A P2ECAM: A Trust-Preserving Cross-Cloud Data Migration Model For Resource-Constrained Mobile Devices Using Certificate-Free Elliptic Curve Cryptography
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2026.17.2.12Keywords:
Mobile Cloud Computing, Cross-Cloud Data Migration, Certificate-Free Cryptography, Mutual Authentication, Decentralized Architecture, Data Privacy and IntegrityDimensions Badge
Issue
Section
License
Copyright (c) 2026 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The explosive growth of mobile cloud computing has heightened the need for secure, efficient, and effective data migration systems for use in smartphones with restricted local storage and processing capabilities. Current approaches are mostly based on proxy re-encryption and centralized schemes, which do not properly mitigate trust shortcomings between Cloud Service Providers (CSPs) and thus raise security issues relating to data integrity, privacy and system performance during cross-cloud migration. A key research needs the absence of strong, decentralized architectures for mutual trust and secure authentication among CSPs that do not compromise user identity or device-specific information. To fill this void, introduce a new framework called Peer-to-Peer Elliptic Curve Certificate-Free Authentication and Migration (P2ECAM). This scheme utilizes Elliptic Curve Certificate-Free Cryptography (ECCFC) to facilitate secure key establishment and mutual authentication between CSPs in a decentralized environment. By removing legacy certificate authorities, the model reduces overhead, improves scalability, and maintains privacy of identity. The system replicates users’ data from the source cloud to the smartphone and from there, securely transfers it to the target cloud, facilitating smooth cross-cloud migration. The envisioned P2ECAM algorithm is intended to support privacy-preserving data migration, mutual trust establishment and resource-light communication among untrusted CSPs. The approach involves protocol development, security modelling and comparative analysis with current systems, with an emphasis on scalability, trust guarantee, cryptographic resilience and migration efficiency. Experimental findings underscore considerable advances in session security, data integrity and system performance, coupled with the mitigation of sensitive information like mobile device identifiers and CSP identities. The system introduced herein presents a low-cost and scalable solution for secure data migration in mobile systems, tackling all major issues of storage, backup, trust and interoperability. This paper sets the stage for the next generation of decentralized, privacy-friendly and trustworthy mobile cloud systems.Abstract
How to Cite
Downloads
Similar Articles
- Sheena Edavalath, Manikandasaran S. Sundaram, Cost-based resource allocation method for efficient allocation of resources in a heterogeneous cloud environment , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Amudavalli L, K. Muthuramalingam, Integrated energy-efficient routing and secure data management for location-aware wireless sensor networks with PFO leveraged improved fuzzy unequal clustering algorithm (IFUC) , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- V. Manibabu, M. Gomathy, Data Quality Management and Risk Assessment of Dairy Farming with Feed Behaviour Analysis Using Big Data Analytics with YOLOv5 Algorithm , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- Shantanu Kanade, Anuradha Kanade, Secure degree attestation and traceability verification based on zero trust using QP-DSA and RD-ECC , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Priscilla I, Jayasimman Lawrence, Enhanced Symmetric Cryptography Technique (ESCTGPU) for Secure Communication between the IoT Gateway and the public Cloud Environment , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
- D. Jayadurga, A. Chandrabose, Expanding the quantity of virtual machines utilized within an open-source cloud infrastructure , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- P S Renjeni, B Senthilkumaran, Ramalingam Sugumar, L. Jaya Singh Dhas, Gaussian kernelized transformer learning model for brain tumor risk factor identification and disease diagnosis , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- K. Vani, S. Sujatha, Fault tolerance systems in open source cloud computing environments–A systematic review , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Jayalakshmi K., M. Prabakaran, The role of big data in transforming human resource analytics: A literature review , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- K. Gokulkannan, M. Parthiban, Jayanthi S, Manoj Kumar T, Cost effective cloud-based data storage scheme with enhanced privacy preserving principles , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.

