|
Twitter
|
Facebook
|
Google+
|
VKontakte
|
LinkedIn
|
 
 
International Journal of Innovation and Scientific Research
ISSN: 2351-8014
 
 
Wednesday 18 July 2018

About IJISR

News

Submission

Downloads

Archives

Custom Search

Contact

Connect with IJISR

   
 
 
 

Secure Mobile Cloud Computing Using Improved Identity Management Protocol with RC-5 Algorithm


Volume 10, Issue 2, October 2014, Pages 576–583

 Secure Mobile Cloud Computing Using Improved Identity Management Protocol with RC-5 Algorithm

Pankaja A. Hadole, Sulabha V. Patil, and Jayant S. Rohankar

Original language: English

Received 20 August 2014

Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract


The analysis of the impact of mobile computing on the various services shows how the mobile computing has changed each service. As mobile computing has become more popular over the past decade, it has been under continuous development with advances in hardware, software, and network. Mobile computing has various applications in our everyday life. The convergence of Internet and mobile computing enables personalized access to online services anywhere and anytime. Entities (e.g., users, services) have to authenticate themselves to service providers in order to use their services. An entity provides personally identifiable information that uniquely identifies it to a Service Provider. Due to the rapid spread of smart phones and social network service, the use of Interne applications has increased and their need for bandwidth has begun to exceed the capacity of 3G networks. This has caused a reduction in speed and service quality. The increase in mobile network users has caused identity management problems for mobile service providers. Therefore, in this paper, proposed system is designed to overcome this problem Improved Identity Management protocol is used to breaks up loads, which are allowed by the existing Identity Management 3G protocol's mutual authentication via mobile operator process, by sending some parts to an Internet application service provider to enhance mobile and ID management at the service provider and by reducing the network and process loads from information handling and packet transmission. The proposed system used the RC-5 algorithm to increase the speed and security in mobile cloud computing providing private key and public key with existing method and it is fulfilling the needs of cloud users and Providers.

Author Keywords: Communication Protocol, Social Network, Message Encryption, User Identity management.


How to Cite this Article


Pankaja A. Hadole, Sulabha V. Patil, and Jayant S. Rohankar, “Secure Mobile Cloud Computing Using Improved Identity Management Protocol with RC-5 Algorithm,” International Journal of Innovation and Scientific Research, vol. 10, no. 2, pp. 576–583, October 2014.