Reputation-aware Trust And Privacy-preservation For Mobile Cloud Computing

Also Available Domains Cloud Computing

Project Code :TCREAN19_36

Abstract

Reputation-Aware Trust and Privacy-Preservation for Mobile Cloud Computing

Abstract:

Mobile Cloud Computing (MCC) is getting growing interest due to its wide applicability in variety of social, industrial and commercial mobile applications. Mobile and smart devices can share complex computational operations with Cloud Service providers. It also provides storage; access polices enforcement and security operations. In many cases, CSP requires services from crowd contributors CCs for data collection, sharing and mobile application support. It requires trust management for CCs to guard against malicious CCs and ensure security and privacy of data. However, finish users or data requesters also demand reliable security solutions for sharing their data or accessing data from unknown CCs. To ensure strong security, mobile devices are not computationally feasible to perform complex cryptographic operations for desired privacy. To resolve these issues, we propose Reputation-aware Trust and Privacy Preservation (RTPP) scheme for MCC. In the first phase, we deal with the trust management by utilizing reputation aware selection of CCs and leverage cloud services where CSP maintains trust score for CCs and knowledge requesters. In second phase, we manage privacy preservation by using our proposed Anonymous Secure-shell Cipher text-policy Attribute based cryptography. We have also proposed a hybrid policy tree mechanism for dynamic attribute selection used for security solutions and key management. Next, an anonymous secure shell is maintained between the CCs and the crowd servers to ensure registration after approval from trusted authority. Within the similar vein, we tend to propose outsourced encryption and decryption mechanism for mobiles that further utilize encryption and decryption service providers for complex operations. To the best of our knowledge, we are the first one to deal with the trust problems with knowledge requester and privacy concerns of CCs and users both at an equivalent time. After that, we've presented the security analysis to investigate AS-CABE against security attacks. Finally, the results are presented that ensure the authority of our proposed scheme as compared to counterparts in terms of name score, storage, computation, trust, resilience, encryption and decryption time.

NOTE: Without the concern of our team, please don't submit to the college. This Abstract varies based on student requirements.

Block Diagram

Specifications

12/7 Support, Voice Conference, Video On Demand, Remote Connectivity, Customization, Live Chat Support, Toll Free Support

Demo Video

mail-banner
call-banner
contact-banner
Request Video
Final year projects