Figure 1 - uploaded by D. Adu-Gyamfi
Content may be subject to copyright.
Contexts in source publication
Context 1
... cloudlet concept was introduced in [29] to solve these issues. A cloudlet which is also referred to as mini cloud, can be considered as a "data center in a box" whose objective is to bring the cloud closer to the user [30] as shown in Figure 1. It is a resource-rich server with Internet access that is well connected to mobile devices via a high-speed local area network (LAN) [23]. ...
Context 2
... scheme proposed in [11] provides fine-grained access control solution to the resource-constrained devices such as mobile phones in the cloud. However, in our scheme we introduce a new architecture where cloudlet is stationed between mobile device user and cloud as shown in Figure 1. This means the security infrastructure has to be modified also. ...
Similar publications
The paper is based on E-health monitoring system using Wireless sensor network, which specially assisted to patients. The system works on information about the patients and taking immediate response at any critical situations. The patient is watched with two groups of sensors, one group is xed with the patient body and another group is xed inside t...
Citations
... Kittur Philemon Kibiwott, Zhang Fengli, Omala A. Anyembe and Daniel AduGyam propose the system to protect the user data using encryption techniques namely known as Cloudlet-Based eHealth Big Data System with Out-sourced Decryption (CBe-BDS-OD) [16]. Proposed system is based on ciphertext policy-attribute encryption technique that is efficient encryption for cloudlet which achieves collusion resistance, confidentiality and integrity of data. ...
Nowadays smart phones and smart devices are
now become a part of our everyday life. Smart phones are now
become a powerful to provide the real time different services to
user based on cloud computing. From past few years use of
smart phone are drastically increased to use, real time services
over the cloud such as health, business, banking, online games,
social networking, news etc.. To use these services require
more power to process the data as well as long running battery
life and storage capacity. To use real data for analysis or
process, available resources on smart phones are limited.
Mobile cloud computing is used to offload the data over the
cloud for processing which overcome the limitations of
resources. Smart phones are directly connected to the cloud
using the Wi-Fi to process the data having the limitations of
battery life, network bandwidth as well as network latencies.
To overcome these drawbacks new three tier architecture is
introduced based on cloudlets to process the data. To prevent
the unauthorized access and securing the wireless
communication as well as protect device and the user private
data over the cloud and cloudlet it need to develop the
protocol.
Aim of this article is to review the different techniques, models
and implementation related to data protections techniques
proposed by different researchers to secure smart phone as
well as data over the cloudlet and Edge Computing.
... Kittur Philemon Kibiwott, Zhang Fengli, Omala A. Anyembe and Daniel AduGyam propose the system to protect the user data using encryption techniques namely known as Cloudlet-Based eHealth Big Data System with Out-sourced Decryption (CBe-BDS-OD) [16]. Proposed system is based on ciphertext policy-attribute encryption technique that is efficient encryption for cloudlet which achieves collusion resistance, confidentiality and integrity of data. ...
... There are many advantages for individuals and enterprises to have services in cloud environment. These services include storage, computing ability, and network connection quality [1][2]. One of major applications in cloud computing is cloud storage service [3][4]. ...
One of major applications in cloud computing is cloud storage service. It's an important research issue to protect the stored data from illegal access by the system manager in the Cloud. To encrypt entire file by using data owner's secret keys is the simple solution. However it will raise a key management problem. To solve this problem, Hwang and Sun proposed a hierarchical key management scheme. In their scheme, the data owner could change the encryption key more easily, and not to affect other users in Cloud Storage Service system. However, we find that some weaknesses of their scheme. In this article, we will show some weaknesses of their scheme.