Skip to main content
Erschienen in: The Journal of Supercomputing 2/2014

01.05.2014 | Original Paper

Incremental proxy re-encryption scheme for mobile cloud computing environment

verfasst von: Abdul Nasir Khan, M. L. Mat Kiah, Sajjad A. Madani, Mazhar Ali, Atta ur Rehman Khan, Shahaboddin Shamshirband

Erschienen in: The Journal of Supercomputing | Ausgabe 2/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to the limited computational capability of mobile devices, the research organization and academia are working on computationally secure schemes that have capability for offloading the computational intensive data access operations on the cloud/trusted entity for execution. Most of the existing security schemes, such as proxy re-encryption, manager-based re-encryption, and cloud-based re-encryption, are based on El-Gamal cryptosystem for offloading the computational intensive data access operation on the cloud/trusted entity. However, the resource hungry pairing-based cryptographic operations, such as encryption and decryption, are executed using the limited computational power of mobile device. Similarly, if the data owner wants to modify the encrypted file uploaded on the cloud storage, after modification the data owner must encrypt and upload the entire file on the cloud storage without considering the altered portion(s) of the file. In this paper, we have proposed an incremental version of proxy re-encryption scheme for improving the file modification operation and compared with the original version of the proxy re-encryption scheme on the basis of turnaround time, energy consumption, CPU utilization, and memory consumption while executing the security operations on mobile device. The incremental version of proxy re-encryption scheme shows significant improvement in results while performing file modification operations using limited processing capability of mobile devices.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Khan AN, Kiah MLM, Khan SU, Madani SA (2013) Towards secure mobile cloud computing: a survey. Futur Gener Comput Syst 29:1278–1299 Khan AN, Kiah MLM, Khan SU, Madani SA (2013) Towards secure mobile cloud computing: a survey. Futur Gener Comput Syst 29:1278–1299
2.
Zurück zum Zitat Khan AN, Kiah MLM, Madani SA, Ali M. (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Supercomput 1–20 Khan AN, Kiah MLM, Madani SA, Ali M. (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Supercomput 1–20
3.
Zurück zum Zitat Khan A, Othman M, Madani S, Khan S (2013) A survey of mobile cloud computing application models. IEEE Commun Surv Tutor 1–21 Khan A, Othman M, Madani S, Khan S (2013) A survey of mobile cloud computing application models. IEEE Commun Surv Tutor 1–21
4.
Zurück zum Zitat Nathani A, Chaudhary S, Somani G (2012) Policy based resource allocation in IaaS cloud. Futur Gener Comput Syst 28:94–103CrossRef Nathani A, Chaudhary S, Somani G (2012) Policy based resource allocation in IaaS cloud. Futur Gener Comput Syst 28:94–103CrossRef
5.
Zurück zum Zitat Wang L, Von Laszewski G, Younge A, He X, Kunze M, Tao J, Fu C (2010) Cloud computing: a perspective study. New Gener Comput 28:137–146CrossRefMATH Wang L, Von Laszewski G, Younge A, He X, Kunze M, Tao J, Fu C (2010) Cloud computing: a perspective study. New Gener Comput 28:137–146CrossRefMATH
6.
Zurück zum Zitat Murty J (2008) Programming Amazon Web Services: S3, EC2, SQS, FPS, and SimpleDB: O’Reilly Media (Incorporated) Murty J (2008) Programming Amazon Web Services: S3, EC2, SQS, FPS, and SimpleDB: O’Reilly Media (Incorporated)
7.
Zurück zum Zitat Chen EY, Itoh M (2010) Virtual smartphone over IP. In: IEEE international symposium on a world of wireless mobile and multimedia networks (WoWMoM), 2010. IEEE, pp 1–6 Chen EY, Itoh M (2010) Virtual smartphone over IP. In: IEEE international symposium on a world of wireless mobile and multimedia networks (WoWMoM), 2010. IEEE, pp 1–6
9.
Zurück zum Zitat Dinh HT, Lee C, Niyato D, Wang P (2011) A survey of mobile cloud computing: architecture, applications, and approaches. Wirel Commun Mobile Comput Dinh HT, Lee C, Niyato D, Wang P (2011) A survey of mobile cloud computing: architecture, applications, and approaches. Wirel Commun Mobile Comput
12.
Zurück zum Zitat Hashemi SM, Ardakani MRM (2012) Taxonomy of the security aspects of cloud computing systems-a survey. Int J Appl Inf Syst 4:21–28 Hashemi SM, Ardakani MRM (2012) Taxonomy of the security aspects of cloud computing systems-a survey. Int J Appl Inf Syst 4:21–28
14.
