Secure scheme on mobile multi cloud computing based on homomorphic encryption

被引:0
|
作者
Zkik, Karim [1 ]
Orhanou, Ghizlane [1 ]
El Hajji, Said [1 ]
机构
[1] Univ Mohammed V Rabat, Fac Sci, Lab Math Comp & Applicat, Rabat, Morocco
来源
2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS) | 2016年
关键词
security; authentication; mobile multi cloud computing; homomorphic encryption; confidentiality; privacy;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Mobile technologies have become increasingly essential in our life as they offer great possibilities of uses, to users. Mobile cloud computing is a new paradigm that allows users to fully utilize mobile technologies exceeding the resources calculation limit. This exponential use of cloud services through mobile devices has allowed users to download, to share and retrieve their personal data anywhere and anytime. This increase in mobile traffic and circulation of personal data of users through internet has caused many security problems and sparked the interest of the attackers. We propose in this paper a light and strong authentication mechanism based on homomorphic encryption, to secure access for mobile users to the remote multi cloud servers. It also provide an implementation and simulation of our mechanism to demonstrate its robustness and reliability, and give a proof of concept of the authentication, integrity and confidentiality.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Secure Voting in the Cloud using Homomorphic Encryption and Mobile Agents
    Will, Mark A.
    Nicholson, Brandon
    Tiehuis, Marc
    Ko, Ryan K. L.
    2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING RESEARCH AND INNOVATION (ICCCRI), 2015, : 173 - 184
  • [22] Medical Data Analytics for Secure Multi-party-primarily based Cloud Computing utilizing Homomorphic Encryption
    Sammeta, Naresh
    Parthiban, Latha
    JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2021, 80 (08): : 692 - 698
  • [23] A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security
    El-Yahyaoui, Ahmed
    Ech-Cherif El Kettani, Mohamed Dafir
    TECHNOLOGIES, 2019, 7 (01):
  • [24] A SIMPLE FULLY HOMOMORPHIC ENCRYPTION SCHEME AVAILABLE IN CLOUD COMPUTING
    Li, Jian
    Song, Danjie
    Chen, Sicong
    Lu, Xiaofeng
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 214 - 217
  • [25] Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing
    Luo, Wei
    Ma, Wenping
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : 541 - 551
  • [26] Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing
    Wei Luo
    Wenping Ma
    Cluster Computing, 2019, 22 : 541 - 551
  • [27] Secure Cloud Computing: Multithreaded Fully Homomorphic Encryption for Legal Metrology
    Oppermann, Alexander
    Yurchenko, Artem
    Esche, Marko
    Seifert, Jean-Pierre
    INTELLIGENT, SECURE, AND DEPENDABLE SYSTEMS IN DISTRIBUTED AND CLOUD ENVIRONMENTS (ISDDC 2017), 2017, 10618 : 35 - 54
  • [28] Utilizing Homomorphic Encryption to Implement Secure and Private Medical Cloud Computing
    Kocabas, Ovunc
    Soyata, Tolga
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2015, : 540 - 547
  • [29] Design and realization of a secure multiplicative homomorphic encryption scheme for cloud services
    Christiana Zaraket
    Khalil Hariss
    Sandro Ephrem
    Maroun Chamoun
    Tony Nicolas
    Cluster Computing, 2023, 26 : 685 - 699
  • [30] Design and realization of a secure multiplicative homomorphic encryption scheme for cloud services
    Zaraket, Christiana
    Hariss, Khalil
    Ephrem, Sandro
    Chamoun, Maroun
    Nicolas, Tony
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (01): : 685 - 699