Abstract: The capacity and remote application facilitation provided by Mobile Cloud is a boon to offices. Mobile devices face a major challenge in controlling the amount of processing they use because of these two examples. Mobile devices' power consumption was reduced because to the Mobile cloud computing (MCC) offloading feature. When assessing local execution energy, previous studies either used fixed phone speeds or didn't account for the speed of mobile devices. Parallel running programmes and the mobile device's clock recurrence have an impact on the speed of the device, which plays a significant role in ensuring the local execution of energy-intensive tasks. MCC utilises offloading techniques to boost the capabilities of mobile devices. Quality of Service (QoS), mobility management, energy management and resource utilisation are some of the issues that are addressed in mobile applications to address the inherent defects of mobile devices, such as inadequate storage space, limited battery life, insufficient sensing capacities and low CPU speed. A spatial-temporal tree-based data structure may be built up to adequately store encoded data based on location and time interval queries. The three novel algorithms, data aggregation, data splitting, and data blending, support the storage and retrieval formats. These strategies are useful when the suggested location-subordinate query preparing algorithm is used to do temporal analysis. Requests to cloud databases have been made using this technique multiple times. 4 claims & 3 Figures
Description: Field of Invention
Despite the many benefits of MCC, there are some restrictions in terms of data privacy and security while using cloud storage services. The process of removing all of the sensitive material from the original data and replacing it with a sanitised version is quite difficult. Data maintenance and utility are also necessary to ensure that the information delivered to mobile users is of value. Cloud user, data owner, and cloud server are all critical parts of the model. Cloud users are the people who have access to the data stored on the cloud server. In order to gain access to the necessary data, the cloud user must make a service request that is coordinated using query mapper and request handler. It is made up of a collection of servers that include both physical and virtual machines. The owners of the cloud data need an efficient privacy preservation strategy in order to maintain the cloud data and to provide cloud users or end users.
Background of the Invention
Objective of this work is to purpose of this research is to identify and implement appropriate cloud computing security measures. Mobile Cloud Computing based privacy preservation mechanism for secure data transport is being designed. Design and implement a method for completing MCC tasks efficiently which is used to helps to Reduction of energy consumption, Less execution Time, to make the most efficient use of available resources and to find the best values for offloading in the context of background applications.
We are now considering a new proposal for CC data security. It is vital to build the counterfeit in three levels: the apex, the provincial, and the last client layers, where the first two layers contain CC centre points and the final layer has exquisite gadgets. This is how the counterfeit is put together. The pinnacle of the three CC centres is located in the lowest layer and has the responsibility of controlling standard tools and the accumulation of data diagonally across the three CC centres(KR102288858B1). There are numerous advantages to managing smart tools in the provinces, such as the ability to keep track of and organise data on these tools, as well as the ability to manage savvy tools in certain locations (e.g., within the city).
To begin, consider four cellular nodes when reading the information factors. Let's go through each hub one at a time. In order to get the most out of the application's central processing unit, memory, and energy, use the Estimator. Secondly, use the necessary parameter to determine the layout of improvement models in order to select x1,x2,x3,and x4 as x1. If offloading is chosen, then xi=1; otherwise, the programme is implemented locally.
Due to characteristics such as the CPU, RAM, and power consumption being constrained, the primary issue has shifted to large and multidimensional applications running on mobile devices. The minimum number of elements that must be considered as a result of using the estimator modules(JP6336110B2). While applying the qualities to the intended task, the team additionally made use of the three essentials in order to acquire the ideal attributes (x1,x2,x3 and x4). The selection has been produced based on the improvement approach and whole number programme. As part of the planned effort, it is necessary to identify the proper configuration, types of use, and implementation set. As a result, battery life, CPU usage, and memory consumption have all been reduced. Once the decision has been made, the Cloud me device can be used to store and verify the information before it is encrypted in the cloud. Concurrently, in order to reduce power, memory, and implementation time consumption, the cloud is being implemented. Self-Adaptive Autoregressive Dragonfly Optimization is proposed in this chapter by adapting the matrix product based model and by incorporating the self-adaptive concept in the ADO algorithm to reveal only the required details by hiding the sensitive information and to provide secure transmission among mobile users,(US9479890B2) whose data are stored in the cloud platform. In order to obtain the ideal fractional order derivative coefficients, which are then utilised to build a fractional matrix, a new objective function is designed utilising the privacy preservation rate and the utility missing rate.
Summary of the Invention
In most of the privacy preservation approaches, sensitive information was exposed to a third party, and there was no guarantee that the data would be safe and secure. Adapting dyadic products and the C-Lion algorithm in the cloud context for data publishing resulted in a privacy-preserving solution. When faced with difficult optimization problems, it is possible that local optima would become stagnant and that convergence will be sluggish. Adding advanced concepts for sharing data with a third party can help with performance, but it's still needed. For the purpose of safeguarding the original data, this key was generated: Initial operations on fractional and product matrixes are performed using the element-wise XOR operator. Row and dual matrices are then treated in the same manner. In order to provide customers with high transmission capacity, continuous access to information and applications, on-demand deft framework with alternative to move quickly and adequately between servers or even between clouds, as well as fundamentally organised security, the entire cloud building has been planned by customers. The front end and the back end are two distinct classes. A structure connects them all. What the customer sees on the front end of the computer is referred to as "front end." The framework's "cloud" portions reside on the back end.
