Skip to main content

Applying Different Cryptographic Algorithms for Mobile Cloud Computing

  • Conference paper
Mobile, Ubiquitous, and Intelligent Computing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 274))

  • 2745 Accesses

Abstract

Cloud computing is new paradigm to use computing resources that are delivered as services over a network. It optimizes the usage of IT resources such as CPU, storage, and network. Many services related of cloud computing are popular to end users and it is becoming more important these days. There are many smart phones, smart pads and other mobile devices and end users can access to cloud computing environment through these mobile devices. Thus, they can use powerful computing resources on their physical devices. This environment indicates mobile cloud computing in this paper. There are two devices such as a physical device in real world and a virtual device in cloud computing environment. Service providers should use strong cryptographic algorithms to guarantee secure communication between a physical device and a virtual device. However, the strong cryptographic algorithms waste time to process each tasks and it causes network congestion. The network congestion occurs when a physical device is processing too many data packets. Also, it cannot be guaranteed its network quality of service. We need to consider the network quality of service to avoid this congestion. We should try to reduce the execution time to guarantee quality of service. We propose suitable method that the cryptographic algorithms with different key lengths at various environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Montero, R.S., Llorente, I.M., Foster, I.: Virtual Infrastructure Management in Private and Hybrid Clouds. IEEE Internet Computing 13(5), 14–22 (2009)

    Article  Google Scholar 

  2. Buyya, M.R., Pandey, S., Vecchiola, C.: Cloudbus toolkit for market-oriented cloud computing. In: Proceedings 1st International Conference on Cloud Computing (CloudCom 2009), pp. 3–27 (2009)

    Google Scholar 

  3. Appisty Inc.: Cloud Platforms vs. Cloud Infrastructure, White Paper (2009)

    Google Scholar 

  4. Kim, N.-U., Eom, J.-H., Kim, S.-H., Chung, T.-M.: The Architecture of User-end Client for Mobile Clout Service. In: Lee, G., Howard, D., Ślęzak, D., Hong, Y.S. (eds.) ICHIT 2012. CCIS, vol. 310, pp. 699–706. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  5. Kim, T.K., Lim, H.J., Chung, T.M.: Service Negotiation Model for response Time in Distributes Networks. Computing and Informatics, 395–405 (2004)

    Google Scholar 

  6. Grobauer, B., Walloschek, T., Stocker, E.: Understanding Cloud Computing Vulnerabilities. IEEE Security & Privacy 9(2), 50–57 (2011)

    Article  Google Scholar 

  7. Kang, K.D., Son, S.H.: Dynamic Security and QoS Adaptation in Real-Time Embedded Systems. In: 26th IEEE Real-Time Systems Symposium, WIP Session, Miami, Florida (2005)

    Google Scholar 

  8. Kumar, K., Lu, Y.-H.: Yung-Hsiang Lu: Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? Computer 43(4), 51–56 (2010)

    Article  Google Scholar 

  9. Simoens, P., De Turck, F., Dhoedt, B., Demeester, P.: Remote Display Solutions for Mobile Cloud Computing. Computer 44(8), 46–53 (2011)

    Article  Google Scholar 

  10. Zhang, P., Yan, Z.: A QoS-aware system for mobile cloud computing. In: 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), pp. 15–17 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sung-Min Jung .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jung, SM., Kim, NU., Lee, SH., Lee, DY., Chung, TM. (2014). Applying Different Cryptographic Algorithms for Mobile Cloud Computing. In: Park, J., Adeli, H., Park, N., Woungang, I. (eds) Mobile, Ubiquitous, and Intelligent Computing. Lecture Notes in Electrical Engineering, vol 274. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40675-1_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40675-1_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40674-4

  • Online ISBN: 978-3-642-40675-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics