Mobile Applications And Cloud Computing

846 Words2 Pages

An efficient traceable access control scheme with reliable key delegation in mobile cloud computing

In this article the author talked about the conjoining mobile application and cloud computing for mobile devices as one ‘mobile could computing’. This granting user better service and benefits in term of storage space and safety of data. In the bid to eliminate security threat in mobile cloud computing the authors have proposed a traceable access control with the use of key and re-encryption to trace malicious users leak the decryption keys for profits and delegating authority to three part to better secure mobile cloud computing (MCC).

My opinion on this write up is a positive one, based on two factors. (1) Security, this cannot be over emphasized and need periodic update on how to secure data. (2) Is Finance, proving it’s more cost effective that the regular mobile cloud computing.
Bibliography
[1] Guan, Z., Li, J., Zhang, Y. et al. "An efficient traceable access control scheme with reliable key delegation in mobile cloud computing," J Wireless Com Network, vol. 2016, no. 208, pp. 1-11, Sep, 2016

Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators

Intelligent security IT system for detecting Intruders using RSSI was extensively explained in this paper, considering the broadness of security systems in information technology, access control systems is majorly carried out using tags to access building and because the tags can be obtained by intruders, this paper has explained an approach to counter the disadvantages of tags. It explained that the accuracy of intruder detection systems can be improved by focusing on the data for a specific resident based on demonstration-based l...

... middle of paper ...

...unications in an intelligible form, while still delivering content to the intended recipients. This paper gathered information from six write-ups from fifteen authors belonging to different countries and institutions. It summarizes recent developments and ideas on emerging communications security, with focus on privacy preserving, key distribution scheme, and digital image water marking.

One of the six paper gathered explained analysis and improvement of key distribution scheme for secure group communication as a scheme that guarantees forward and backward secrecy, prevents message modification and forgery during rekeying, requires sender verification, and therefore prevents MITM attacks in group communication.

Bibliography
[1] M. Zamani, I. Echizen, and A. H. Lashkari, “Innovations in Communications Security Aerospace Engineering,” vol. 2016, p. 3., July 2016

Open Document