CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing

被引:10
|
作者
Banerjee, Amit [1 ]
Hasan, Mahamudul [1 ]
Rahman, Md. Auhidur [1 ]
Chapagain, Rajesh [1 ]
机构
[1] South Asian Univ, Dept Comp Sci, New Delhi 110021, India
来源
IEEE ACCESS | 2017年 / 5卷
关键词
Cloud computing; mobile cloud computing; mobile device; security; stream cipher; encryption; decryption; SECURITY; GENERATORS;
D O I
10.1109/ACCESS.2017.2744670
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile device and its applications have revolutionized the way we store and share data. It is becoming a warehouse of users personal information. Unluckily, most of these data are stored in an unencrypted format, prone to security threats. In this paper, we propose a lightweight, computationally efffcient protocol, called CLOAK, for the mobile device. CLOAK is based on stream cipher and takes the help of an external server for the generation and distribution of cryptographically secure pseudo-random number (CSPRN). In order to enhance the security of our protocol, we use the concept of symmetric key cryptography. We present three versions of the protocol referred ass-CLOAK, r-CLOAK and d-CLOAK, varying on the basis of the key selection procedure. In CLOAK, the core encryption/decryption operation is performed within the mobile devices to secure data at its origin. The security of CSPRN is ensured using deception method. In CLOAK, all messages are exchanged securely between mobile and the server with mutual identity verification. We evaluate CLOAK on Android smart phones and use Amazon Web services for generating CSPRN. Additionally, we present attack analysis and show that the brute force attack is computationally infeasible for the proposed protocol.
引用
收藏
页码:17678 / 17691
页数:14
相关论文
共 50 条
  • [1] A Light Weight Stream based Encryption Unscrambling Convention in Mobile Cloud Computing
    BinduKumari, P.
    Sakthidharan, G. R.
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 791 - 796
  • [2] Security on mobile cloud computing using cipher text policy and attribute based encryption scheme
    Swetha M.
    Latha M.
    Materials Today: Proceedings, 2023, 80 : 3059 - 3063
  • [3] Design of Stream Cipher for Text Encryption using Soft Computing based Techniques
    Santhanalakshmi, S.
    Sangeeta, K.
    Patra, G. K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (12): : 149 - 152
  • [4] Chaotic encryption algorithm based on alternant of stream cipher and block cipher
    Wang, Xingyuan
    Wang, Xiaojuan
    Zhao, Jianfeng
    Zhang, Zhenfeng
    NONLINEAR DYNAMICS, 2011, 63 (04) : 587 - 597
  • [5] Chaotic encryption algorithm based on alternant of stream cipher and block cipher
    Xingyuan Wang
    Xiaojuan Wang
    Jianfeng Zhao
    Zhenfeng Zhang
    Nonlinear Dynamics, 2011, 63 : 587 - 597
  • [6] Data Encryption as a Service in Mobile Cloud Computing
    Ibtihal, Mouhib
    Moulay Driss, El Ouadghiri
    Abdelali, El Bouchti
    Khalid, ZineDine
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2016, 11 (03): : 135 - 143
  • [7] Homomorphic Encryption in Mobile Multi Cloud Computing
    Louk, Maya
    Lim, Hyotaek
    2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 493 - 497
  • [8] Secure scheme on mobile multi cloud computing based on homomorphic encryption
    Zkik, Karim
    Orhanou, Ghizlane
    El Hajji, Said
    2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [9] On Video Stream Encryption Efficiency for Mobile Cloud System
    Samet, Nouha
    Ben Letaifa, Asma
    Hamdi, Mohamed
    Tabbane, Sami
    PROCEEDINGS OF 2016 5TH INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2016, : 372 - 376
  • [10] The research of the new stream cipher encryption
    Zhuang, Peidong
    Wang, Zhigang
    Ding, Qun
    Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument, 2009, 30 (SUPPL.): : 323 - 331