A P2ECAM: A Trust-Preserving Cross-Cloud Data Migration Model For Resource-Constrained Mobile Devices Using Certificate-Free Elliptic Curve Cryptography
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2026.17.2.12Keywords:
Mobile Cloud Computing, Cross-Cloud Data Migration, Certificate-Free Cryptography, Mutual Authentication, Decentralized Architecture, Data Privacy and IntegrityDimensions Badge
Issue
Section
License
Copyright (c) 2026 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The explosive growth of mobile cloud computing has heightened the need for secure, efficient, and effective data migration systems for use in smartphones with restricted local storage and processing capabilities. Current approaches are mostly based on proxy re-encryption and centralized schemes, which do not properly mitigate trust shortcomings between Cloud Service Providers (CSPs) and thus raise security issues relating to data integrity, privacy and system performance during cross-cloud migration. A key research needs the absence of strong, decentralized architectures for mutual trust and secure authentication among CSPs that do not compromise user identity or device-specific information. To fill this void, introduce a new framework called Peer-to-Peer Elliptic Curve Certificate-Free Authentication and Migration (P2ECAM). This scheme utilizes Elliptic Curve Certificate-Free Cryptography (ECCFC) to facilitate secure key establishment and mutual authentication between CSPs in a decentralized environment. By removing legacy certificate authorities, the model reduces overhead, improves scalability, and maintains privacy of identity. The system replicates users’ data from the source cloud to the smartphone and from there, securely transfers it to the target cloud, facilitating smooth cross-cloud migration. The envisioned P2ECAM algorithm is intended to support privacy-preserving data migration, mutual trust establishment and resource-light communication among untrusted CSPs. The approach involves protocol development, security modelling and comparative analysis with current systems, with an emphasis on scalability, trust guarantee, cryptographic resilience and migration efficiency. Experimental findings underscore considerable advances in session security, data integrity and system performance, coupled with the mitigation of sensitive information like mobile device identifiers and CSP identities. The system introduced herein presents a low-cost and scalable solution for secure data migration in mobile systems, tackling all major issues of storage, backup, trust and interoperability. This paper sets the stage for the next generation of decentralized, privacy-friendly and trustworthy mobile cloud systems.Abstract
How to Cite
Downloads
Similar Articles
- A. Tamilmani, K. Muthuramalingam, An enhanced support vector machine bbased multiclass classification method for crop prediction , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- S. Jerinrechal, I. Antonitte Vinoline, A Deterministic Inventory Model with Automation-Enabled Processes for Defective Item Management , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
- Elangovan G. Reddy, Anjana Devi V, Subedha V, Tirapathi Reddy B, Viswanathan R, A smart irrigation monitoring service using wireless sensor networks , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Heikham G. Chanu, Sudha A. Raddi, Anita Dalal, Sangeeta N. Kharde, Shivani Tendulkar, Association between the socio-demographic variables of women admitted for delivery to a Tertiary Care Hospital and their maternal and neonatal outcome - A cross-sectional study , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- RASHMI TRIPATHI, STRESS RELATED HISTOPATHOLOGICAL CHANGES IN THE HEPATOPANCREAS OF BOTH THE SEXES OF PALAEMONID PRAWN MACROBRACHIUM DAYANUM (HENDERSON) (CRUSTACEA : DECAPODA) , The Scientific Temper: Vol. 3 No. 1&2 (2012): The Scientific Temper
- Abhishek Pandey, V Ramesh, Puneet Mittal, Suruthi, Muniyandy Elangovan, G.Deepa, Exploring advancements in deep learning for natural language processing tasks , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Nitin J. Wange, Sachin V. Chaudhari, Koteswararao Seelam, S. Koteswari, T. Ravichandran, Balamurugan Manivannan, Algorithmic material selection for wearable medical devices a genetic algorithm-based framework with multiscale modeling , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- B. S. E. Zoraida, J. Jasmine Christina Magdalene, Smart grid precision: Evaluating machine learning models for forecasting of energy consumption from a smart grid , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Vinodini R, Ritha W, Sasitharan Nagapan, The green inventory model for sustainable environment that includes degrading products and backordering with integration of environmental cost , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- S. Vaishali, M. Mary Mejrullo Merlin, The Study on Plithogenic Fuzzy Sets & its Properties , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
<< < 22 23 24 25 26 27 28 29 30 31 > >>
You may also start an advanced similarity search for this article.

