Skip to main content
Erschienen in: Mobile Networks and Applications 4/2019

29.04.2019

Packet Encryption for Securing Real-Time Mobile Cloud Applications

verfasst von: Ajay D M, Umamaheswari E

Erschienen in: Mobile Networks and Applications | Ausgabe 4/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The evolution of smart devices has brought the most confidential data to mobile applications and cloud computing with its processing power is serving the huge processing requirements of these applications. However, these advancements has brought in serious data security concerns, as there is constant shuttling of data from devices to cloud and backforth, and encryption is the most commonly used technique for securing data in transmission. Every encryption technique is breakable, but its efficiency is calculated with the time it can withstand an attack. But in today’s world, as cloud computing comes with almost unlimited computing resources, the present day encryption techniques might become inadequate for securing confidential data in transmission and after transmission. Existing encryption techniques, encrypt the whole data packets in a session using the same session key. If a third party can decrypt a single packet during or after transmission, all the packets in that session can be compromised. This work proposes a packet encryption scheme, where a packet key once used will never be used throughout the session, with minimal latency and maximum security for real-time mobile cloud applications.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Khan A u R, Othman M, Madani SA, Khan SU (2014) A Survey of Mobile Cloud Computing Application Models. IEEE Commun Surve Tutorials 16(1):393–413CrossRef Khan A u R, Othman M, Madani SA, Khan SU (2014) A Survey of Mobile Cloud Computing Application Models. IEEE Commun Surve Tutorials 16(1):393–413CrossRef
2.
Zurück zum Zitat Skourletopoulos G et al (2017) Towards Mobile Cloud Computing in 5G Mobile Networks: Applications, Big Data Services and Future Opportunities. In: Mavromoustakis C, Mastorakis G, Dobre C (eds) Advances in Mobile Cloud Computing and Big Data in the 5G Era. Studies in Big Data, vol 22. Springer, Cham Skourletopoulos G et al (2017) Towards Mobile Cloud Computing in 5G Mobile Networks: Applications, Big Data Services and Future Opportunities. In: Mavromoustakis C, Mastorakis G, Dobre C (eds) Advances in Mobile Cloud Computing and Big Data in the 5G Era. Studies in Big Data, vol 22. Springer, Cham
4.
Zurück zum Zitat Mollah MB, Azad MAK, Vasilakos A (2017) Security and privacy challenges in mobile cloud computing: Survey and way ahead. J Netw Comput Appl 84:38–54CrossRef Mollah MB, Azad MAK, Vasilakos A (2017) Security and privacy challenges in mobile cloud computing: Survey and way ahead. J Netw Comput Appl 84:38–54CrossRef
5.
Zurück zum Zitat Akherfi K, Gerndt M, Harroud H (2018) Mobile cloud computing for computation offloading: Issues and challenges. Appl Comput Inf 14(1):1–16 Akherfi K, Gerndt M, Harroud H (2018) Mobile cloud computing for computation offloading: Issues and challenges. Appl Comput Inf 14(1):1–16
6.
Zurück zum Zitat Jung Y, Festijo E (2014) One-time packet key exchange scheme for secure real-time multimedia applications. J Comput Syst Sci 80:1584–1596CrossRef Jung Y, Festijo E (2014) One-time packet key exchange scheme for secure real-time multimedia applications. J Comput Syst Sci 80:1584–1596CrossRef
7.
Zurück zum Zitat Jung Y, Festijo E (2013) Securing RTP packets using per-packet selective encryption scheme for real-time multimedia applications: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Pages: 659–666 Jung Y, Festijo E (2013) Securing RTP packets using per-packet selective encryption scheme for real-time multimedia applications: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Pages: 659–666
