1 Inani2019
1 Inani2019
Anunaya Inani1
Chakradhar Verma2
Computer Science and Engineering Department,
Computer Science and Engineering Department,
Gurukul Institute of Engineering & Technology1
University College of Engineering 2
Rajasthan Technical University, Kota, Rajasthan, INDIA
Email:[email protected]
Email:[email protected]
Suvrat Jain3
Computer Science Department,
Neerja Modi School3
Email:[email protected]
Abstract - Mobile cloud computing (MCC) is fastest growing shared remote network, and storage capacity. [3] Mobile
technology era in which the research society has recently applications propel computing towards the cloud system
embarked. Today, Mobile data can include financial because of high usage of processing force and data storage
transactions such as electronic payments, M- wallets and requirements for smartphone supporters. Another significant
sensitive multimedia contents. The explosive volumes of mobile aspect that addresses in MCC is the security and privacy of
devices personal data, bring-up more attention to securely data the mobile data storage. MCC gives data sharing facility in
storage rather than consideration on data privacy and the middle of data service operators and mobile clients and
confidentiality levels. In this scenario Machine Leaning (ML) these data are saving in various geographical locations.[4]
brings an important role in the electronic data management. It
Therefore, such sort of mobile data is extremely fictile to
is always expensive and hard to manage the data manually
without adopting machine learning techniques using metadata.
exposing high hazard by means of confidentiality, integrity,
Many Machine Learning algorithms have been proposed to availability next to the traditional computational model.
comprehend diverse data management issues, yet the forecast Mobile clients hesitates from sharing confidential documents
of the top secret data and public data in a document is as yet a to the mediators storage service providers on cloud because
challenging exploration task. The contribution of this research of obscure nature hands for backup and restore operations.
article is to demonstrate a securing mobile data storage secrecy Attackers will affect consumers trusted data as outcome of
and privacy in cloud communication framework in terms of illegal data accession [5]. Mobile users hesitates from
automatic data classification using mobile training datasets sharing confidential documents to the mediators storage
with help of Training dataset Filtration Key Nearest Neighbor service providers on cloud due to unknown nature hands for
(TsF-KNN) classifier which classifies the data based on the backup and restore operations. In addition, they are concerns
confidentiality level of the record with higher accuracy and about their private data being compromised due to high level
powerful timelines as compared to the traditional K-NN attacks against user specific applications and use
algorithms and securing such confidential data category mechanisms such as IDS (Intrusion Detection System)-based
afterwards by applying various existing cryptographic tools spread of cloud storage systems [6]. Compromising and
solutions to assuring data privacy and confidentiality levels exploiting these touchy data will have serious negative
and simulation results demonstrates that reducing the overall impression on the clients being as individual or an
cost and minimize procedural time, increasing system organization. Therefore we must want to forestall such
performance and sustainability.
valuable mobile data over the cloud environments. The
Keywords-Mobile Cloud Computing; Machine Learning, existing mobile cloud storage system [7] frameworks utilize
Data Security, Asymmetric Key Cryptography, Data security algorithms to encrypted data without having
Classification. consideration its confidentiality level which might be
unfeasible. Addressing public and concealed classified data
I. INTRODUCTION by the similar fashion and at the equal security level which
Mobile Cloud Computing is a rapid innovation era that will hold unessential operating cost and increasing the
involves largest range of expert technologies and processing time. Machine learning is an application of
applications that touches almost every customer through artificial intelligence (AI) that provides systems the ability to
mobile devices.[1] MCC take away the restrictions from automatically learn and improve from experience without
geographically domains and becomes capable clients to get being explicitly programmed. Machine learning focuses on
what they want to do at anywhere and anytime from the development of computer programs that can access data
internet[2]. Because of Mobile devices challenges such as and use it learn for themselves. Data mining is most
low processing force, limited performance, battery life, and significant applications of Machine Learning. Every instance
lack of quality of service factor (QoS), limited vitality, within a dataset is developed by machine learning algorithms
based on few predictive features.[8] Machine learning
10
concentrate following problems that adversely affected method researchers[17] first predicting document properties,
mobile cloud computing services. Firstly, Mobile subscribers such as file name which is based on the file metadata and the
worried about their confidential mobile data such as mobile properties of that test file and determines the nearest sub-
banking threats and penetrating add-ons by attackers over training datasets. There after determining specialised training
the mobile wireless networks. Secondly, whole data dataset and predicts the class of the particular document data
encryption is useless and impractical in nature because of its instead of entire training dataset. The data of a document
takes plenty of time for this process without knowledge may be mixed in nature or we can say that it will be in
awareness of secrecy and privacy level. Thus, we proposed a multiple categories. So they can foresee with the assistance
model in which mobile subscribers classifying those critical of file attributes that whether a data falls into confidential or
mobile data by machine learning algorithm like TsF non-confidential category. The data of each attribute in a file
KNN[17] thereafter using public key cryptographic has an alternate quality and importance with regards to data
