Abstract: Evaluating the efficacy of several methods. Key managing predominantly uses up the power of battery in two ways: one way using the algorithm computations accomplished by the core processor and the other way is the extra communications energy expanded to communicate and to collect information related to key management. From the time when the quantity of energy utilized by various processors and the systems involved for the communications differs extensively, providing privacy and security in data centres for mobile is very challengeable as we need effective security for the managing the keys. Here we have analysed numerous standard parallel programming techniques to effectively use the processors and do the jobs in parallel with less time complexity.

Keywords: Security, Big Data, Cloud, Parallel Programming.