Brief Description of Drawings
Figure 1: Block Diagram of Proposed Technique
Figure 2: Execution Block diagram based on Cloud data center Architecture
Figure 3: Flow chart for Privacy Preserving system based on Mobile Cloud Computing System
Detailed Description of the Invention
In most of the privacy preservation approaches, sensitive information was exposed to a third party, and there was no guarantee that the data would be safe and secure. Adapting dyadic products and the C-Lion algorithm in the cloud context for data publishing resulted in a privacy-preserving solution. When faced with difficult optimization problems, it is possible that local optima would become stagnant and that convergence will be sluggish. Adding advanced concepts for sharing data with a third party can help with performance, but it's still needed. For the purpose of safeguarding the original data, this key was generated: Initial operations on fractional and product matrixes are performed using the element-wise XOR operator. Row and dual matrices are then treated in the same manner. In order to provide customers with high transmission capacity, continuous access to information and applications, on-demand deft framework with alternative to move quickly and adequately between servers or even between clouds, as well as fundamentally organised security, the entire cloud building has been planned by customers. The front end and the back end are two distinct classes. A structure connects them all. What the customer sees on the front end of the computer is referred to as "front end." The framework's "cloud" portions reside on the back end. Even though smart phones are primarily used for storing and preparing data, such a process is impractical because of the limitations imposed by the battery, memory, and the central processor unit. As a result, the Mobile Computing and Communications Consortium (MCCC) can be used to overcome these challenges. Mobile telephone functions are becoming decentralised, which increases battery life, memory use, and central processing unit (CPU) utilisation. With regard to customer functions in CC, the foundation for both information storage and preparation is eluded via numerous web-based applications. Mobile Cloud Computing on-demand provides the core value of restricting the improvement and implementation rate for cellular applications. Mobile Cloud Computing on-demand. During a number of mind-boggling or massive computing operations, the task was offloaded to the cloud because the cellular phone had ludicrous computing power. Memory, battery, and the central processor unit are all important considerations. When it comes to cloud computing's major challenges of security and insurance, assurance and safety are still lacking. The risks of information leakage and unapproved access should also be considered when using the cloud, and this may not be possible if pariah specialists are involved in the co-operation. Other issues to consider include the need to protect against information leakage and unapproved access and the need to ensure that the cloud's information processing and calculations are secure. Customers and experts alike have been harmed by recent attacks on cloud computing, which have grown at an alarming rate. As a way to save financial expenses, customers and organisations keep sensitive data in the cloud-specialist organization's stages. In the current state of cloud computing, the cloud specialist community is unable to provide complete assurance that their information is safe from intrusions, and as a result, customers and organisations will be forced to live in constant fear of losing access to their data. Mobile Cloud Computing on-demand provides the core value of restricting the improvement and implementation rate for cellular applications explained in Fig.1. Mobile Cloud Computing on-demand. During a number of mind-boggling or massive computing operations, the task was offloaded to the cloud because the cellular phone had ludicrous computing power. Memory, battery, and the central processor unit are all important considerations shown in Fig 2.. When it comes to cloud computing's major challenges of security and insurance, assurance and safety are still lacking. The risks of information leakage and unapproved access should also be considered when using the cloud, and this may not be possible if pariah specialists are involved in the co-operation categorised in Fig 3.
4 Claims & 3 Figures , Claims: The scope of the invention is defined by the following claims:
Claim:
The Efficient and Secure Mobile Cloud Computing Architecture comprising:
a) Designed a novel Mobile Cloud Computing based privacy preservation mechanism for secure data transport with the best values for offloading in the context.
b) Adopted a method for completing MCC tasks efficiently which is used to helps to reduction of energy consumption, less execution time and to make the most efficient use of available resources.
c) It is used to address mobile device energy consumption issues and Energy Efficient Offloading Algorithm (EEOA) to reduce power consumption and according to the simulations, the new algorithms use less energy than the old ones.
2. The Design of an Efficient and Secure Mobile Cloud Computing Architecture as claimed in claim1, a novel Mobile Cloud Computing based privacy preservation mechanism for secure data transport is being designed.
3. The Design of an Efficient and Secure Mobile Cloud Computing Architecture as claimed in claim1, is to find the best values for offloading in the context as Quality of Service (QoS), mobility management, energy management and resource utilisation are some of the issues that are addressed in mobile applications to address the inherent defects of mobile devices.
4. The Design of an Efficient and Secure Mobile Cloud Computing Architecture as claimed in claim1, Adopted a method for completing MCC tasks efficiently which is used to help to reduction of energy consumption, less execution time and to make the most efficient use of available resources.
| # | Name | Date |
|---|---|---|
| 1 | 202241025431-REQUEST FOR EARLY PUBLICATION(FORM-9) [30-04-2022(online)].pdf | 2022-04-30 |
| 2 | 202241025431-FORM-9 [30-04-2022(online)].pdf | 2022-04-30 |
| 3 | 202241025431-FORM FOR SMALL ENTITY(FORM-28) [30-04-2022(online)].pdf | 2022-04-30 |
| 4 | 202241025431-FORM 1 [30-04-2022(online)].pdf | 2022-04-30 |
| 5 | 202241025431-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [30-04-2022(online)].pdf | 2022-04-30 |
| 6 | 202241025431-EVIDENCE FOR REGISTRATION UNDER SSI [30-04-2022(online)].pdf | 2022-04-30 |
| 7 | 202241025431-EDUCATIONAL INSTITUTION(S) [30-04-2022(online)].pdf | 2022-04-30 |
| 8 | 202241025431-DRAWINGS [30-04-2022(online)].pdf | 2022-04-30 |
| 9 | 202241025431-COMPLETE SPECIFICATION [30-04-2022(online)].pdf | 2022-04-30 |