user knowledge.
3. Security-
In this paper based on cloud computing platform data mining, we propose the methodology
which is used for mobile security purpose i.e. some mobile apps and mobsafe. Now for that, we
designed an Android Analysis Framework that can evaluate the required time of evolution and
scanning of that application from destructors. This framework also shows the used battery capacity of
that application [2].

4. Data Privacy-

Which data stored on a mobile application is already encrypted form it is unable to open in a different
application, which is having different features. Then we designed mob safe application to provide
security of that application from intruders.

II. PROBLEM STATEMENT


The main problem of the current system is many threats and malware distrusts our mobiles and it
would be unusable device [3].
Next is database entities, is not easy to find out large databases which are stored in large amount
format.
The last problem is not the least many applications runs on our system in the background because
of that reason battery consumption is more.
This system is beneficial over the all problems running in the current system.In this system
Provides security from intruders which can be harmful to our mobile system and detect the threats
and malware present in the market.

Data mining technique is used to searching and sorting data requested by mobile. This is storing in server side in
an encrypted format. Because of analysis of every application, we can easily detect the application that’s
required more power and also server sends us the alert about this application.

III. RELATED WORKS

We can continuously be finding the malware of any applications .some malware can be same and
repeated again and again but some of them are comparatively different from each other we
designed the two techniques to identify the malware [1] [2].

1. Constant behavior method

In this method, if any application can be affected again and again through similar threats so for that we designed
some graphical method. Which shows the representation of an application in a graphical way or through a map
if we store some threats representation on that base; we just store the graphical representation of that
application. If any time these threats will affect that application then we just analysis the graphical presentation
and we recognize the threats, then store this type of representation and replicated malware behavior in a
graphical way. We just store some phases of graphical view and next time no need to evaluate the whole
application. As with graphical view consider malware and take preferable action [7].

2. Different behavior method-


In this method, so many different malware or threats can be attached to our application at that time we
need to evaluate every application continuously. If some malware can affect our whole system it spreads one too
many applications so every time needs to evaluate [8].

Fig1: System Architecture and working

Very, first of all, establish a cloud formation means different processors can be work together or it can interface
with each other than creating some direct interfacing with the server and we can easily interact with some
application servers and databases on the server side. We are using MYSQL to store database and data mining
technique for searching and sorting some application database.

Fig 2: Interfacing process

In this paper, we define the actual working of the formation of cloud security. It is shown below step by step-

1. Creating a cloud with mobile and different processors.

2. Using blackappmine techniques on the server side and mob safe technique on the mobile side.

3. The server can evaluate the threat and battery consumption and send the alerts to mobile.

4. Mobile got basic information about that application.


5. Mobile will decide the application can be secure to use in mobile or not [4].

6. Then beneficial one more technique we can implement the data mining technique because mobile can be
easily interfaced with a cloud database and application server.

IV. MATHEMATICAL MODEL

Set theory:-

A set is defined as a collection of distinct objects of the same type on the class of objects. The object of a set is
called elements or members of the set. The object can be number, alphabet, names etc.

E.g.:-A={1,2,3,4,5}

Union of sets:-

Union of two sets A & B is defined to be the set of all those elements which belongs to set A or set B or
both and is denoted by A U B.

Intersection offsets:-

An intersection of two sets A & B is defined to be the set of all those elements which belongs to set A and set B
[6].

Difference offsets:-

Union of two sets A & B is defined to be the set of all those elements which belongs to set A but do not belong
to set B and is denoted by A-B [5].

Data Available with After Integration

Search Instances
Integration

Set theory applied to the paper:-

Data Available:-

Data available with Network

Result-

Benefits of these techniques are an evolution of the application, providing security, save battery life and some
kind of data mining technique used in server side and it provides mining results to that requested mobile.

