alexa Abstract | A Result Analysis on Secure Communication for Mobile Application Using Cloud Hosted Key
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article Open Access


User?s data may be stored in a cloud to take advantage of its scalability, accessibility, and economics. & it must be protected from untrusted cloud provider. Basically develop „Group Chat+? application for android mobile users. It is work on android, smartphone, PDA mobile users & also on laptop, desktop users virtually. It implements the idea of Android Cloud to Device Messaging securely. This application helps to sends data from servers to their applications on Android devices & Client to clients or /group of clients communication securely & vice-versa. The application provides a simple, lightweight mechanism on both server & clients. For security of users database AES Algorithms is implemented for encrypting as well as decrypting message through mobile application in cloud network. Symmetric Cryptographic Key is applied on sensitive data to be stored at cloud. For that, a key management scheme is proposed where encrypted key shares are stored in the cloud and automatically deleted based on passage of time or user activity. Also, Subscription to user data is maintained through regular re-generation of shares. Our application is able to resist the attacks from various fields over confidentiality, integrity, availability, and privacy. So that, SHA1 algorithm is implemented. It one way to secure hash value that implement in protection of all users password security throughout the network of mobile cloud.

To read the full article Peer-reviewed Article PDF image | Peer-reviewed Full Article image

Author(s): S.W.Thakare, Prof.N.R.Chopde

Share This Page

Additional Info

Loading Please wait..
Peer Reviewed Journals
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version