![]() | Only 14 pages are availabe for public view |
Abstract The chosen topic areas for this research consist of an overlap of three new growing information technology areas. The First area is cloud Computing (CC), the second area is Smartphone and mobile computing, the third area is cryptography and network security. Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. The objectives of cloud computing are to increase capacity and capabilities at runtime without investing in new infrastructure, licensing new software, and training new recruits. The services may be Infrastructure as a Service (IaaS), Data storage as a Service (DaaS), Hardware as a Service (HaaS), Software as a Service (SaaS),and Platform as a Service (PaaS). There are many benefits of cloud computing such as it can be less expensive compared to buying software and hardware, it can be used from any computer or device with an Internet connection , The device does not need as large of an internal storage system , Compatible with most computers and operating systems. On the other side, Mobile devices (e.g., smartphone, tablet pcs, etc) are increasingly becoming an essential part of human life, Dream of ―Information at your fingertips anywhere anytime‖.These Mobile devices still lack in resources compared to a conventional information-processing device such as PCs and laptops. The solution to overcome of these challenges is Mobile Cloud Computing (MCC). The aim of this thesis is to investigate if the cloud can be used to execute mobile phone application functions faster by offloading the task to the cloud, in comparison to execute the function on the mobile phone. We propose a new elastic application model that enables transparent use of cloud resources to augment the capability of resource constrained mobile devices. The significant features of this model include the partition of a single application into multiple components. Mobile applications can be executed in the mobile device (known as mobile execution) or offloaded to the cloud clone for execution (known as cloud execution). ABSTRACT VI The results shows that the performance of execute application on mobile or cloud in terms of memory consumed using different distance and number of points are concluded. The most of resources consumed on mobile smartphone will decrease approximately to the half of memory consumed for running application on the mobile only. Although Cloud Computing is a great innovation in the world of computing, there also exist downsides of cloud computing. These challenges are Lack of standard , Security & Privacy of data on the cloud, check availability of data on the cloud. For the first problem, it is very difficult for the customers to switch from one Cloud Service Provider (CSP) to another. This problem is out of scope of our research. For the second and third problem. Security is very essential for applications where the sensitive data transmitted. Therefore, there is a great need of encryption method with high levels of security and with minimal key size. There for, the main target for ensuring security is to developed new hybrid cryptography protocol. This new security protocol using combination of both symmetric and asymmetric cryptographic techniques is proposed by merging both symmetric and asymmetric techniques by a way that avoids the disadvantages of the existing hybrid protocols. The proposed hybrid cryptography protocol developed for achieving security in Mobile Cloud Computing. This protocol applied on one type of wireless sensor network (Zigbee) to be evaluated and compared it with other four-hybrid cryptography protocol. The performance includes time of encryption and decryption process, size of cipher text, power consumption in zigbee sensor network and throughput The results show the superiority of the proposed hybrid cryptography protocol over other algorithms in terms of the encryption and decryption time, processing time, ABSTRACT VII and throughput (when we encrypt the same data by using different five protocols, we found that proposed hybrid cryptography protocol requires approximately 25% of the time which is consumed for the least of other four protocols). In addition, we implements new hybrid cryptography protocol on our Mobile Cloud Computing applications in many cases. The results show that resources consumed on mobile for getting points and calculation will decrease in case of partition and offloading application to cloud using hybrid cryptography protocol and AES/RSA cryptography protocol. Key Terms: Cloud Computing, Mobile Cloud Computing, Global Position Systems (GPS), Cryptography and Network Security , Hybrid Cryptography Protocols, AES, ECC, RSA, and RC6. |