You are on page 1of 8

Secure Data Forwarding in Cloud-Based Mobile Network

Technology
BY

Muhammad Zaid Anwer

1) ROLL #: --------------------------------------------------------------------------------------------17061756-011
2) REGISTRATION #: -------------------------------------------------------------------------------
3) DEGREE PROGRAM: -----------------------------------------------------------------------------------MS IT
4) DEPERTMENT: -------------------------------------------------------INFORMATION TECHNOLOGY
5) FACULATY: --------------------------------------------------------------------------COMPUTING AND IT
6) CAMPUS NAME: ---------------------------------------------------------------HAFIZ HAYAT CAMPUS
7) SUPERVISOR NAME: ----------------------------------------------------------------DR. NOUMAN RIAZ
8) DEGREE ENROLLMENT SEMESTER: ------------------------------------------------------FALL-2017
9) FIRST TIME THESIS/DISSERTATION ENROLLMENT SEMSTER: ---------------FALL-2018
10) FREEZ OR MISSED SEMESTER-------------------------------------------------------------------------NIL
11) SEMESTER IN WHICH SUPERVISOR IS ALLOCATED: ------------------------------FALL-2018
12) EXPECTED THESIS COMPLETATION SEMSTER: ----------------------------------SPRING-2019
13) DATE OF SYNOPSIS SUBMISSION TO DEPERTMENT: -------------------------------14-12-2018
14) DATE OF APPROVAL FROM DRCC: ------------------------------------------------------ - -

Scholar Signature Supervisor Signature Signature of convener DRCC

Signature of convener Faculty Board

Date of Submission to Directorate of ASRB…………………………………………………

Date of Approval by ASRB…………………………………………………………………..


1. Abstract:

Most of data are produce in the past of the internet of things devices. The internet of things is increase
communication services and ubiquitous network. A larger amount of data is produced and storage
processing. In this paper, provide a security and privacy for the next generations of mobile technology
cloud-based network and aggregation of secure packet forwarding without key value. The packet is
secure forwarding source to destination with end to end node and resolve the short communication
devices. The node is connected for the cloud network and provided a storage and efficacy the security
for the next generation mobile technology cloud-based network. The server are distributer and
application are peer-to-peer as Nano data center.

2. Introduction:

Most of data are produce in the past of the internet of things devices. The internet of things is composed
of software sensor remotely to affiliate the infrastructure and networking devices. The application is
various environment of medical health management, and energy management system. Therefore,
provided a new series of security and privacy for the next mobile technology (Brown, 1999). To
provider a sensor and wireless network to collect a data collection and five-layer architecture protocol
to RFID and wireless sensor network. The wireless sensor to measure the secure data for the source to
destination without public key. The devices are connected to ad hock without any provided a unique id
and privacy the next mobile technology in cloud-based network (Wu, Lu, Ling, Sun, & Du, 2010). The
devices are measure the network id if the id are match, then connect the devices with the name and
unique password to secure the Wi-Fi and network. The next generation of fifth mobile technology to
cloud-based network id added a table list to connected a devices and secure the packet forwarding one
device to another device using the key unique id and provided a privacy to enhance the efficiency of
secure network. The design a specific protocol to secure the network run of simulation to testing the
data forwarding secures (Zhou, Cao, Dong, & Vasilakos, 2017). Fog computing is a distributed the
system and server to outsourced storage and provided a virtual platform to run the application install
and other protocol are running to provide a secure data in cloud-based network (Agarwal, Yadav,
Yadav, & Communication, 2015).
This provides a security of cloud computing and co-efficient of storages and tools measurements. This
provided a large storage of the server to cover the cloud infrastructure and architecture of the computing
and devices. The architecture of cloud used different field of research and business purpose to design a
structure of software and other requirement of the technology. This provided a solution of full storage
devices problem and resolve the attacks and increase the efficient of the data are upload in cloud

(Page 1 of 8)
infrastructure. This purpose of cloud security and testing the application. The provided a storage of the
existing and new software and application install for the virtual access the server. The services provided
a cloud based is SaaS and PaaS, SaaS provided a running the application in cloud then PaaS provided
a support of technology (Pearson, 2009).
Introduced the security of automation network and design a protocol for the resolve the attack of the
network and increase the performance of connectivity the devices and network. The data are save
through the sensor of the devices to detect the connectivity of the IoT devices through connect the Wi-
Fi. The minimum use of cast for the devices and products. Therefore, to make an infrastructure to
connect the centralize cloud server to connected the devices and network of the nodes, if one node a
fail then server is disconnecting so efficient protocol are used to resolve the automation network. The
configuration is server to connect the devices and network with unique id and password for the secure
the network. The socket is used to create the ad hoc network to connect the devices use the protocol
bandwidth to create a secure VPN network (Christin, Mogre, & Hollick, 2010).

