Privacy Conserved Access Control Enforcement in MCC Network with Multilayer Encryption

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2013 by IJETT Journal
Volume-4 Issue-5                      
Year of Publication : 2013
Authors : R.Surendiran , Dr.K.Alagarsamy


R.Surendiran , Dr.K.Alagarsamy. "Privacy Conserved Access Control Enforcement in MCC Network with Multilayer Encryption". International Journal of Engineering Trends and Technology (IJETT). V4(5):2217-2224 May 2013. ISSN:2231-5381. published by seventh sense research group.


Now a days the mobile computing technology is emergingto provide security and increasing the scalability. The data of mobile users are send through the wireless medium there may be chances for attackers to intruding to steal the data. Security is an important and challenging issue in mobile computing environment. To increasing the security and availability of data in efficient manner we need a cloud based mobile communication. This paper proposes the access control enforcement technique with two layer of encryption to increase the security of user data in mobile cloud.


[1] S. Xinogalos, K. E. Psannis, and A. Sifaleras, "Recent advances delivered by HTML 5 in mobile cloud computing applications: a survey," in Proc. the Fifth Balkan Conference in Informatics, 2012, pp. 199-204.
[2] Khan, M. Othman, S. Madani, and S. Khan, "A survey of mobile cloudcomputing application models," IEEE Communications Surveys &Tutorials, issue 99, 2013.
[3] Peter Mell, Tim Grance, “The NIST definition of Cloud Computing”, v15.
[4] Sean Marston, Zhi Li, SubhajyotiBandyopadhyay, Juheng Zhang, AnandGhalsasi, “Cloud Computing – The business perspective”, Decision Support Systems, Volume 51, Issue 1, Pages 176-189, 2011
[5] Han Qi, Abdullah Gani, “Research on Mobile Cloud Computing: Review,Trend and Perspectives” in Proceedings of the Second International Conference on Digital Information and Communication Technology and its Applications (DICTAP), IEEE, Pages 195-202, 2012.
[6] M. Nabeel, N. Shang, and E. Bertino. Privacy preserving policy based content sharing in public clouds.IEEE Transactions on Knowledge and Data Engineering, 99, 2012.
[7] OpenID. [Last accessed: Oct. 14, 2012].
[8] T. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO 1991:Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology, pages129–140, 1992.
[9] N. Shang, M. Nabeel, F. Paci, and E. Bertino.A privacy-preserving approach to policy-based contentdissemination. In ICDE 2010: Proceedings of the 2010 IEEE 26th International Conference on DataEngineering, 2010.
[10] S. Yu, C. Wang, K. Ren, and W. Lou. Attribute based data sharing with attribute revocation. In ASIACCS2010: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security,pages 261–270, 2010.

Cloud computing, ABE encryption, mobile computing, Access control, Key generation