2014 5th International Conference - Confluence the Next Generation Information Technology Summit (Confluence) 2014
DOI: 10.1109/confluence.2014.6949344
|View full text |Cite
|
Sign up to set email alerts
|

SeCure Sharing Of Mobile Device Data Using Public Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…Communication core which inserts, edits, deletes and displays operations of the data was designed as a middleware which has the opportunity to work with different cloud environments. The data stored in the cloud need to be protected, and providing a safe and efficient sharing of data on the cloud through mobile phones needs to have encryption algorithms [28]. In order to maintain data security in the cloud environment, we considered an encryption module in core communication with a cloud environment.…”
Section: Discussionmentioning
confidence: 99%
“…Communication core which inserts, edits, deletes and displays operations of the data was designed as a middleware which has the opportunity to work with different cloud environments. The data stored in the cloud need to be protected, and providing a safe and efficient sharing of data on the cloud through mobile phones needs to have encryption algorithms [28]. In order to maintain data security in the cloud environment, we considered an encryption module in core communication with a cloud environment.…”
Section: Discussionmentioning
confidence: 99%