chitkara logo


Vol. 3, Issue 14, April 2017
Keyless Encryption Improves Battery Life in Mobile Cloud Computing

Mobile Cloud Computing (MCC) provides a platform for users to accomplish complex tasks exterior to mobile device i.e. onto the cloud. It can help address problems in mobile computing and provides benefits like improving processing power, data storage capacity, reliability etc. Security of data on cloud is of paramount importance and there are various methods available to ensure security while transferring data between cloud and mobile device. However most security technique leads to increased power consumption as discussed below and thus there is a need for security algorithms that are less power consuming to improve battery life.

Various techniques available to achieve secure transfer of data are firewalls, denial-of-service attacks, cryptography, encryption etc. Cryptography and encryption are the ones that are widely used today to ensure network security. There are two types of cryptographic algorithms: key-oriented and keyless encryption algorithms. Encryption algorithm provides reliability against illegal attacks. Key-oriented algorithms are very well structured but are massive to manage because of key present in them. Moreover excess power is thrown away in generating a public and private key resulting in low performance. Each time user uploads or downloads files to or from cloud using mobile phones it results in more battery drainage.

To resolve this overhead keyless algorithm seems to be an appealing alternative and here security can be achieved by using Keyless User Defined Optimal Security (KUDOS) encryption algorithm. It is a uniform encryption using same key at both ends. It provides security one-level above key-oriented algorithm. Here sequence counter is used and is controlled by user itself. Its benefit is of personalized authority. Stream cipher and block cipher are used to increase invulnerability. Here equilibrium is preserved between reliability and rate.

KUDOS Encryption Procedure

KUDOS Decryption Procedure

The coding levels - Block, Character, and Binary makes it difficult to break the code even using brute-force attack. We are handling MCC and the cloud database. The simulation is applied on LAN, using web socket programming in JAVA. On client end a user can upload and download contents using an app to a network which is a cloud based server. The data is secured and added a method of MAC address verification for genuine defense. For implementation a Cloud Server, Android platform and SDK tool are required.

There is a comparative study of KUDOS (keyless) with RSA (key-oriented) algorithms for text files and their suited execution time taken in seconds. It shows that reliability of text can be strengthened using user known distinctive number.

Without key lot of smart phone resources can be saved which will result in reduced power consumption. Additionally Less time will be consumed and more throughput is achieved. KUDOS can be implemented in future for image and audio data by employing compression technique along with encryption procedure.

By - Nancy Goel, Asst. Prof. CSE, Chitkara University, H.P.

References:-

  1. Nancy Goel, Atul Bisht, (2015), "Improving Battery Life using KUDOS in MCC", International Journal of Computer Applications (0975 - 8887), Volume 117 - No. 22.
  2. Kaushik, A., Satvika., Barnela, M., and Kumar, A. (2012), "Keyless User Defined Optimal Security Encryption", International Journal of Compute and Electrical Engineering, Vol.4, 2, pp. 99-103
  3. Khushpreet Kaur, Rajbhupinder Kaur, (2014), A Review: Modified Keyless Userdefined encryption", Volume 1, Issue 6, JETIR(ISSN-2349-5162)

About Technology Connect

Aim of this weekly newsletter is to share with students & faculty the latest developments, technologies, updates in the field Electronics & Computer Science and there by promoting knowledge sharing. All our readers are welcome to contribute content to Technology Connect. Just drop an email to the editor. The first Volume of Technology Connect featured 21 Issues published between June 2015 and December 2015. The second Volume of Technology Connect featured 46 Issues published between January 2016 and December 2016. This is Volume 3.

Previous Issue



Towards Next Generation Green Communication
Click here!

Archives - Random Issue from Vol. 1 & 2



Google's Project Loon Balloon-powered internet in our neighborhood
Click here!

Editorial Team

Chief Editor: Sagar Juneja
Members: Ms Sandhya Sharma, Gitesh Khurani
Arun Goyal, Ankush Gupta.

Disclaimer:The content of this newsletter is contributed by Chitkara University faculty & taken from resources that are believed to be reliable.The content is verified by editorial team to best of its accuracy but editorial team denies any ownership pertaining to validation of the source & accuracy of the content. The objective of the newsletter is only limited to spread awareness among faculty & students about technology and not to impose or influence decision of individuals.