Towards Secure Data Distribution Systems in Mobile Cloud Computing

被引:20
|
作者
Zhang, Jiang [1 ]
Zhang, Zhenfeng [2 ]
Guo, Hui [1 ]
机构
[1] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[2] Chinese Acad Sci, Inst Software, Trusted Comp & Informat Assurance Lab, Beijing 100190, Peoples R China
基金
中国国家自然科学基金;
关键词
Mobile cloud computing; secure data distribution; data integrity; access control; proxy re-encryption; PROXY RE-ENCRYPTION; STORAGE;
D O I
10.1109/TMC.2017.2687931
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Though the electronic technologies have undergone fast developments in recent years, mobile devices such as smartphones are still comparatively weak in contrast to desktops in terms of computational capability, storage, etc., and are not able to meet the increasing demands from mobile users. By integrating mobile computing and cloud computing, mobile cloud computing (MCC) greatly extends the boundary of the mobile applications, but it also inherits many challenges in cloud computing, e.g., data privacy and data integrity. In this paper, we leverage several cryptographic primitives such as a new type-based proxy re-encryption to design a secure and efficient data distribution system in MCC, which provides data privacy, data integrity, data authentication, and flexible data distribution with access control. Compared to traditional cloud-based data storage systems, our system is a lightweight and easily deployable solution for mobile users in MCC since no trusted third parties are involved and each mobile user only has to keep short secret keys consisting of three group elements for all cryptographic operations. Finally, we present extensive performance analysis and empirical studies to demonstrate the security, scalability, and efficiency of our proposed system.
引用
收藏
页码:3222 / 3235
页数:14
相关论文
共 50 条
  • [41] Secure Data Process in Distributed Cloud Computing
    Sharmila, P.
    Danapaquiame, N.
    Subhapriya, R.
    Janakiram, A.
    Amudhavel, J.
    [J]. BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2018, 11 (01): : 75 - 84
  • [42] Research of Data Secure Based on Cloud Computing
    Shi Yan-rong
    Zhao Xiao-fang
    Chen Shu-yin
    [J]. 2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 202 - 204
  • [43] Data storage with secure boundary in cloud computing
    Zhu, Shuaishuai
    Han, Yiliang
    [J]. ICIC Express Letters, 2014, 8 (09): : 2389 - 2394
  • [44] A Secure and Searchable Data Storage in Cloud Computing
    Gupta, Sarika
    Satapathy, Sangita Rani
    Mehta, Piyush
    Tripathy, Anupam
    [J]. PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 106 - 109
  • [45] Towards a Formal Approach to Mobile Cloud Computing
    Amoretti, Michele
    Grazioli, Alessandro
    Zanichelli, Francesco
    Senni, Valerio
    Tiezzi, Francesco
    [J]. 2014 22ND EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP 2014), 2014, : 743 - 750
  • [46] On the existence of provably secure cloud computing systems
    Varnovsky N.P.
    Zakharov V.A.
    Shokurov A.V.
    [J]. Moscow University Computational Mathematics and Cybernetics, 2016, 40 (2) : 83 - 88
  • [47] Towards a Secure Mobile Edge Computing Framework for Hajj
    Rahman, Md. Abdur
    Hassanain, Elham
    Hossain, M. Shamim
    [J]. IEEE ACCESS, 2017, 5 : 11768 - 11781
  • [48] Towards Trustworthy and Secure Kiosk Computing for Mobile Users
    Zhou, Dong
    Inamura, Hiroshi
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 49 - 54
  • [49] A Cloud-Based Vertical Data Distribution Approach for a Secure Data Access on Mobile Devices
    Kohler, Jens
    Specht, Thomas
    [J]. EMERGING TECHNOLOGIES IN DATA MINING AND INFORMATION SECURITY, IEMIS 2018, VOL 1, 2019, 755 : 227 - 237
  • [50] Secure data classification using superior naive classifier in agent based mobile cloud computing
    Arvind, K. S.
    Manimegalai, R.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (02): : 1535 - 1542