CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing

被引:10
|
作者
Banerjee, Amit [1 ]
Hasan, Mahamudul [1 ]
Rahman, Md. Auhidur [1 ]
Chapagain, Rajesh [1 ]
机构
[1] South Asian Univ, Dept Comp Sci, New Delhi 110021, India
来源
IEEE ACCESS | 2017年 / 5卷
关键词
Cloud computing; mobile cloud computing; mobile device; security; stream cipher; encryption; decryption; SECURITY; GENERATORS;
D O I
10.1109/ACCESS.2017.2744670
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile device and its applications have revolutionized the way we store and share data. It is becoming a warehouse of users personal information. Unluckily, most of these data are stored in an unencrypted format, prone to security threats. In this paper, we propose a lightweight, computationally efffcient protocol, called CLOAK, for the mobile device. CLOAK is based on stream cipher and takes the help of an external server for the generation and distribution of cryptographically secure pseudo-random number (CSPRN). In order to enhance the security of our protocol, we use the concept of symmetric key cryptography. We present three versions of the protocol referred ass-CLOAK, r-CLOAK and d-CLOAK, varying on the basis of the key selection procedure. In CLOAK, the core encryption/decryption operation is performed within the mobile devices to secure data at its origin. The security of CSPRN is ensured using deception method. In CLOAK, all messages are exchanged securely between mobile and the server with mutual identity verification. We evaluate CLOAK on Android smart phones and use Amazon Web services for generating CSPRN. Additionally, we present attack analysis and show that the brute force attack is computationally infeasible for the proposed protocol.
引用
收藏
页码:17678 / 17691
页数:14
相关论文
共 50 条
  • [31] Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation
    Ge, Xin
    Lu, Bin
    Liu, Fenlin
    Luo, Xiangyang
    NONLINEAR DYNAMICS, 2017, 90 (02) : 1141 - 1150
  • [32] Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation
    XiaoJun Tong
    MingGen Cui
    Science in China Series F: Information Sciences, 2010, 53 : 191 - 202
  • [33] Analysis of the encryption penalty in a QAM-based quantum noise stream cipher
    Li, Yuang
    Li, Yajie
    Zhu, Kongni
    Wang, Wei
    Zhao, Yongli
    Zhang, Jie
    OPTICS EXPRESS, 2023, 31 (12) : 19006 - 19020
  • [34] Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation
    TONG XiaoJun1 & CUI MingGen2 1School of Computer Science and Technology
    2School of Science
    Science China(Information Sciences), 2010, 53 (01) : 191 - 202
  • [35] Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation
    Xin Ge
    Bin Lu
    Fenlin Liu
    Xiangyang Luo
    Nonlinear Dynamics, 2017, 90 : 1141 - 1150
  • [36] Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation
    Tong XiaoJun
    Cui MingGen
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (01) : 191 - 202
  • [37] Efficient, Verifiable and Privacy Preserving Decentralized Attribute-Based Encryption for Mobile Cloud Computing
    Lyu, Maoxu
    Li, Xuejun
    Li, Hui
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 195 - 204
  • [38] Multi-element based on proxy re-encryption scheme for mobile cloud computing
    School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing
    210094, China
    不详
    100070, China
    Tongxin Xuebao, 11
  • [39] Low Complexity Multi-Authority Attribute Based Encryption Scheme for Mobile Cloud Computing
    Li, Fei
    Rahulamathavan, Yogachandran
    Rajarajan, Muttukrishnan
    Phan, Raphael C-W
    2013 IEEE SEVENTH INTERNATIONAL SYMPOSIUM ON SERVICE-ORIENTED SYSTEM ENGINEERING (SOSE 2013), 2013, : 573 - 577
  • [40] Message-Oriented Protocol for Cloud Computing For the Scenarios of Mobile Cloud Computing and Data Center
    Guo, Sijia
    Wang, Joseph. K. H.
    2013 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - CHINA (ICCE-CHINA), 2013, : 1 - 4