Abstract
Mobile computing gained much attention in current research arena due to the enhancement of services such as mobile learning, health care monitoring and e commerce. The experience and satisfaction which increases the user count in millions on every day. Advantage of using cloud computing for essential multipath communication creates path for multi homing architecture and multi path data transmission. While the technology develops the security breaches are also increases due to the increased number of users and loads. System has to be considered as stable and safe only if breaches are reduced. Based on the applications services has to be enhanced with reliability, less faults, and robustness makes end to end communication much better for the future. The proposed research work describes a secure cloud computing mobile environment which provides meritorious service to the users. Experimental results highlights the proposed model has 98.5% of success ratio on providing secure communication services to the users via cloud computing applications.






[Source: Gartner CIO Survey]





Similar content being viewed by others
References
Win, T. Y., Tianfield, H., & Mair, Q. (2018). Big data based security analytics for protecting virtualized infrastructures in cloud computing. IEEE Transactions on Big Data,4(1), 11–25.
Chen, J., & Zhu, Q. (2017). Security as a service for cloud-enabled internet of controlled things under advanced persistent threats: A contract design approach. IEEE Transactions on Information Forensics and Security,12(11), 2736–2750.
Meng, Y., Qin, T., Liu, Y., & He, C. (2018). An effective high threating alarm mining method for cloud security management. IEEE Access,6(1), 22634–22644.
Shirazi, S. N., Gouglidis, A., Farshad, A., & Hutchison, D. (2017). The extended cloud: Review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE Journal on Selected Areas in Communications,35(11), 2586–2595.
Gope, P., & Das, A. K. (2017). Robust anonymous mutual authentication scheme for n-times ubiquitous mobile cloud computing services. IEEE Internet of Things Journal,4(5), 1764–1772.
Li, R., Shen, C., He, H., Gu, X., Xu, Z., & Xu, C.-Z. (2018). A lightweight secure data sharing scheme for mobile cloud computing. IEEE Transactions on Cloud Computing,6(2), 344–357.
Sajid, A., Abbas, H., & Saleem, K. (2016). Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges. IEEE Access,4(1), 1375–1384.
Wei, H., Hu, G.-Y., Han, X., Qiao, P., Zhou, Z., Feng, Z.-C., et al. (2018). A new BRB model for cloud security-state prediction based on the large-scale monitoring data. IEEE Access,6(1), 11907–11920.
Ali, M., Bilal, K., Khan, S. U., Veeravalli, B., Li, K., & Zomaya, A. Y. (2018). DROPS: Division and replication of data in cloud for optimal performance and security. IEEE Transactions on Cloud Computing,6(2), 303–315.
de Santana, N. A., Lins, F. A. A., & de Sousa, E. T. G. (2016). Performance evaluation of mobile applications in mobile cloud environments. IEEE Latin America Transactions,14(11), 4597–4602.
Gope, P., & Das, A. K. (2017). Robust anonymous mutual authentication scheme for n-times ubiquitous mobile cloud computing services. IEEE Internet of Things Journal,4(5), 1764–1772.
Kumar, N., Iqbal, R., Misra, S., Rodrigues, J. J. P. C., & Obaidat, M. S. (2018). Bayesian cooperative coalition game as a service for RFID-based secure QoS management in mobile cloud. IEEE Transactions on Emerging Topics in Computing,6(1), 58–71.
Li, H., Liu, D., Dai, Y., Luan, T. H., & Yu, S. (2018). Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Transactions on Emerging Topics in Computing,6(1), 97–109.
Li, J., Huang, L., Zhou, Y., He, S., & Ming, Z. (2018). Computation partitioning for mobile cloud computing in a big data environment. IEEE Transactions on Industrial Informatics,13(4), 2009–2018.
Shabir, M. Y., Iqbal, A., Mahmood, Z., & Ghafoor, A. (2016). Analysis of classical encryption techniques in cloud computing. Tsinghua Science and Technology,21(1), 102–113.
Xi, K., Tang, Y., & Hu, J. (2011). Correlation keystroke verification scheme for user access control in cloud computing environment. The Computer Journal,54(10), 1632–1644.
Chillotti, I., Gama, N., Georgieva, M., Izabachne, M. (2016). Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds. In ASIACRYPT 2016 (vol. 10031, pp. 3–33). LNCS, Springer.
Jiang, Q., Ma, J., & Wei, F. (2018). On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal,12(2), 2039–2042.
Kulshreshtha, V., Verma, S., Rama, C., & Challa, K. (2014). A comprehensive evaluation of cryptographic algorithms in cloud computing. IEEE Institute of Electrical and Electronics Engineers,1, 1.
El Makkaoui, K., Ezzati, A., & Cloud-RSA, Beni-Hssane A. (2017). An enhanced homomorphic encryption scheme. Europe and MENA cooperation advances in information and communication technologies (Vol. 1, pp. 471–480). Berlin: Springer.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sridhar, S., Smys, S. Hybrid RSAECC Based Secure Communication in Mobile Cloud Environment. Wireless Pers Commun 111, 429–442 (2020). https://doi.org/10.1007/s11277-019-06867-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-019-06867-0