Main Reference PaperA trustworthy agent-based encrypted access control method for mobile cloud computing, Pervasive and Mobile Computing, 2019 [Java]
  • The proposed approach explores the dynamic attributes of the mobile device to improve the security of access control protocols in a mobile cloud environment. By encrypting the dynamic attributes and using the pair of mobile agents, it provides data confidentiality and access control and resolves the network connection issue respectively.

+ Description
  • The proposed approach explores the dynamic attributes of the mobile device to improve the security of access control protocols in a mobile cloud environment. By encrypting the dynamic attributes and using the pair of mobile agents, it provides data confidentiality and access control and resolves the network connection issue respectively.

  • To improve the security in a mobile cloud environment

  • To provide a secure access control system

+ Aim & Objectives
  • To improve the security in a mobile cloud environment

  • To provide a secure access control system

  • This work preserves the user’s anonymity through the secret key distribution with the help of anonymous key-issuing protocol.

+ Contribution
  • This work preserves the user’s anonymity through the secret key distribution with the help of anonymous key-issuing protocol.

  • Operating system: Ubuntu / Windows

  • Language: Java

+ Software Tools & Technologies
  • Operating system: Ubuntu / Windows

  • Language: Java

  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

+ Project Recommended For
  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

+ Order To Delivery
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

Leave Comment

Your email address will not be published. Required fields are marked *

clear formSubmit