Journal of Computer Sciences and Applications
ISSN (Print): 2328-7268 ISSN (Online): 2328-725X Website: http://www.sciepub.com/journal/jcsa Editor-in-chief: Minhua Ma, Patricia Goncalves
Open Access
Journal Browser
Go
Journal of Computer Sciences and Applications. 2017, 5(1), 25-28
DOI: 10.12691/jcsa-5-1-4
Open AccessArticle

Data Offloading Security Framework in MCLOUD

Akomolafe Patrick Oladeji1 and Ajayi Olubunmi1,

1Department of Computer Science, University of Ibadan

Pub. Date: April 18, 2017

Cite this paper:
Akomolafe Patrick Oladeji and Ajayi Olubunmi. Data Offloading Security Framework in MCLOUD. Journal of Computer Sciences and Applications. 2017; 5(1):25-28. doi: 10.12691/jcsa-5-1-4

Abstract

With the popularity of smartphones and upsurge of mobile applications, mobile devices have become prevalent computing platform. Although MCLOUD paradigm solves the problem of limited resources constraint of mobile system and unavailability of internet, through several offloading technique. Nevertheless, mobile users are still reluctant to adopt this paradigm, due to security concerns of their data. This research provided security on the users task and still minimize the total computational time of the MCLOUD. Tasks were programmatically broken down into smaller tasks and encrypted using homomorphic encryption system and assigned to slave devices which were admitted into the MCLOUD during the resort point process through the WIFI Direct wireless network. Using a test bed of three (3) smartphone devices, several task sizes ranging from 2KB, 4KB up to 20KB were used to test the implemented security framework and the time taken to complete computation of each task size is recorded for both MCLOUD and standalone architecture, the total execution time was compared and findings shows that computation involving security on MCLOUD takes less time compared to computation on standalone devices, the following readings were recorded. For the 4KB task size, MCLOUD spent 48500microseconds while standalone spent 241000microseconds; for the 6KB task size, MCLOUD spent 99500microseconds while standalone spent 453000microseconds; whereas in the 8KB task size, MCLOUD spent 109500microseconds while standalone spent 553000microseconds,which is approximately five (5) times faster than standalone execution. MCLOUD framework was observed to have a lower computation time, decreasing computational time ratio, higher throughput per seconds, It was discovered that computation on distributed encrypted data (MCLOUD) using homomorphic encryption is safer and faster than standalone single device computation.

Keywords:
MCLOUD mobile applications security framework

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

References:

[1]  Dinh, H. T., Lee, C., Niyato, D., & W ang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), 1587-1611.
 
[2]  Mell, P. M., & Grance, T. (2011). Sp 800-145. the nist definition of cloud computing.
 
[3]  Qi, H., & Gani, A. (2012, May). Research on mobile cloud computing: Review, trend and perspectives. In Digital Information and Communication Technology and it's Applications (DICTAP), 2012 Second International Conference on (pp. 195-202). ieee.
 
[4]  Li, X., Zhang, H., & Zhang, Y. (2009, December). Deploying mobile computation in cloud service. In IEEE International Conference on Cloud Computing (pp. 301-311). Springer Berlin Heidelberg.
 
[5]  Kemp, R., Palmer, N., Kielmann, T., & Bal, H. (2010, October). Cuckoo: a computation offloading framework for smartphones. In International Conference on Mobile Computing, Applications, and Services (pp. 59-79). Springer Berlin Heidelberg.
 
[6]  Nagar, N., & Suman, U. A Secure Mobile Cloud Storage Environment using Encryption Algorithm.
 
[7]  Pal, S., & Henderson, T. (2013, September). MobOCloud: extending cloud computing with mobile opportunistic networks. In Proceedings of the 8th ACM MobiCom workshop on Challenged networks (pp. 57-62). ACM.
 
[8]  Kester, Q. A. (2013). A Hybrid Cryptosystem based on Vigenere cipher and Columnar Transposition cipher. arXiv preprint arXiv:1307.7786.
 
[9]  Li, X., Zhang, H., & Zhang, Y. (2009, December). Deploying mobile computation in cloud service. In IEEE International Conference on Cloud Computing (pp. 301-311). Springer Berlin Heidelberg.
 
[10]  Pedersen, M. V., & Fitzek, F. H. (2012). Mobile clouds: The new content distribution platform. Proceedings of the IEEE, 100 (Special Centennial Issue), 1400-1403.