Zurück zum Zitat Zhang X, Schiffman J, Gibbs S, Kunjithapatham A, Jeong S (2009) Securing elastic applications on mobile devices for cloud computing. In: Proceedings of the 2009 ACM workshop on cloud computing security. ACM, pp 127–134 Zhang X, Schiffman J, Gibbs S, Kunjithapatham A, Jeong S (2009) Securing elastic applications on mobile devices for cloud computing. In: Proceedings of the 2009 ACM workshop on cloud computing security. ACM, pp 127–134
15.
Zurück zum Zitat Xiao S, Gong W (2010) Mobility can help: protect user identity with dynamic credential. In: Eleventh international conference on mobile data management (MDM), 2010. IEEE, pp 378–380 Xiao S, Gong W (2010) Mobility can help: protect user identity with dynamic credential. In: Eleventh international conference on mobile data management (MDM), 2010. IEEE, pp 378–380
16.
Zurück zum Zitat Wang S, Wang XS (2010) In-device spatial cloaking for mobile user privacy assisted by the cloud. In: Eleventh international conference on mobile data management (MDM), 2010. IEEE, pp 381–386 Wang S, Wang XS (2010) In-device spatial cloaking for mobile user privacy assisted by the cloud. In: Eleventh international conference on mobile data management (MDM), 2010. IEEE, pp 381–386
17.
Zurück zum Zitat Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Shi E, Song Z (2010) Authentication in the clouds: a framework and its application to mobile users. In: Proceedings of the 2010 ACM workshop on cloud computing security workshop. ACM, pp 1–6 Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Shi E, Song Z (2010) Authentication in the clouds: a framework and its application to mobile users. In: Proceedings of the 2010 ACM workshop on cloud computing security workshop. ACM, pp 1–6
18.
Zurück zum Zitat Huang D, Zhang X, Kang M, Luo J (2010) MobiCloud: building secure cloud framework for mobile computing and communication. In: Fifth IEEE international symposium on service oriented system engineering (SOSE ’10). IEEE, pp 27–34 Huang D, Zhang X, Kang M, Luo J (2010) MobiCloud: building secure cloud framework for mobile computing and communication. In: Fifth IEEE international symposium on service oriented system engineering (SOSE ’10). IEEE, pp 27–34
19.
Zurück zum Zitat Huang D, Zhou Z, Xu L, Xing T, Zhong Y (2011) Secure data processing framework for mobile cloud computing. In: IEEE conference on computer communications workshops (INFOCOM WKSHPS ’11). IEEE, pp 614–618 Huang D, Zhou Z, Xu L, Xing T, Zhong Y (2011) Secure data processing framework for mobile cloud computing. In: IEEE conference on computer communications workshops (INFOCOM WKSHPS ’11). IEEE, pp 614–618
20.
Zurück zum Zitat Chen YJ, Wang LC (2011) A security framework of group location-based mobile applications in cloud computing. In: 40th international conference on parallel processing workshops (ICPPW ’11). IEEE, pp 184–190 Chen YJ, Wang LC (2011) A security framework of group location-based mobile applications in cloud computing. In: 40th international conference on parallel processing workshops (ICPPW ’11). IEEE, pp 184–190
21.
Zurück zum Zitat Bilogrevic I, Jadliwala M, Kumar P, Walia SS, Hubaux JP, Aad I, Niemi V (2011) Meetings through the cloud: privacy-preserving scheduling on mobile devices. J Syst Softw 84:1910–1927CrossRef Bilogrevic I, Jadliwala M, Kumar P, Walia SS, Hubaux JP, Aad I, Niemi V (2011) Meetings through the cloud: privacy-preserving scheduling on mobile devices. J Syst Softw 84:1910–1927CrossRef
22.
Zurück zum Zitat Zhang X, Jeong S, Kunjithapatham A, Gibbs S (2010) Towards an elastic application model for augmenting computing capabilities of mobile platforms. Mobile Wirel Middlew Oper Syst Appl 161–174 Zhang X, Jeong S, Kunjithapatham A, Gibbs S (2010) Towards an elastic application model for augmenting computing capabilities of mobile platforms. Mobile Wirel Middlew Oper Syst Appl 161–174
23.
Zurück zum Zitat Ren W, Yu L, Gao R, Xiong F (2011) Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing. Tsinghua Sci Technol 16:520–528CrossRef Ren W, Yu L, Gao R, Xiong F (2011) Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing. Tsinghua Sci Technol 16:520–528CrossRef
24.
Zurück zum Zitat Hsueh SC, Lin JY, Lin MY (2011) Secure cloud storage for convenient data archive of smart phones. In: IEEE 15th international symposium on consumer electronics (ISCE ’11). IEEE, pp 156–161 Hsueh SC, Lin JY, Lin MY (2011) Secure cloud storage for convenient data archive of smart phones. In: IEEE 15th international symposium on consumer electronics (ISCE ’11). IEEE, pp 156–161
25.
Zurück zum Zitat Itani W, Kayssi A, Chehab A (2010) Energy-efficient incremental integrity for securing storage in mobile cloud computing. In: International conference on energy aware computing (ICEAC ’10). IEEE, Cairo, Egypt, pp 1–2 Itani W, Kayssi A, Chehab A (2010) Energy-efficient incremental integrity for securing storage in mobile cloud computing. In: International conference on energy aware computing (ICEAC ’10). IEEE, Cairo, Egypt, pp 1–2