3. Related Work:

Fog computing is advanced of cloud computing then resolve the problem of the edge nodes and increase
the bandwidth of the network resolve problem then provided a large amount of storage provided a cloud
server via internet (Dinh, Lee, Niyato, Wang, & computing, 2013). The IoT devices are large data
produces of the cloud server with latency network of bandwidth. The connected are devices node to
node with specific id without encryption of key value to infrastructure of the network. There are
advances technology of the cloud is secure the data are into secure to user create the data and upload
are data in cloud server with proper sign up verification to enhance the technology (Gubbi, Buyya,
Marusic, & Palaniswami, 2013). The SaaS, PaaS to implement the running of application and support
the application to involve the security of cloud-based network IP cameras are use the function, school,
malls and other secure and observe the places, therefore live a video uploaded in the cloud-based storage
then secure the server over the network. The security of camera is an important issue. The issue is a
range of the network, therefore to design a protocol to create an ad hoc network using the socket without
encryption of key value and provided a secure cloud-based infrastructure. The use of low cast setup is
NetCam, provided a platform to run the IP camera to resources with the widespread (Tekeoglu & Tosun,
2015). The JPEG image are send using the network packet to secure the source of destination one
network to another network. Then protocol is secure the packet forwarding to one devices to another
device using the remotely cloud infrastructure and upload a video of the cloud server through the IP
camera. There are many issues to solve this protocol to secure the IP camera over the network through
the infrastructure of the cloud network. There are use smart home applications alarm, power switches,

(Page 2 of 8)
Owen, and other devices (Lloret, Garcia, Bri, & Sendra, 2009). The secure the devices use the software
define networking (SDN) based on the secure devices. The devices connected a switches, then switches
is broadcasting the network level of the security devices. There are use third party software to
implement the software define networking platform to secure the smart home devices. The range of
devices issue are solving use the socket ad hoc network to wide area network (Jain & Dao, 2009). The
API create the devices to connect the cloud server to modify the server and range of the devices. The
API is creating a token generate to server and every devices access the other devices then enable the
API to access the smart home devices. The health management is implement the network server chain
to provide a security of the data to according generate and secure the cloud-based storage are store
(Kuorilehto, Hännikäinen, Hämäläinen, & Networking, 2005). Then need of implement and modified
a data to search the cloud database and check the services. There is new approach of the secure health
management data in this future to implement a security of the user and technology to maintain and
efficient the data. There is protocol setup of the health management to automatic update the data and
upload a server and implement the modified of the data in cloud-based network (Bowman-Amuah,
2003).
Every user is view the data create and view in cloud server to login and access the data. Cloud
computing applications provided an increase the internet of access, scalability, efficiency and resource
of sharing. Cloud computing is collection of the computing devices, storage, nodes and sharing
resources in World Wide Web. This basically purpose of the cloud is virtual software install in virtual
box machine and provided a security of the web services and provided an API resources in web
technology (Checko et al., 2015; Rost et al., 2014). Cloud user easily connected the web services via
the internet another environment infrastructure of the services. The different platform provided a cloud
network services to connect the user to World Wide Web. Cloud computing is a big challenge of the
hacker to secure the network and provided an embedded application run the protocol. Cloud computing
is many packages provided to integrated the network of the storage requirement (Mell & Grance, 2011).
The cloud computing technology to enhance, reliability, usability, efficiency, reachability and
reliability. A connection between the user and sever by the authentication key forwarding the data from
the user to server. The sensor controls the system and update the server to add the data of the medical
and information the emergency room for the E-Health (AbuKhousa, Mohamed, & Al-Jaroodi, 2012).
There are many solution of the cloud-based E-Health to implement the system and increase the security
of the data and update the server with key value generated in specific value. The server identifies the
user and sensor to send the data forwarding the devices and other system attach and provided the
information of the system. The user shared the record with the authentication key using the value
parameter (Rolim et al., 2010). Data privacy and security adoption to the cloud-based web services to

