A comparative study and workload distribution model for re-encryption schemes in a mobile cloud computing environment

被引:13
|
作者
Khan, Abdul Nasir [1 ]
Ali, Mazhar [1 ]
Khan, Atta Ur Rehman [2 ]
Khan, Fiaz Gul [1 ]
Khan, Iftikhar Ahmed [1 ]
Jadoon, Waqas [1 ]
Shamshirband, Shahab [3 ]
Chronopoulos, Anthony T. [4 ,5 ]
机构
[1] COMSATS, Dept Comp Sci, Abbottabad, Pakistan
[2] King Saud Univ, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
[3] IAU, Dept Comp Sci, Chalous Branch, Chalous, Iran
[4] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX USA
[5] Univ Patras, Dept Comp Sci, Patras, Greece
关键词
mobile cloud computing; privacy; proxy re-encryption schemes; security;
D O I
10.1002/dac.3308
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The researchers are using the various variations of re-encryption schemes, which migrate the computational intensive re-encryption jobs of mobile devices to the trusted entity/cloud. However, the messages are still encrypted and decrypted using the limited computational power of mobile devices. Our contribution in this paper is to propose a workload distribution model for re-encryption schemes, which offloads the computational intensive operations, such as encryption and decryption on a trusted entity. Moreover, the proposed workload distribution model is compared with existing re-encryption schemes of resource utilization on trusted entity and mobile device. The experimental results show substantial improvement in performance compared to the existing schemes.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Madani, Sajjad A.
    Ali, Mazhar
    Khan, Atta Ur Rehman
    Shamshirband, Shahaboddin
    JOURNAL OF SUPERCOMPUTING, 2014, 68 (02): : 624 - 651
  • [2] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Abdul Nasir Khan
    M. L. Mat Kiah
    Sajjad A. Madani
    Mazhar Ali
    Atta ur Rehman Khan
    Shahaboddin Shamshirband
    The Journal of Supercomputing, 2014, 68 : 624 - 651
  • [3] Parallel Proxy Re-Encryption Workload Distribution for Efficient Big Data Sharing in Cloud Computing
    Khashan, Osama A.
    2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2021, : 554 - 559
  • [4] Offline privacy preserving proxy re-encryption in mobile cloud computing
    Koe, Arthur Sandor Voundi
    Lin, Yaping
    PERVASIVE AND MOBILE COMPUTING, 2019, 59
  • [5] A secure re-encryption scheme for data services in a cloud computing environment
    Xiong, Lizhi
    Xu, Zhengquan
    Xu, Yanyan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (17): : 4573 - 4585
  • [6] Secure multimedia distribution in cloud computing using re-encryption and fingerprinting
    Xiong, Lizhi
    Xia, Zhihua
    Chen, Xianyi
    Shim, Hiuk Jae
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (21) : 30297 - 30313
  • [7] Secure multimedia distribution in cloud computing using re-encryption and fingerprinting
    Lizhi Xiong
    Zhihua Xia
    Xianyi Chen
    Hiuk Jae Shim
    Multimedia Tools and Applications, 2019, 78 : 30297 - 30313
  • [8] Homomorphic Proxy Re-Encryption and Multiparty Cloud Computing
    Liu, Shu-Guang
    Zhang, Wei
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 222 - 225
  • [9] A new outsourcing conditional proxy re-encryption suitable for mobile cloud environment
    Son, Junggab
    Kim, Donghyun
    Bhuiyan, Md Zakirul Alam
    Hussain, Rasheed
    Oh, Heekuck
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (14):
  • [10] Multi-element based on proxy re-encryption scheme for mobile cloud computing
    School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing
    210094, China
    不详
    100070, China
    Tongxin Xuebao, 11