ISSN (Online) : 2278-1021 ISSN (Print) : 2319-5940 International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 2, February 2015 Copyright to IJARCCE DOI 10.17148/IJARCCE.2015.4256 254 A Data Security Framework for Mobile Cloud Computing Chandni Patel 1 , SameerSingh Chauhan 2 , Bhavesh Patel 3 Student, Information Technology, SVIT, Vasad, India 1 Assistant Professor, Institute of Engineering and Technology, India 2 Assistant Professor, Information Technology, SVIT, Vasad, India 3 Abstract: When using the secure cloud storage services on resources limited Mobile Devices, the confidentiality of sensitive data must be ensured before uploading the data on cloud storage servers. The complex security operations to ensure security are restricted to execute due to the resource constrained mobile devices. The huge volume of complex security operations are offloaded remotely on cloud storage. By literature review of existing security frameworks focus on reducing the complexity of cryptographic algorithms or methods to offer confidentiality and security. By keep in view the requirements of security and privacy of confidential data of users with resource restricted mobile devices, in this paper, We present a proposed security framework for mobile cloud computing. In this framework the cryptographic methods as well as algorithms are used for encryption and decryption of mobile user data. This Framework ensures the additional security and confidentiality of user‟s sensitive or significant data. This paper introduces the scheming flow of proposed security framework. This proposed Security framework is for the purpose to secure and provide privacy and integrity to user‟s confidential data in Mobile Cloud Environment. Keywords: Mobile Cloud Computing; Cloud Computing; security; confidentiality; cryptography. I. INTRODUCTION Mobile Cloud Computing (MCC) is the combination of Two Computing Technologies: 1) Mobile Computing and 2) Cloud computing. MCC is defined as Cloud Computing Extended by Mobility and a new Ad-Hoc Infrastructure based on Mobile Devices. Mobile cloud computing inherits the Advantages and services of Cloud Computing „„Cloud computing refers to both the applications delivered as services over the Internet and the hardware and systems software in the datacenters that provide those services”[2]. Mobile Cloud Computing is defines as it provide Infrastructure where both computationally intensive and secure data storage of mobile devices are offloaded or migrate to cloud servers. “A service that allows resource constrained mobile users to adaptively adjust processing and storage capabilities by transparently partitioning and offloading the computationally intensive and storage demanding jobs on traditional cloud resources by providing ubiquitous wireless access”[4]. The goal of cloud computing are to enhance the computational capacity of the cloud system and to increase the access levels to the services and resources of the cloud at relatively low cost. The mobile users may utilize the computational power and storage capability of cloud for executing the computationally exhaustive and storage demanding processes of an application. The main objectives of the mobile cloud computing are to reduce the energy consumption when perform the computationally intensive tasks and to increase the mobile devices processing power and storage capabilities. The wireless technologies like Wi-Fi, Wi-Max, 3G, 4G, or Satellite Internet connectivity, can be used for interactions between mobile users and cloud services provider. The security threats or issues of cloud computing are also inherited in mobile cloud computing with the additional limitations of resource constrained mobile devices. The MCC is facing various challenges that have restricted the expected growth of MCC‟s subscribers. These challenges are (a) data replication, (b) consistency, (c) limited scalability, (d) unreliability, (e) unreliable Availability of cloud resources, (f) portability (due to lack in cloud provider standard), and (g) trust, security, and privacy[9]. The rest of the paper is prepared as follows. Section 2 presents the review of existing data security schemes for MCC. In Section 3 the proposed data security framework for MCC Environment. Conclusion of my work and research directions for future work is in Section 4. II. REVIEW OF EXISTING DATA SECURITY SCHEMES FOR MCC This paper introduced in literature review, the data security schemes that focus on the reduction of the computational complexity of cryptographic algorithms and methods. There are not any Trusted Third Party(TTP) concerned in these selected data security schemes. In these schemes the cloud servers are assumed fully distrusted for secure storage of user data. The existing data security schemes are (a) encryption based scheme (EnS), (b) coding based scheme (CoS), (c) sharing based scheme (ShS), and (d) Block Based sharing scheme (BSS) [1,7]. In each scheme, encryption, decryption, and integrity verification operations are perform on Mobile Devices. The Cloud Service Providers (CSP) and Data Centre owners are responsible for secure data storage management and handling of requests - response of user‟s file or data.