Implementing In-Cloud Security for effecting secured communication between Intelligent Tags and Mobile Devices
|Dr. JKRSastry1, Dr. A. VinyaBabu2
|Related article at Pubmed, Scholar Google|
Intelligent Tags communicates with mobile devices using one of the wireless communication protocols for transmitting the environment related to Mobile devices which may be situated at remote locations. The data transmitted to the mobile devices is quite sensitive and therefore must be secured. Building security mechanisms with the Tags will affect the design of the tags especially effecting the response time and throughput. More intelligence has to be built into Tags if attacking is to be sensed and then enforcing the counter attack mechanism in which the response time and throughput may temporarily get effected because security enforcement is under taken only when attacking takes place. However there should be in process implementation of security enforcement without effecting the response time and throughput. The paper presents a method of enforcing in-cloud security by using a PC in the neighborhood of a PC.