(Page 3 of 8)
minimize the data of the cloud technology and other requirement. PASiC is a framework that use the
RESTful web services for the API library in the cloud. PASiC provides methods of efficiency data
allow the client to use the cloud services and integrate the system. The PASiC method use the
encryption and protocol the sensitive client data to implement the system of the cloud. The API are
send the data use REST API and use protocol of the send and receive the server. PASiC share a key
value of the parameter with a single and group of client. PASiC framework provide an integrated the
legacy system in the cloud-based technology. The working of inter-connected devices is increase the
Internet of Things. The uses of devices is secure risk is also increase then resolve the problem use the
implement of the cloud technology and other protocol (Malroy, 1998; Zhang, Cheng, Boutaba, &
applications, 2010). IoT help the organization and industry to reduce the cost and increase the efficiency
of the resource allocation. The algorithms are used to increase the efficiency of the devices and
resources to reduce the cost. Many communication devices are use of the send and receive the data use
of Internet of Things. There are able to sensor detect and control devices to Internet of Things and
provided a mythology of the security (Chen et al., 2015; Ning & Wang, 2011).

4. Research Methodology:

In recent years, the traditional networks are not able to support the traffic load of the large amount of
energy resources, then solve the problem of the caching is 5G mobiles. The data are caching in the
device, then store the cloud of this devices. When access the data, then easily are extract of data and
use of the devices implementation and network connectivity are increase through the one device to
another device. There are multiple devices are connective through the devices in 5G network and larger
caching data are use inside the mobile front-haul and back-haul networks (Li, Wang, Li, & Leung,
2017). The aims of wireless network and cloud computing is performance increase the mobile devices
and reduce cost, decrease response time and fast data transmission. This is evaluating the algorithms of
the time scheduling of the processing speed and host of the internet connectivity with node to node
devices. The greedy algorithms are the best of the implementation the speed and reduce the cost, then
increase the speed of efficiency of the devices. First of all, the algorithm all the task performs are
decreasing order with computation of data size and check the input parameter (Abolfazli et al., 2014;
Qi & Gani, 2012). Android devices are backup data use the cloud services, if the data are losing then
request the server to recover the data of android devices. Android devices include a library of java and
then authentication security provided with the key of the android software stack. The library is including
the network to provide a security and increase the efficiency of the connectivity of one device to another
device (Shin et al., 2010). In 4G Mobile technology, the data forward source to destination with
encryption of the key value and not secure packet are forward in encryption of the value. Therefore,

(Page 4 of 8)
provided a new technology of the mobile network using the cloud-based network and service, the secure
the data source to destination is secure without encryption of the key value. There are cloud services
provided to secure the network using the services of SaaS, PaaS, IaaS infrastructure of the network.
Non-balanced load among the local links, some links become highly congested, and a significant delay
growth of frame transmission among servers, which can negatively impact the overall datacenter
performance. One problem is related to the configuration of VLANs: each time a VM moves to other
physical server, it is necessary to reconfigure the VLAN through distinct switches. This coordination
among the switches could be complex, with a large latency, and sometimes impossible due to the fact
these switches are from distinct vendors, each one with its own proprietary firmware and incompatible
with the others (Salkintzis, 2004; Seddigh, Nandy, Makkar, & Beaumont, 2010).

Figure-1. Architecture Diagram

(Page 5 of 8)
5. References:

Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., Buyya, R. J. I. C. S., & Tutorials. (2014). Cloud-based
augmentation for mobile devices: motivation, taxonomies, and open challenges. 16(1), 337-368.

AbuKhousa, E., Mohamed, N., & Al-Jaroodi, J. J. F. i. (2012). e-Health cloud: opportunities and
challenges. 4(3), 621-645.

Agarwal, S., Yadav, S., Yadav, A. K. J. I. J. o. C. S., & Communication. (2015). An architecture for
elastic resource allocation in fog computing. 6(2), 201-207.

Bowman-Amuah, M. K. (2003). Efficient server side data retrieval for execution of client side
applications. In: Google Patents.

Brown, S. J. (1999). Health management process control system. In: Google Patents.

Checko, A., Christiansen, H. L., Yan, Y., Scolari, L., Kardaras, G., Berger, M. S., . . . tutorials. (2015).
Cloud RAN for mobile networks—A technology overview. 17(1), 405-426.

