Abstract

With the popularity of smartphones and upsurge of mobile applications, mobile devices have become prevalent computing platform. Although MCLOUD paradigm solves the problem of limited resources constraint of mobile system and unavailability of internet, through several offloading technique. Nevertheless, mobile users are still reluctant to adopt this paradigm, due to security concerns of their data. This research provided security on the users task and still minimize the total computational time of the MCLOUD. Tasks were programmatically broken down into smaller tasks and encrypted using homomorphic encryption system and assigned to slave devices which were admitted into the MCLOUD during the resort point process through the WIFI Direct wireless network. Using a test bed of three (3) smartphone devices, several task sizes ranging from 2KB, 4KB up to 20KB were used to test the implemented security framework and the time taken to complete computation of each task size is recorded for both MCLOUD and standalone architecture, the total execution time was compared and findings shows that computation involving security on MCLOUD takes less time compared to computation on standalone devices, the following readings were recorded. For the 4KB task size, MCLOUD spent 48500microseconds while standalone spent 241000microseconds; for the 6KB task size, MCLOUD spent 99500microseconds while standalone spent 453000microseconds; whereas in the 8KB task size, MCLOUD spent 109500microseconds while standalone spent 553000microseconds,which is approximately five (5) times faster than standalone execution. MCLOUD framework was observed to have a lower computation time, decreasing computational time ratio, higher throughput per seconds, It was discovered that computation on distributed encrypted data (MCLOUD) using homomorphic encryption is safer and faster than standalone single device computation.

Highlights

  • BackgroundMCLOUD is an offspring of mobile cloud computing and is a cloud of mobile devices connected together with or without the availability of internet for the purpose of sharing resources for various reasons like computation, storage and so on

  • Traditional cloud computing can be categorize into three (3) tiers namely infrastructure as a service (IaaS), software as a service (SaaS) and platform as a service (PaaS) according to NIST standard. research and work has been carried out in the field of mobile cloud computing over the decades, and according to [7] mobile cloud computing is categorise into three specific class of architectures according to their mode of use and the intent they deliver

  • Users ‟mobile applications run in the cloud, where mobile devices are becoming part of a larger cloud environment, mobile devices connect to the remote infrastructure clouds through Internet connection as a medium Unlike the traditional cloud-based

Read more

Summary

Background

MCLOUD is an offspring of mobile cloud computing and is a cloud of mobile devices connected together with or without the availability of internet for the purpose of sharing resources for various reasons like computation, storage and so on. MCLOUD as a photogene of Mobile Cloud Computing is the mixture or hybrid of cloud computing technology, mobile computing technology [1], and wireless network to produce good computational resources to mobile users. According to [2], the term “cloud” refers to a hosted service of a configurable distributed resource pool of networks, servers or storage over the Internet, where a user can gain an application using a “pay as you go” manner. Mobile cloud technology basically focuses on the user’s mobile devices to access cloud-based services through wireless network communications [3]. This is achieved when mobile applications are deployed (i.e., mobile offloading) to the cloud servers or cloudbased applications running on other user’s mobile devices. Cryptography in data security is the process of transforming data using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key and vice versa, to ensure privacy, confidentiality and integrity [8]

Literature Review
Methodology
Result
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call