algorithms to assuring data secrecy and integrity towards security. After identifying the security level of the document
top-secret data. In continuation, we will introduce our data, a superior security strategy can be utilized for the
proposed model based on machine classified datasets in confidential data in the record. Presently It is important to
detail. Additionally, as considering the literature review that understand that which data in a document are confidential
we have guided to support us in constructing our model. and which are non confidential before outsourcing the record
on Internet-based storage servers. Every document may be
III. PROPOSED WORK separated into three major parts, like as file metadata, list of
Mobile users utilized several applications to fulfil their attributes and data of attributes. In TsF-KNN algorithm
everyday needs and maximum level of satisfactions. Cyber authors [17] proposed new filtration system to reducing the
attacks is an enormous matter resulting their harmful impact training dataset load from the classifier. This system named
more than millions of devices that are connected through as the "bi-gram with dice coefficient" model which apply
cyberspace. As far as concerning large amount of mobile before the k-NN classifier. Throughout this whole procedure,
data security risks incorporates because of gigantic demand the time complexity of K-NN at the testing phase was
increases day to day. Therefore it may want to venture up's reduced and improved the data classification accuracy. In
some standard conventions to preventing client valuable data TsF-KNN algorithm is to integrate K-NN with a bi-gram
in mobile ecosystem from attackers. To achieve these goals model to increase the K¬NN algorithm's classification
Machine learning algorithms like as TsF K-NN[17] play an proficiency and improve the accuracy. The main advantage
important role for implying data security setup for those of this filtration process is reducing the number of repetitions
critical locales where extremely needs. This automatic in the algorithm and the computational cost. The Mobile
classification process is more accurate and more affordable training sample datasets for our experiment was extracted
towards critical data filtration process over the wide area from Open Mobile Data by MobiPerf Google repository [18]
networks in which authorities satisfy their critical data and few of the datasets are created by the researchers.
management needs at whatever point they required. Another B. Proposed Secure Mobile Cloud Computing Model
important aspect in case of classified data handling by
Based on Machine Classified Data
external assets is more productive way by knowing data
categorization approaches towards providing better security There are two types of data security management
point of view in the middle of mobile devices and mobile procedures out of which machine learning data classification
cloud data centers. method is used in the proposed framework as shown in Fig.1.
Thus our proposed model falls into two different parts as 1) Public Data or Non-Confidential Data
follows: first part contains data classification process which Public data is general data which is straightforwardly
was already proposed by researchers [17] and we are available to all for sharing and copying with no privacy
applying such TsF KNN algorithm to our training datasets issues, for example, historical data, surveys, News Media
and after filtration process we are getting such classified data. and so on. This data does not require any benchmark and
The other part we are using asymmetric key cryptographic transparently promoted by endorsed channels. Therefore, we
algorithms such as ECC, RSA, and ELGAMAL with proposed secure hypertext protocol and transport layer
different key sizes parameter utilized to assuring data security protocol are adequate for such data applications in
secrecy and integrity towards top-secret data. This data the middle of client server transmissions for encryption and
categorization increases efficient resource utilization and decryption process.
reducing data processing time. 2) Highly Confidential Data or Top Classified Data
Profoundly Highly Confidential Data is a critical data
A. Data Classification Process that averted by legislative laws, financial business
The traditional K-NN algorithm has huge computing agreements, research data, and HRD employee’s data ,
complexity at data classification steps. This huge Medical Records, Donor Information, Bank details, Payment
computational complexity will affect low proficiency in data Card Data and so forth. Business organizations and
filtration. To resolve this computational complexity situation individuals must have retains personal internal data may
of K-NN at the testing phase, another method was proposed safeguarded because of copyright, delicate and secrecy
by authors [17] who are focusing just on specific training aspects to keep from illegal alteration, communication,
dataset from the large pool of training datasets. In this storage and usage. Just because authorized authority getting
11
this data seems to be used in business and personal mobile devices as it has limited constraint in terms of their
knowledge at whenever required. Table.1 has shown the data processing power, less storage, lack of network connectivity.
classification with different categories. To maintain such secrecy levels we are using distinctive
asymmetric key cryptographic algorithms to securing such
valuable data.
IV. EXPERIMENTAL SETUP AND RESULTS
We have developed a java simulator in java Net beans
SDK to measure performance of our proposed model. For
this purpose our experiments were conducted Windows 7
Professional with includes Intel(R) Corei3 processor,
processor speed 2.43 GHz, and 4 GB RAM. We have used
the build-in cryptography classes in java environment to
simulate ECC, RSA and ELGAMAL with different key sizes
for various sizes of mobile training datasets files. We
evaluate performance of public key cryptographic algorithms
like ECC, RSA and ELGAMAL with various key size
parameters for multiple text files data blocks. ECC offers
significant timeline encryption and decryption performance
benefits which shown in fig.2, fig.3 as comparison with
other asymmetric algorithms such as RSA and ELGAMAL.