V. CONCLUSION

In this paper, we can provide techniques to evaluate the security of android mobile application based on the
cloud computing platform. We just implement the mob safe on the client side and blackappline on the server
side for the evaluation of multiple applications for providing security. We are using the Android security
Evolution framework. This Framework using two methods that can evaluate the threats and malware. data
mining used to on the server side and gaining result on the client side(Mobile). Using some strategies we can
provide security and evolution of application used in mobile cloud computing.
VI. FUTURE WORK

To improve the data mining capacity from more amount of databases & mobile will sort this key technique,
Mobile will be evaluated and take a decision on mobile battery consumption.

In the future world will fall on the mobile cloud computing over the computer network.

VII. REFERENCES’
[1]. “Energy-saved data transfer model for mobile devices in cloudlet computing environment”
Rubing Liang ; Yangjing Zhong ; Qiang Xia,2018 IEEE 3rd International Conference
on Cloud Computing and Big Data Analysis (ICCCBDA) Year: 2018,Page s: 271 - 274
[2]. “A comprehensive overview on secure offloading in mobile cloud computing”
D Shibin ; G. Jaspher W. Kathrine ,2017 4th International Conference on Electronics and Communication
Systems (ICECS) ,Year: 2017,Page s: 121 - 124
[3]. “Mobile Cloud Computing: Security Analysis” Amina H. Gamlo ; Ning Zhang ; Omaimah Bamasag 2017
5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
(MobileCloud),Year: 2017,Page s: 191 - 198
[4]. IBRAR YAQOOB1 , EJAZ AHMED1 , (Member, IEEE), ABDULLAH GANI1 , (Senior Member, IEEE),
SALIMAH MOKHTAR2 , AND MUHAMMAD IMRAN3 , (Member, IEEE) ” Heterogeneity-Aware Task
Allocation in Mobile Ad Hoc Cloud” IEEE Access, Volume: 5,Page s: 1779 – 1795 ,February 14, 2017,
[5].M. Chen, Y. Hao, Y. Li, C.-F. Lai, and D. Wu, ‘‘On the computation offloading at ad hoc cloudlet:
Architecture and service modes,’’ IEEE Commun. Mag., vol. 53, no. 6, pp. 18–24, Jun. 2015.
[6]. E. Ahmed, A. Gani, M. K. Khan, R. Buyya, and S. U. Khan, ‘‘Seamless application execution in mobile
cloud computing: Motivation, taxonomy, and open challenges,’’ J. Netw. Comput. Appl., vol. 52, pp. 154–172,
Jun. 2015.
[7]. E. Ahmed, A. Akhunzada, M. Whaiduzzaman, A. Gani, S. H. Ab Hamid, and R. Buyya, ‘‘Network-centric
performance analysis of runtime application migration in mobile cloud computing,’’ Simul. Model. Pract.
Theory, vol. 50, pp. 42–56, Jan. 2015.
[8]. S. Ghasemi-Falavarjani, M. Nematbakhsh, and B. S. Ghahfarokhi, ‘‘Context-aware multi-objective resource
allocation in mobile cloud,’’ Comput. Elect. Eng., vol. 44, pp. 218–240, May 2015.
[9]. “A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing”
RUIXUAN LI ; Chenglin Shen ; Heng He ; Xiwu Gu ; Zhiyong Xu ; Cheng-Zhong Xu
IEEE Transactions on Cloud Computing , Year: 2018 , Volume: 6 , Issue: 2 ,Page s: 344 - 357
[10]. A Cloud Aided Privacy-Preserving Profile Matching Scheme in Mobile Social Networks
Qiong Cheng ; Chong-Zhi Gao ,IEEE International Conference on Computational Science and Engineering
(CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC) Year:
2017 , Volume: 2 Page s: 195 - 198
[11]. “Towards Secure Data Distribution Systems in Mobile Cloud Computing”
Jiang Zhang ; Zhenfeng Zhang ; Hui Guo,IEEE Transactions on Mobile Computing ,Year: 2017 , Volume:
16 , Issue: 11,Page s: 3222 - 3235

Вам также может понравиться