2021
DOI: 10.1088/1757-899x/1055/1/012108
|View full text |Cite
|
Sign up to set email alerts
|

Secure data sharing for mobile cloud computing using RSA

Abstract: Mobile cloud computing (MCC) refers to an infrastructure in which data processing and storage can take place far from mobile devices. The convergence of compact registration and network distributed computing has created scalable distributed computing. This technology provides consumers a number of points of interest, similar to storage limits, reliability, scalability and access to real-time information. As a result, it is expanding steadily and is undoubtedly organised into a daily day-to-day life. The Cloud … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 6 publications
0
4
0
1
Order By: Relevance
“…Each link in the topology is set to have 250 frequency slot resources, and each frequency slot occupies 11 GHz bandwidth. The simulation applies the shortest path algorithm to establish the route [11]. In the simulation, a fixed modulation format is applied for all services.…”
Section: Simulation Parametermentioning
confidence: 99%
“…Each link in the topology is set to have 250 frequency slot resources, and each frequency slot occupies 11 GHz bandwidth. The simulation applies the shortest path algorithm to establish the route [11]. In the simulation, a fixed modulation format is applied for all services.…”
Section: Simulation Parametermentioning
confidence: 99%
“…Due to the accessibility of the system, individuals need to confront the dangers when they enjoy the help of the system. The Cloud Computing is a ground-breaking and powerful strategy for the customers to acknowledge assets in various accessible conditions like tele-medicine, clinical data framework, distributed computing, E-wellbeing, remote body territory system, and remote sensing [4]. Laptops, PCs, smartphones, and other electronic devices can be used to access multiple services like programs, storage, and platforms to develop applications that are provided by cloud providers over the internet [5].…”
Section: Issn: 0067-2904mentioning
confidence: 99%
“…Shen et al [17] facilitated the usage of ECC in Java by analyzing the capabilities and dealing with key generation, key exchange, and digital signatures. Arumugam et al [4] proposed a cloud computing to secure data sharing for mobile using RSA. They employed the idea of RSA calculation and Hash in conjunction with various encrypted devices to deliver information on a mobile cloud.…”
Section: 4mentioning
confidence: 99%
See 1 more Smart Citation
“…Kemajuan yang dipercepat dalam komunikasi, jaringan, dan teknologi informasi membentuk bisnis global, dan diperkirakan akan terus mengubah struktur bisnis di masa mendatang. Perkembangan ini memiliki banyak keuntungan dan kerugian bagi semua pemangku kepentingan organisasi [1][2][3]. Manajemen sistem informasi semakin mempertimbangkan keamanan dan privasi informasi karena potensi masalah yang dapat mengancam keamanan data informasi.…”
unclassified