12
enabled mobile devices with wireless connectivity in entire [2] Lo’ai Tawalbeh1,*, Nour S. Darwazeh2, Raad S. Al-Qassas2 and
globe. Table.2 has shown the comparison of algorithm’s Fahd AlDosari1 : A Secure Cloud Computing Model based on Data
Classification. First International Workshop on Mobile Cloud
encryption and decryption times with different file size Computing Systems, Management, and Security (MCSMS-2015)
values. [3] Hoang T. Dinh, Chonho Lee, Dusit Niyato* and Ping Wang : A
survey of mobile cloud computing: architecture, applications, and
TABLE II. COMPARISON OF ALGORITHM ENCRYPTION DECRYPTION TIMES approaches School of Computer Engineering, Nanyang
WITH THEIR FILE SIZE
Technological University (NTU), Singapore Wireless.
Communication. Mobile. Computing. 2013; 13:1587–1611 © 2011
John Wiley & Sons, Ltd. DOI: 10.1002/wcm
[4] Weiguang SONG, Xiaolong SU, Review of Mobile cloud computing
DCST CUMT City XuZhou, JiangSu, China IEEE©2011 978-1-
61284-486-2/111
[5] Ogigau-Neamtiu F. Cloud Computing Security Issues. Journal of
Defense Resources Management 2012; 3(2):141-148.
[6] Mazhar Ali , Samee U. Khan a, Athanasios V. Vasilakos bSecurity in
cloud computing: Opportunities and challenges Information Sciences
305 (2015) 357–3830020-0255/ Elsevier2015
[7] Wu J, Ping L, Ge X, Wang Y, Fu J. Cloud Storage as the
Infrastructure of Cloud Computing. International Conference on
Intelligent Computing and Cognitive Informatics (ICICCI), 22-23
June 2010; 380-383
[8] Kotsiantis, S.B., Zaharakis, I.D., Pintelas, P.E., Machine learning: a
Simulation results proves that ECC is outperformed as review of classification and combining techniques, Artif Intell Rev,
pp. 159-190 (2006).
compare to traditional cryptographic algorithms like RSA
[9] Jain, A,K., Murty, M.N., Flynn, P., Data Clustering: a review, ACM
and Elgamal and more suitable for wireless system like Computer Surveys vol. 31, 264-323 (1999)
mobile device, more reliable and efficient with occupied less [10] M. Reza Rahimi, Jian Ren, Chi Harold Liu, Athanasios V. Vasilakos,
storage, faster execution and step up equal security with less Nalini Venkata subramanian Mobile Cloud Computing: A Survey,
key size as compare to other algorithms. Our Model State of Art and Future Directions © Springer Science+Business
definitely more beneficial in term of providing higher level Media New York 2013
of mobile data confidentialities as compare of those secure [11] Faiqa Maqsood,Muhammad Ahmed,Muhammad Mumtaz Ali,
mobile computing solutions who have treated whole data as Munam Ali Shah: Cryptography: A Comparative Analysis for
ModernTechniques International Journal of Advanced Computer
confidential and improper utilization of their resources. Science and Applications Vol. 8, No. 6, 2017
V. CONCLUSION [12] Jalaluddin Khana, Haider Abbasa,b*, Jalal Al-Muhtadia : Survey on
Mobile User's Data Privacy Threats and Defense Mechanisms
In this research article, we have proposed a very capable International Workshop on Cyber Security and Digital Investigation
privacy based secure mobile cloud data repository model (CSDI 2015) Elsevier© 2015
with help of machine classified mobile training datasets [13] Hart, P., The condensed nearest neighbor rule, IEEE Transactions on
through TsF-KNN algorithms and public key cryptographic Information Theory, vol. 14, pp. 515–516, (1968).
algorithms that decreases the computation time and promises [14] Gates, G., The reduced nearest neighbor rule, IEEE Transactions on
Information Theory, vol. 18, pp. 431–433, (1972).
privacy and integrity of critical data categorization. The TsF-
[15] Maleq, K., Qin, D., William P., K-Nearest Neighbor Classification on
KNN is an augmentation of the traditional K-NN algorithm Special Data Steaming using P-Trees, Advances in Knowledge
which classified the data attributes into two classes, i.e., Discovery and Data Mining Lecture Notes in Computer Science, vol.
confidential and non-confidential with high precision and 23, pp. 517-528 (2002).
low computational complexity. The proficiency of our [16] Fabrizio, A., Fast condensed nearest neighbor rule, Technical report,
proposed model has been demonstrated by performing Proceedings of the 22nd International Conference on
simulations results. Apart from as a future work, we have MachineLearning, Bonn, Germany, (2005).
endeavour to exploring another machine learning approaches [17] Munwar Ali, Low Tang Jung Confidentiality Based File Attributes
and Data Classification using TsF-KNN 978-1-4673-6537-
to enhancing higher level of data secrecy of crucial data 6/15/$31.00 ©2015 IEEE
handling on cloud storage based environments.
[18] Open Mobile Data by MobiPerf
https://console.developers.google.com/storage/openmobiledata_publi
REFERENCES c
[1] Anunaya Inani , Manoj Singh Ravish Saxena A Secure Mobile Cloud
Computing Framework Based on Data Classification Using
Asymmetric Key Cryptography Elsevier SSRN ICToCT 2018
13