International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Science , Computer Science and Engineering

Volume4,November 2017,

Topic : Cryptographically Securing the Data Transfer to Cloud from Mobile Devices Using Csprn Generation

Authors:Sharanya G || Bhargavi KN, Sushma G, Rashmi, Arpitha Vasudev

Abstract:The way we store and share data has been revolutionized with the help of mobile device and its applications. It is now becoming warehouse to store personal information of the user. The data stored here are mostly in encrypted format, resulting in security threats. In this paper, we propose a protocol called CLOAK which is computationally efficient and light in weight for the mobile devices. CLOAK is based on stream cipher that generates and distributes cryptographically secure pseudo-random numbers (CSPRN) with the help of external devices. Here we use the concept of symmetric key cryptography to enhance the security of the protocol. There are three versions of protocol referred as d-CLOAK, s-CLOAK, r-CLOAK, and these protocols differ on the basis of key selection procedure. To secure data at its origin a core encryption/decryption of a CLOAK is performed within the mobile devices. Here deception method is used ensure the security of CSPRN.Using mutual identity verification all messages are exchanged securely between mobile and the server in a CLOAK. We use Android smartphones to evaluate CLOAK, and for generating CSPRN we use Amazon web services..

Keywords: Mobile devices, mobile cloud computing,stream cipher, encryption, decryption, security, cloud computing

Download Paper

DOI: 01.1617/vol4/iss11/pid01295

Related Articles

Wormhole Attack Prevention and Detection Approaches in Mobile Ad hoc Networks: A Survey.

Authors: Avinash Singh || Ram Singar Verma

Doi : 01.1617/vol4/iss03/pid34591

Volume4 ,March 2017.

Developing a GIS Platform for Tourism marketing and promotion In Nigeria: Case Study Of Bauchi State

Authors: Abubakar Siddiq Ango || Abdulsalam Waheed Abdulfatah, Idrissa Djibo

Doi : 01.1617/vol3/iss09/pid91783

Volume3 ,September 2017.

Decentralized Trust Management and Trust Worthiness of Cloud Environments

Authors: Qhubaib Syed || Syed Afzal Ahmed,Syed Abdul Haq

Doi : 01.1617/vol4/iss4/pid21386

Volume4 ,April 2017.

Brain Controlled Chess Based on Virtual Reality Control for Paralyzed Patients

Authors: Sindhura Rao || Ashwini S,Kusuma Mohanchandra

Doi : 01.1617/vol4/iss4/pid82074

Volume4 ,April 2017.

Multilevel Authentication System

Authors: Nichita Silva Lobo || Beverly Rodrigues,Pavni Alluri,Prathibha Singh,Nicole Alvares

Doi : 01.1617/vol4/iss4/pid82135

Volume4 ,April 2017.

Stock Prediction Using Clustering And Regression Techniques

Authors: Shalini Lotlikar || Megha Ainapurkar

Doi : 01.1617/vol4/iss4/pid39708

Volume4 ,April 2017.

Brain Tumor Detection using Image Segmentation

Authors: Siddhi N. Nerurkar ||

Doi : 01.1617/vol4/iss4/pid02845

Volume4 ,April 2017.

Video Mining using Query by Example

Authors: Rosebud Valadares ||

Doi : 01.1617/vol4/iss4/pid89542

Volume4 ,April 2017.

Fuzzy Opinion Mining for Product Recommender System

Authors: Aarti Bandodker ||

Doi : 01.1617/vol4/iss4/pid03652

Volume4 ,April 2017.

Aadhaar and Server based Electoral system

Authors: Yugansh Garg || Sakshi Mishra

Doi : 01.1617/vol4/iss4/pid69053

Volume4 ,April 2017.



Editor Image

Dr. Allon Guez
Professor, Drexel University,

View more



Google Scholar Profile

Thomson Reuters ID : q-6288-2016.
ORCiD Research ID : 0000-0001-9540-6799

All Issues


Journal Code : IJERCSE
Electronic ISSN : 2394-2320
Impact Factor : 4.890
Frequency : monthly
Contact :