A Secure Cloud Based Chatting Application with Hybrid Cryptography

Sanjana Awachat, Ashwini Chahande, Sakshi Gadge, Snehal Shastrakar, Karishma Gajbhiye
International Journal of Computational and Electronic Aspects in Engineering
Volume 2: Issue 2, June 2021, pp 42-45


Author's Information
Sanjana Awachat1 
Corresponding Author
1Department of Computer Engineering, Smt. Radhikatai Pandav College of Engineering, Nagpur, India
sanjanaawachat1998@gmail.com

Ashwini Chahande1, Sakshi Gadge1, Snehal Shastrakar1
1Department of Computer Engineering, Smt. Radhikatai Pandav College of Engineering, Nagpur, India

Research Paper -- Peer Reviewed
First online on – 19 June 2021

Open Access article under Creative Commons License

Cite this article –Sanjana Awachat, Ashwini Chahande, Sakshi Gadge, Snehal Shastrakar, Karishma Gajbhiye“A Secure Cloud Based Chatting Application with Hybrid Cryptography”, International Journal of Computational and Electronic Aspects in Engineering, RAME Publishers, vol. 2, issue 2, pp. 42-45, 2021.
https://doi.org/10.26706/ijceae.2.2.20210413


Abstract:-
The amount of transmitted data from mobile to cloud computing is becomes larger and larger. Nowadays, Mobile cloud computing is vital field as a result of its availability, usability. Mobile cloud computing is most important role because it connects mobile with cloud computing and cloud data transmitted from mobile to cloud and vice versa, through a network. The purpose of the proposed system is to build an encryption system that can encrypts a data and decrypts the data transmitted from mobile to cloud efficiently. During this system can show system for encrypting mobile to cloud data. In this system, we will help the encryption algorithm. There are multiple hybrid encryption algorithms are used. These algorithms are more secure and end to end will be encrypted.
Index Terms:-
Encryption Calculations, Cloud Security, Information Security, Versatile distributed computing
REFERENCES
  1. Paranjothi, A., Khan, M. S., &Nijim, M., “Survey on Three Components of Mobile Cloud Computing: Offloading, Distribution and Privacy”, Journal of Computer and Communications, Volume 5(06), 2017.


  2. Lakshmi, K., Hemalatha, J., & Basha, F., “K-Anonymous Privacy Preserving Technique for Participatory Sensing with Multimedia Data Over Cloud Computing”, International Journal, Volume 4(2), pp. 48-52, 2017.

  3. Ali Abdulridha Taha, Dr. Diaa Salama AbdElminaam, Prof. Khalid M Hosny, “Enhancement the Security of Cloud Computing using Hybrid Cryptography Algorithms”, International Journal of Advancements in Computing Technology (IJACT) Volume9, Number3, Dec. 2017.

  4. Barhoom, T. S., & Ghosh, M. M., “Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms”, International Journal of Research in Engineering and Science (IJRES), 2016.

  5. Debabrata Sarddar, Enakshmi Nandi, “An Authenticate Cryptography based security model for handling multiple requests from multiple devices for Mobile Cloud Computing”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 5, Issue 1, January 2016.

  6. Gill, Q. K., & Kaur, K., “A Review on Energy Efficient Computation Offloading Frameworks for Mobile Cloud Computing”, International Journal of Innovations & Advancement in Computer Science, Volume 5, Issue 1, 2016.

  7. Patil, Ms Akanksha R., “Attribute Based Secured Storage Middleware for Mobile Cloud Computing”, International conference on recent innovations in engineering and management, 2016.

  8. Alotaibi, Mutlaq B. "Antecedents of software-as-a-service (SaaS) adoption: a structural equation model." International Journal of Advanced Computer Research 6.25, 2016.

  9. Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul kader, Mohie Mohamed Hadhoud, “Analyzing the Energy Consumption of Security Algorithms for Wireless LANs”, International Journal of Computer Theory and Engineering (IJCTE), VOL.1 No.4, pp: 351- 359, October 2009.

  10. Gurjeet Singh, "Security Threats and Maintenance in Mobile ad hoc networks", IJECT, Vol.2, Issue 3, September 2011.

  11. Diaa Salama Abdul.Elminaam, Hatem Mohamed Abdul kader, Mohiy Mohamed Hadhoud."" Evaluating the Effects of Cryptography Algorithms on Power Consumption for Different Data Types", International Journal of Network Security ( IJNS),VOL.11 No.2, pp: 91- 100, Sep 2010.

  12. Wenjia Li and Anupam Joshi, "Security Issues in Mobile Adhoc Networks - (A Survey)", The 17 th White House Papers Graduate Research in Informatics at Sussex, 2004.

  13. To view full paper, Download here


To View Full Paper

Publishing with