Abstract
Cloud computing is new paradigm to use computing resources that are delivered as services over a network. It optimizes the usage of IT resources such as CPU, storage, and network. Many services related of cloud computing are popular to end users and it is becoming more important these days. There are many smart phones, smart pads and other mobile devices and end users can access to cloud computing environment through these mobile devices. Thus, they can use powerful computing resources on their physical devices. This environment indicates mobile cloud computing in this paper. There are two devices such as a physical device in real world and a virtual device in cloud computing environment. Service providers should use strong cryptographic algorithms to guarantee secure communication between a physical device and a virtual device. However, the strong cryptographic algorithms waste time to process each tasks and it causes network congestion. The network congestion occurs when a physical device is processing too many data packets. Also, it cannot be guaranteed its network quality of service. We need to consider the network quality of service to avoid this congestion. We should try to reduce the execution time to guarantee quality of service. We propose suitable method that the cryptographic algorithms with different key lengths at various environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Montero, R.S., Llorente, I.M., Foster, I.: Virtual Infrastructure Management in Private and Hybrid Clouds. IEEE Internet Computing 13(5), 14–22 (2009)
Buyya, M.R., Pandey, S., Vecchiola, C.: Cloudbus toolkit for market-oriented cloud computing. In: Proceedings 1st International Conference on Cloud Computing (CloudCom 2009), pp. 3–27 (2009)
Appisty Inc.: Cloud Platforms vs. Cloud Infrastructure, White Paper (2009)
Kim, N.-U., Eom, J.-H., Kim, S.-H., Chung, T.-M.: The Architecture of User-end Client for Mobile Clout Service. In: Lee, G., Howard, D., Ślęzak, D., Hong, Y.S. (eds.) ICHIT 2012. CCIS, vol. 310, pp. 699–706. Springer, Heidelberg (2012)
Kim, T.K., Lim, H.J., Chung, T.M.: Service Negotiation Model for response Time in Distributes Networks. Computing and Informatics, 395–405 (2004)
Grobauer, B., Walloschek, T., Stocker, E.: Understanding Cloud Computing Vulnerabilities. IEEE Security & Privacy 9(2), 50–57 (2011)
Kang, K.D., Son, S.H.: Dynamic Security and QoS Adaptation in Real-Time Embedded Systems. In: 26th IEEE Real-Time Systems Symposium, WIP Session, Miami, Florida (2005)
Kumar, K., Lu, Y.-H.: Yung-Hsiang Lu: Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? Computer 43(4), 51–56 (2010)
Simoens, P., De Turck, F., Dhoedt, B., Demeester, P.: Remote Display Solutions for Mobile Cloud Computing. Computer 44(8), 46–53 (2011)
Zhang, P., Yan, Z.: A QoS-aware system for mobile cloud computing. In: 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), pp. 15–17 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jung, SM., Kim, NU., Lee, SH., Lee, DY., Chung, TM. (2014). Applying Different Cryptographic Algorithms for Mobile Cloud Computing. In: Park, J., Adeli, H., Park, N., Woungang, I. (eds) Mobile, Ubiquitous, and Intelligent Computing. Lecture Notes in Electrical Engineering, vol 274. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40675-1_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-40675-1_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40674-4
Online ISBN: 978-3-642-40675-1
eBook Packages: EngineeringEngineering (R0)