{"title":"移动云计算环境下基于HECC和SHA 2的相互认证与位置隐私","authors":"Karuna Rana, Hinamshu Yadav, Chetan Agrawal","doi":"10.1109/ICACCS48705.2020.9074369","DOIUrl":null,"url":null,"abstract":"Cloud computing alludes to information sharing, putting away of information in distributed storage and sharing assets to the customer. Regarding the data security is a top undermining issues, in this paper we analyze about the data uprightness issues of the cloud. A protected correspondence is exceptionally required and is acted in the proposed calculation. Preserve the privacy of the data. SPYSECUREOU (Secure Documents Care Owner and User) data, which contains personal data of the client, is dealt with in re-appropriated condition. Here the endorsing of the data is checked by the information proprietor or a TPA—outsider inspecting utilizing Secure Hash Algorithm (SHA2) which work alongside the Hyper Elliptic Curve Crypto framework which is an encryption method for the information which make use of multiple phases, conversion and paradigm related to data in binary form provide high security in low computation time. To preserve the security of that data is the main objective of this dissertation. The approach also exhibit data shared efficiency in comment (Data posting) phase and accessing phase. A further extension to the work can be opting out in giving efficiency with encryption model.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Mutual Authentication and Location Privacy using HECC and SHA 2 in Mobile Cloud Computing Environment\",\"authors\":\"Karuna Rana, Hinamshu Yadav, Chetan Agrawal\",\"doi\":\"10.1109/ICACCS48705.2020.9074369\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing alludes to information sharing, putting away of information in distributed storage and sharing assets to the customer. Regarding the data security is a top undermining issues, in this paper we analyze about the data uprightness issues of the cloud. A protected correspondence is exceptionally required and is acted in the proposed calculation. Preserve the privacy of the data. SPYSECUREOU (Secure Documents Care Owner and User) data, which contains personal data of the client, is dealt with in re-appropriated condition. Here the endorsing of the data is checked by the information proprietor or a TPA—outsider inspecting utilizing Secure Hash Algorithm (SHA2) which work alongside the Hyper Elliptic Curve Crypto framework which is an encryption method for the information which make use of multiple phases, conversion and paradigm related to data in binary form provide high security in low computation time. To preserve the security of that data is the main objective of this dissertation. The approach also exhibit data shared efficiency in comment (Data posting) phase and accessing phase. A further extension to the work can be opting out in giving efficiency with encryption model.\",\"PeriodicalId\":439003,\"journal\":{\"name\":\"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACCS48705.2020.9074369\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACCS48705.2020.9074369","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mutual Authentication and Location Privacy using HECC and SHA 2 in Mobile Cloud Computing Environment
Cloud computing alludes to information sharing, putting away of information in distributed storage and sharing assets to the customer. Regarding the data security is a top undermining issues, in this paper we analyze about the data uprightness issues of the cloud. A protected correspondence is exceptionally required and is acted in the proposed calculation. Preserve the privacy of the data. SPYSECUREOU (Secure Documents Care Owner and User) data, which contains personal data of the client, is dealt with in re-appropriated condition. Here the endorsing of the data is checked by the information proprietor or a TPA—outsider inspecting utilizing Secure Hash Algorithm (SHA2) which work alongside the Hyper Elliptic Curve Crypto framework which is an encryption method for the information which make use of multiple phases, conversion and paradigm related to data in binary form provide high security in low computation time. To preserve the security of that data is the main objective of this dissertation. The approach also exhibit data shared efficiency in comment (Data posting) phase and accessing phase. A further extension to the work can be opting out in giving efficiency with encryption model.