Contexts in source publication

Context 1
... cloudlet concept was introduced in [29] to solve these issues. A cloudlet which is also referred to as mini cloud, can be considered as a "data center in a box" whose objective is to bring the cloud closer to the user [30] as shown in Figure 1. It is a resource-rich server with Internet access that is well connected to mobile devices via a high-speed local area network (LAN) [23]. ...
Context 2
... scheme proposed in [11] provides fine-grained access control solution to the resource-constrained devices such as mobile phones in the cloud. However, in our scheme we introduce a new architecture where cloudlet is stationed between mobile device user and cloud as shown in Figure 1. This means the security infrastructure has to be modified also. ...

Similar publications

Article
Full-text available
The paper is based on E-health monitoring system using Wireless sensor network, which specially assisted to patients. The system works on information about the patients and taking immediate response at any critical situations. The patient is watched with two groups of sensors, one group is xed with the patient body and another group is xed inside t...

Citations

... Kittur Philemon Kibiwott, Zhang Fengli, Omala A. Anyembe and Daniel AduGyam propose the system to protect the user data using encryption techniques namely known as Cloudlet-Based eHealth Big Data System with Out-sourced Decryption (CBe-BDS-OD) [16]. Proposed system is based on ciphertext policy-attribute encryption technique that is efficient encryption for cloudlet which achieves collusion resistance, confidentiality and integrity of data. ...
Article
Full-text available
Nowadays smart phones and smart devices are now become a part of our everyday life. Smart phones are now become a powerful to provide the real time different services to user based on cloud computing. From past few years use of smart phone are drastically increased to use, real time services over the cloud such as health, business, banking, online games, social networking, news etc.. To use these services require more power to process the data as well as long running battery life and storage capacity. To use real data for analysis or process, available resources on smart phones are limited. Mobile cloud computing is used to offload the data over the cloud for processing which overcome the limitations of resources. Smart phones are directly connected to the cloud using the Wi-Fi to process the data having the limitations of battery life, network bandwidth as well as network latencies. To overcome these drawbacks new three tier architecture is introduced based on cloudlets to process the data. To prevent the unauthorized access and securing the wireless communication as well as protect device and the user private data over the cloud and cloudlet it need to develop the protocol. Aim of this article is to review the different techniques, models and implementation related to data protections techniques proposed by different researchers to secure smart phone as well as data over the cloudlet and Edge Computing.
... Kittur Philemon Kibiwott, Zhang Fengli, Omala A. Anyembe and Daniel AduGyam propose the system to protect the user data using encryption techniques namely known as Cloudlet-Based eHealth Big Data System with Out-sourced Decryption (CBe-BDS-OD) [16]. Proposed system is based on ciphertext policy-attribute encryption technique that is efficient encryption for cloudlet which achieves collusion resistance, confidentiality and integrity of data. ...
... There are many advantages for individuals and enterprises to have services in cloud environment. These services include storage, computing ability, and network connection quality [1][2]. One of major applications in cloud computing is cloud storage service [3][4]. ...
Article
Full-text available
One of major applications in cloud computing is cloud storage service. It's an important research issue to protect the stored data from illegal access by the system manager in the Cloud. To encrypt entire file by using data owner's secret keys is the simple solution. However it will raise a key management problem. To solve this problem, Hwang and Sun proposed a hierarchical key management scheme. In their scheme, the data owner could change the encryption key more easily, and not to affect other users in Cloud Storage Service system. However, we find that some weaknesses of their scheme. In this article, we will show some weaknesses of their scheme.