26.
Zurück zum Zitat Jia W, Zhu H, Cao Z, Wei L, Lin X (2011) SDSM: A secure data service mechanism in mobile cloud computing. In: Conference IEEE on computer communications workshops (INFOCOM ’11). IEEE, Shanghai, China, pp 1060–1065 Jia W, Zhu H, Cao Z, Wei L, Lin X (2011) SDSM: A secure data service mechanism in mobile cloud computing. In: Conference IEEE on computer communications workshops (INFOCOM ’11). IEEE, Shanghai, China, pp 1060–1065
27.
Zurück zum Zitat Yang J, Wang H, Wang J, Tan C, Yu D (2011) Provable data possession of resource-constrained mobile devices in cloud computing. J Netw 6:1033–1040 Yang J, Wang H, Wang J, Tan C, Yu D (2011) Provable data possession of resource-constrained mobile devices in cloud computing. J Netw 6:1033–1040
28.
Zurück zum Zitat Tysowski PK, Hasan MA (2011) Re-encryption-based key management towards secure and scalable mobile applications in clouds. In: IACR Cryptology ePrint Archive 668 Tysowski PK, Hasan MA (2011) Re-encryption-based key management towards secure and scalable mobile applications in clouds. In: IACR Cryptology ePrint Archive 668
29.
Zurück zum Zitat Zhou Z, Huang D (2011) Efficient and secure data storage operations for mobile cloud computing. In: Cryptology ePrint Archive Zhou Z, Huang D (2011) Efficient and secure data storage operations for mobile cloud computing. In: Cryptology ePrint Archive
30.
Zurück zum Zitat Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Nyberg K (ed) Advances in cryptology—EUROCRYPT’98. Springer, Berlin, pp 127–144 Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Nyberg K (ed) Advances in cryptology—EUROCRYPT’98. Springer, Berlin, pp 127–144
31.
Zurück zum Zitat ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. In: Advances in cryptology. Springer, Berlin, pp 10–18 ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. In: Advances in cryptology. Springer, Berlin, pp 10–18
32.
Zurück zum Zitat Bellare M, Goldreich O, Goldwasser S (1994) Incremental cryptography: the case of hashing and signing. In: Advances in cryptology—CRYPTO’94. Springer, Berlin, pp 216–233 Bellare M, Goldreich O, Goldwasser S (1994) Incremental cryptography: the case of hashing and signing. In: Advances in cryptology—CRYPTO’94. Springer, Berlin, pp 216–233
33.
Zurück zum Zitat Bellare M, Goldreich O, Goldwasser S (1995) Incremental cryptography and application to virus protection. In: Proceedings of the twenty-seventh annual ACM symposium on theory of computing. ACM, pp 45–56 Bellare M, Goldreich O, Goldwasser S (1995) Incremental cryptography and application to virus protection. In: Proceedings of the twenty-seventh annual ACM symposium on theory of computing. ACM, pp 45–56
34.
Zurück zum Zitat Bellare M, Micciancio D (1997) A new paradigm for collision-free hashing: incrementality at reduced cost. In: Advances in cryptology–EUROCRYPT’97. Springer, Berlin, pp 163–192 Bellare M, Micciancio D (1997) A new paradigm for collision-free hashing: incrementality at reduced cost. In: Advances in cryptology–EUROCRYPT’97. Springer, Berlin, pp 163–192
35.
Zurück zum Zitat Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings IEEE (INFOCOM ’10). IEEE, NJ, USA, pp 1–9 Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings IEEE (INFOCOM ’10). IEEE, NJ, USA, pp 1–9
37.
Zurück zum Zitat De Caro A, Iovino V (2011) jPBC: java pairing based cryptography. In: IEEE symposium on computers and communications (ISCC ’11). IEEE, Kerkyra, pp 850–855 De Caro A, Iovino V (2011) jPBC: java pairing based cryptography. In: IEEE symposium on computers and communications (ISCC ’11). IEEE, Kerkyra, pp 850–855
41.
Zurück zum Zitat Murata T (1989) Petri nets: properties, analysis and applications. Proc IEEE 77:541–580CrossRef Murata T (1989) Petri nets: properties, analysis and applications. Proc IEEE 77:541–580CrossRef
42.
Zurück zum Zitat de Moura L, Bjørner N (2009) Satisfiability modulo theories: an appetizer. In: Formal methods: foundations and applications. Springer, Berlin, pp 23–36 de Moura L, Bjørner N (2009) Satisfiability modulo theories: an appetizer. In: Formal methods: foundations and applications. Springer, Berlin, pp 23–36
Metadaten
Titel
Incremental proxy re-encryption scheme for mobile cloud computing environment
verfasst von
Abdul Nasir Khan
M. L. Mat Kiah
Sajjad A. Madani
Mazhar Ali
Atta ur Rehman Khan
Shahaboddin Shamshirband
Publikationsdatum
01.05.2014
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 2/2014
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-013-1055-z

Weitere Artikel der Ausgabe 2/2014

The Journal of Supercomputing 2/2014 Zur Ausgabe