8.
Zurück zum Zitat Jung Y, Festijo E, Foster JWA (2013) Securing RTP Packets Using Per-Packet Key Exchange for Real-Time Multimedia. ETRI J 35(Number 4):726–729CrossRef Jung Y, Festijo E, Foster JWA (2013) Securing RTP Packets Using Per-Packet Key Exchange for Real-Time Multimedia. ETRI J 35(Number 4):726–729CrossRef
9.
Zurück zum Zitat Rescorla E (1999) Diffie–Hellman Key Agreement Method, RFC2631 (proposed standard) Rescorla E (1999) Diffie–Hellman Key Agreement Method, RFC2631 (proposed standard)
10.
Zurück zum Zitat Freier et al., (2011) The Secure Sockets Layer (SSL) Protocol Version 3.0, RFC 6101 Freier et al., (2011) The Secure Sockets Layer (SSL) Protocol Version 3.0, RFC 6101
11.
Zurück zum Zitat Dierks & Rescorla (2008) The Transport Layer Security (TLS) Protocol Version 1.2, RFC 5246 Dierks & Rescorla (2008) The Transport Layer Security (TLS) Protocol Version 1.2, RFC 5246
12.
Zurück zum Zitat Zou Y, Zhu J, Wang X, Hanzo L (2016) A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proc IEEE 104(9):1727–1765CrossRef Zou Y, Zhu J, Wang X, Hanzo L (2016) A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proc IEEE 104(9):1727–1765CrossRef
13.
Zurück zum Zitat Khasawneh M, Kajman I, Alkhudaidy R, Althubyani A (2014) A Survey on Wi-Fi Protocols: WPA and WPA2. In: Martínez Pérez G., Thampi S.M., Ko R., Shu L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, vol 420. Springer, Berlin, Heidelberg Khasawneh M, Kajman I, Alkhudaidy R, Althubyani A (2014) A Survey on Wi-Fi Protocols: WPA and WPA2. In: Martínez Pérez G., Thampi S.M., Ko R., Shu L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, vol 420. Springer, Berlin, Heidelberg
14.
Zurück zum Zitat Sheldon FT, Oak Ridge National Laboratory, Weber JM, Yoo S-M, Pan WD, (2012) The Insecurity of Wireless Networks, IEEE Security & Privacy Magazine, volume: 10, Issue: 4, Pages: 54–61 Sheldon FT, Oak Ridge National Laboratory, Weber JM, Yoo S-M, Pan WD, (2012) The Insecurity of Wireless Networks, IEEE Security & Privacy Magazine, volume: 10, Issue: 4, Pages: 54–61
15.
Zurück zum Zitat Hamzeh, et al., (1999) Point-to-Point Tunneling Protocol (PPTP), RFC 2637 Hamzeh, et al., (1999) Point-to-Point Tunneling Protocol (PPTP), RFC 2637
17.
Zurück zum Zitat Simion D, Ursuleanu F, Mihai G, Adrian P, Dan A, Lavric A (2012) Efficiency Consideration for Data Packets Encryption within Wireless VPN Tunneling for Video Streaming. Int J Comput Commun Control 8:136CrossRef Simion D, Ursuleanu F, Mihai G, Adrian P, Dan A, Lavric A (2012) Efficiency Consideration for Data Packets Encryption within Wireless VPN Tunneling for Video Streaming. Int J Comput Commun Control 8:136CrossRef
18.
Zurück zum Zitat Townsley, et al., (1999) Layer Two Tunneling Protocol "L2TP", RFC 2661 Townsley, et al., (1999) Layer Two Tunneling Protocol "L2TP", RFC 2661
20.
Zurück zum Zitat Frankel K (2011) IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap, RFC 6071 Frankel K (2011) IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap, RFC 6071
21.
Zurück zum Zitat Rosu SM, Popescu MM, Dragoi G, Guica IR (2012) The Virtual Enterprise Network based on IPSec VPN Solutions and Management, International Journal of Advanced Computer Science and Applications, Vol. 3, No. 11 Rosu SM, Popescu MM, Dragoi G, Guica IR (2012) The Virtual Enterprise Network based on IPSec VPN Solutions and Management, International Journal of Advanced Computer Science and Applications, Vol. 3, No. 11
Metadaten
Titel
Packet Encryption for Securing Real-Time Mobile Cloud Applications
verfasst von
Ajay D M
Umamaheswari E
Publikationsdatum
29.04.2019
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 4/2019
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-019-01263-1

Weitere Artikel der Ausgabe 4/2019

Mobile Networks and Applications 4/2019 Zur Ausgabe

Neuer Inhalt