CFP last date
20 January 2025
Reseach Article

Improving Battery Life using KUDOS in MCC

by Nancy Goel, Atul Bisht
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 22
Year of Publication: 2015
Authors: Nancy Goel, Atul Bisht
10.5120/20688-3568

Nancy Goel, Atul Bisht . Improving Battery Life using KUDOS in MCC. International Journal of Computer Applications. 117, 22 ( May 2015), 30-33. DOI=10.5120/20688-3568

@article{ 10.5120/20688-3568,
author = { Nancy Goel, Atul Bisht },
title = { Improving Battery Life using KUDOS in MCC },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 22 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 30-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number22/20688-3568/ },
doi = { 10.5120/20688-3568 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:00:07.689495+05:30
%A Nancy Goel
%A Atul Bisht
%T Improving Battery Life using KUDOS in MCC
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 22
%P 30-33
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MCC works as a platform where users can perform heavy tasks outside the mobile device i. e. into the cloud. With this concept, a rapid progress in bandwidth, accessibility, security, data processing etc. has made a great effect on human life. . In this paper our main focus is to perform Cloud Computing on Android phones which will help in increasing performance and throughput of mobiles apps in future. There are a number of different cryptography algorithms but here we are introducing a novel methodology which is a Keyless Symmetric technique with bit level security and high speed while performing encryption and decryption tasks on plain text.

References
  1. Dinh, H. T. ; Lee, C. ; Niyato, D. ; and Wang, P. (2011), "A survey of Mobile Cloud Computing: Architecture, Applications, and Approaches", Wireless Communication and Mobile Computing, Vol. 13, October 2011, pp 1587- 1611.
  2. Kaushik, A. , Satvika. , Barnela, M. , and Kumar, A. , (2012), "Keyless Use Defined Optimal Security Encryption", International Journal of Compute and Electrical Engineering, Vol. 4, 2, April 2012, pp. 99-103.
  3. Min, Y. G. ; Shin, H. J. and Bang, Y. H. (2012), "Cloud Computing Security Issues and Access Control Solutions", Journal of Security Engineering, Vol. 9, 2, April 2012, pp. 135-141.
  4. Kumar, A. , Jakhar, S. , and Makkar, S. (2012), "Comparative Analysis between DES and RSA Algorithms", IJARCSE, Vol. 2, July 2012, pp. 386-390.
  5. Thambiraja, E. , Ramesh, G. , and Umarani, R. (2012) "A Survey on Various Most Common Encryption Techniques", IJARCSSE, Vol. 2, July 2012, pp. 226-233.
  6. Gupta, P. and Gupta, S. (2012), "Mobile Cloud Computing: The Future of Cloud", IJAREEIE, Vol. 1, September 2012, pp. 134-145.
  7. Ivy, B. P. U. , Mandiwa, P. , and Kumar, M. (2012), "A modified RSA Cryptosystem based on 'n' prime numbers", International Journal of Engineering and Computer Science, Vol. 1, November 2012, pp. 63-66.
  8. Prasad, M. R. ; Gyani, J. and Murti, P. R. K. (2012), "Mobile Cloud Computing: Implications and Challenges", Journal of Information Engineering and Applications, Vol. 2, 7, 2012, pp 7-15.
  9. Dimple (2013), "Encryption Using Different Techniques: A Review", SSIJMAR, Vol. 2, 1, January 2013.
  10. Lakshmi, M. and Kavitha, S. (2013), "Keyless User Defined Optimal Security Encryption", IJECS, Vol. 2, June 2013, pp. 788-793.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography MCC RSA KUDOS Throughput. .