Incremental proxy re-encryption scheme for mobile cloud computing environment

被引:72
|
作者
Khan, Abdul Nasir [1 ]
Kiah, M. L. Mat [1 ]
Madani, Sajjad A. [2 ]
Ali, Mazhar [3 ]
Khan, Atta Ur Rehman [1 ]
Shamshirband, Shahaboddin [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur, Malaysia
[2] COMSATS Inst Informat Technol, Dept Comp Sci, Islamabad, Pakistan
[3] N Dakota State Univ, Dept Elect & Comp Engn, Fargo, ND 58105 USA
来源
JOURNAL OF SUPERCOMPUTING | 2014年 / 68卷 / 02期
关键词
Cloud computing; Mobile cloud computing; Security; Privacy;
D O I
10.1007/s11227-013-1055-z
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the limited computational capability of mobile devices, the research organization and academia are working on computationally secure schemes that have capability for offloading the computational intensive data access operations on the cloud/trusted entity for execution. Most of the existing security schemes, such as proxy re-encryption, manager-based re-encryption, and cloud-based re-encryption, are based on El-Gamal cryptosystem for offloading the computational intensive data access operation on the cloud/trusted entity. However, the resource hungry pairing-based cryptographic operations, such as encryption and decryption, are executed using the limited computational power of mobile device. Similarly, if the data owner wants to modify the encrypted file uploaded on the cloud storage, after modification the data owner must encrypt and upload the entire file on the cloud storage without considering the altered portion(s) of the file. In this paper, we have proposed an incremental version of proxy re-encryption scheme for improving the file modification operation and compared with the original version of the proxy re-encryption scheme on the basis of turnaround time, energy consumption, CPU utilization, and memory consumption while executing the security operations on mobile device. The incremental version of proxy re-encryption scheme shows significant improvement in results while performing file modification operations using limited processing capability of mobile devices.
引用
下载
收藏
页码:624 / 651
页数:28
相关论文
共 50 条
  • [21] A comparative study and workload distribution model for re-encryption schemes in a mobile cloud computing environment
    Khan, Abdul Nasir
    Ali, Mazhar
    Khan, Atta Ur Rehman
    Khan, Fiaz Gul
    Khan, Iftikhar Ahmed
    Jadoon, Waqas
    Shamshirband, Shahab
    Chronopoulos, Anthony T.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (16)
  • [22] Proxy Re-encryption Scheme based on the Timed-release in Edge Computing
    Yin Y.
    Zhou W.
    Wang Z.
    Gan Y.
    Zhang Y.
    International Journal of Advanced Computer Science and Applications, 2023, 14 (03) : 347 - 352
  • [23] Outsourcing Online/offline Proxy Re-encryption for Mobile Cloud Storage Sharing
    Wang, Xu An
    Nedjah, Nadia
    Sangaiah, Arun Kumar
    Shan, Chun
    Wang, Zuliang
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 3PGCIC-2018, 2019, 24 : 478 - 485
  • [24] An Authenticated Keyword Searchable Conditional Proxy Re-encryption Scheme in Cloud Services
    Sharma, Sumit
    Swarnakar, Ashutosh
    Babu, Ch Jayanth
    Padmavathy, R.
    Kumar, Rakesh
    PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,
  • [25] A Searchable Hierarchical Conditional Proxy Re-Encryption Scheme for Cloud Storage Services
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chen, Chin-Ling
    Chiu, Shih-Ting
    INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (03): : 289 - 299
  • [26] Strongly Secure and Cost-Effective Certificateless Proxy Re-encryption Scheme for Data Sharing in Cloud Computing
    Qin, Zhiguang
    Wu, Shikun
    Xiong, Hu
    BIG DATA COMPUTING AND COMMUNICATIONS, 2015, 9196 : 205 - 216
  • [27] Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing
    Luo, Wei
    Ma, Wenping
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : 541 - 551
  • [28] Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing
    Wei Luo
    Wenping Ma
    Cluster Computing, 2019, 22 : 541 - 551
  • [29] A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing
    Li, Juyan
    Qiao, Zhiqi
    Zhang, Kejia
    Cui, Chen
    SENSORS, 2021, 21 (01) : 1 - 20
  • [30] Proxy Re-encryption with Unforgeable Re-encryption Keys
    Guo, Hui
    Zhang, Zhenfeng
    Zhang, Jiang
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 20 - 33