Reference Hub1
Robust Security With Strong Authentication in Mobile Cloud Computing Based on Trefoil Congruity Framework

Robust Security With Strong Authentication in Mobile Cloud Computing Based on Trefoil Congruity Framework

Jerald Nirmal Kumar S., Ravimaran S., Sathish A.
Copyright: © 2021 |Volume: 33 |Issue: 6 |Pages: 28
ISSN: 1546-2234|EISSN: 1546-5012|EISBN13: 9781799867494|DOI: 10.4018/JOEUC.20211101.oa11
Cite Article Cite Article

MLA

Jerald Nirmal Kumar S., et al. "Robust Security With Strong Authentication in Mobile Cloud Computing Based on Trefoil Congruity Framework." JOEUC vol.33, no.6 2021: pp.1-28. http://doi.org/10.4018/JOEUC.20211101.oa11

APA

Jerald Nirmal Kumar S., Ravimaran S., & Sathish A. (2021). Robust Security With Strong Authentication in Mobile Cloud Computing Based on Trefoil Congruity Framework. Journal of Organizational and End User Computing (JOEUC), 33(6), 1-28. http://doi.org/10.4018/JOEUC.20211101.oa11

Chicago

Jerald Nirmal Kumar S., Ravimaran S., and Sathish A. "Robust Security With Strong Authentication in Mobile Cloud Computing Based on Trefoil Congruity Framework," Journal of Organizational and End User Computing (JOEUC) 33, no.6: 1-28. http://doi.org/10.4018/JOEUC.20211101.oa11

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In the mobile cloud computing era, the sharing of secured large-scale data which have major challenges. From an existing quantum based security mechanism randomly chosen the photon detector which creates small length of qubits so it cannot provide much security in MCC also data storage in the cloud server doesn’t guarantees the lossless back up and data recovery as well attains more computation complex during secure access of stored data. Therefore to solve those issues a unique combination of the Trefoil Congruity framework is proposed which consist Quantum Key Fibo Privacy Approach (QKFPA) performing the quantum key generation for encrypt and decrypt the data with the aid of Fibonacci chain-slanting matrix. Based on that quantum key data is uploaded, then secured data should be stored, ultra-widely distributed data transfer mechanism does the scrambling with sorting the stored data by implementing novel HS-DRT technique that improves the lossless backup and recovery of data storage.