Chen, M., Zhang, Y., Hu, L., Taleb, T., Sheng, Z. J. M. N., & Applications. (2015). Cloud-based wireless
network: Virtualized, reconfigurable, smart wireless network to enable 5G technologies. 20(6),
704-712.

Christin, D., Mogre, P. S., & Hollick, M. J. F. I. (2010). Survey on wireless sensor network technologies
for industrial automation: The security and quality of service perspectives. 2(2), 96-125.

Dinh, H. T., Lee, C., Niyato, D., Wang, P. J. W. c., & computing, m. (2013). A survey of mobile cloud
computing: architecture, applications, and approaches. 13(18), 1587-1611.

Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. J. F. g. c. s. (2013). Internet of Things (IoT): A
vision, architectural elements, and future directions. 29(7), 1645-1660.

Jain, D., & Dao, T. Q. (2009). Receiving broadcast signals using intelligent covers for mobile devices. In:
Google Patents.

Kuorilehto, M., Hännikäinen, M., Hämäläinen, T. D. J. E. J. o. W. C., & Networking. (2005). A survey of
application distribution in wireless sensor networks. 2005(5), 859712.

Li, X., Wang, X., Li, K., & Leung, V. C. J. I. A. (2017). CaaS: Caching as a service for 5G networks. 5,
5982-5993.

Lloret, J., Garcia, M., Bri, D., & Sendra, S. J. s. (2009). A wireless sensor network deployment for rural
and forest fire detection and verification. 9(11), 8722-8747.

Malroy, E. T. (1998). Solution of the ideal adiabatic stirling model with coupled first order differential
equations by the Pasic method. Ohio University,

(Page 6 of 8)
Mell, P., & Grance, T. (2011). The NIST definition of cloud computing.

Ning, H., & Wang, Z. J. I. C. L. (2011). Future internet of things architecture: like mankind neural system
or social organization framework? , 15(4), 461-463.

Pearson, S. (2009). Taking account of privacy when designing cloud computing services. Paper presented
at the Software Engineering Challenges of Cloud Computing, 2009. CLOUD'09. ICSE Workshop
on.

Qi, H., & Gani, A. (2012). Research on mobile cloud computing: Review, trend and perspectives. Paper
presented at the Digital Information and Communication Technology and it's Applications
(DICTAP), 2012 Second International Conference on.

Rolim, C. O., Koch, F. L., Westphall, C. B., Werner, J., Fracalossi, A., & Salvador, G. S. (2010). A cloud
computing solution for patient's data collection in health care institutions. Paper presented at the
eHealth, Telemedicine, and Social Medicine, 2010. ETELEMED'10. Second International
Conference on.

Rost, P., Bernardos, C. J., De Domenico, A., Di Girolamo, M., Lalam, M., Maeder, A., . . . Wübben, D. J.
I. C. M. (2014). Cloud technologies for flexible 5G radio access networks. 52(5), 68-76.

Salkintzis, A. K. J. I. W. C. (2004). Interworking techniques and architectures for WLAN/3G integration


toward 4G mobile data networks. 11(3), 50-61.

Seddigh, N., Nandy, B., Makkar, R., & Beaumont, J.-F. (2010). Security advances and challenges in 4G
wireless networks. Paper presented at the Privacy Security and Trust (PST), 2010 Eighth Annual
International Conference on.

Shin, B.-J., Lee, K.-W., Choi, S.-H., Kim, J.-Y., Lee, W. J., & Kim, H. S. (2010). Indoor WiFi
positioning system for Android-based smartphone. Paper presented at the Information and
Communication Technology Convergence (ICTC), 2010 International Conference on.

Tekeoglu, A., & Tosun, A. S. (2015). Investigating security and privacy of a cloud-based wireless IP
camera: NetCam. Paper presented at the Computer Communication and Networks (ICCCN),
2015 24th International Conference on.

Wu, M., Lu, T.-J., Ling, F.-Y., Sun, J., & Du, H.-Y. (2010). Research on the architecture of Internet of
Things. Paper presented at the Advanced Computer Theory and Engineering (ICACTE), 2010 3rd
International Conference on.

Zhang, Q., Cheng, L., Boutaba, R. J. J. o. i. s., & applications. (2010). Cloud computing: state-of-the-art
and research challenges. 1(1), 7-18.

Zhou, J., Cao, Z., Dong, X., & Vasilakos, A. V. J. I. C. M. (2017). Security and privacy for cloud-based
IoT: challenges. 55(1), 26-33.

(Page 7 of 8)

You might also like