Incremental proxy re-encryption scheme for mobile cloud computing environment

被引:0
|
作者
Abdul Nasir Khan
M. L. Mat Kiah
Sajjad A. Madani
Mazhar Ali
Atta ur Rehman Khan
Shahaboddin Shamshirband
机构
[1] University of Malaya,Faculty of Computer Science and Information Technology
[2] COMSATS Institute of Information Technology,Department of Computer Science
[3] North Dakota State University,Department of Electrical and Computer Engineering
来源
关键词
Cloud computing; Mobile cloud computing; Security; Privacy;
D O I
暂无
中图分类号
学科分类号
摘要
Due to the limited computational capability of mobile devices, the research organization and academia are working on computationally secure schemes that have capability for offloading the computational intensive data access operations on the cloud/trusted entity for execution. Most of the existing security schemes, such as proxy re-encryption, manager-based re-encryption, and cloud-based re-encryption, are based on El-Gamal cryptosystem for offloading the computational intensive data access operation on the cloud/trusted entity. However, the resource hungry pairing-based cryptographic operations, such as encryption and decryption, are executed using the limited computational power of mobile device. Similarly, if the data owner wants to modify the encrypted file uploaded on the cloud storage, after modification the data owner must encrypt and upload the entire file on the cloud storage without considering the altered portion(s) of the file. In this paper, we have proposed an incremental version of proxy re-encryption scheme for improving the file modification operation and compared with the original version of the proxy re-encryption scheme on the basis of turnaround time, energy consumption, CPU utilization, and memory consumption while executing the security operations on mobile device. The incremental version of proxy re-encryption scheme shows significant improvement in results while performing file modification operations using limited processing capability of mobile devices.
引用
收藏
页码:624 / 651
页数:27
相关论文
共 50 条
  • [1] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Madani, Sajjad A.
    Ali, Mazhar
    Khan, Atta Ur Rehman
    Shamshirband, Shahaboddin
    [J]. JOURNAL OF SUPERCOMPUTING, 2014, 68 (02): : 624 - 651
  • [2] A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
    Tang, Yongli
    Lian, Huanhuan
    Zhao, Zemao
    Yan, Xixi
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 56 (02): : 339 - 352
  • [3] Multi-element based on proxy re-encryption scheme for mobile cloud computing
    School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing
    210094, China
    不详
    100070, China
    [J]. Tongxin Xuebao, 11
  • [4] Offline privacy preserving proxy re-encryption in mobile cloud computing
    Koe, Arthur Sandor Voundi
    Lin, Yaping
    [J]. PERVASIVE AND MOBILE COMPUTING, 2019, 59
  • [5] Hierarchical Identity Role based proxy re-encryption scheme for cloud computing
    Nirmala, V
    Shanmugalakshmi, R.
    [J]. PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2013,
  • [6] Homomorphic Proxy Re-Encryption and Multiparty Cloud Computing
    Liu, Shu-Guang
    Zhang, Wei
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 222 - 225
  • [7] Towards a secure incremental proxy re-encryption for e-healthcare data sharing in mobile cloud computing
    Bhatia, Tarunpreet
    Verma, A. K.
    Sharma, Gaurav
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (05):
  • [8] A secure re-encryption scheme for data services in a cloud computing environment
    Xiong, Lizhi
    Xu, Zhengquan
    Xu, Yanyan
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (17): : 4573 - 4585
  • [9] A new outsourcing conditional proxy re-encryption suitable for mobile cloud environment
    Son, Junggab
    Kim, Donghyun
    Bhuiyan, Md Zakirul Alam
    Hussain, Rasheed
    Oh, Heekuck
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (14):
  • [10] PreBAC: a novel Access Control scheme based Proxy Re-Encryption for cloud computing
    Su, Mang
    Wang, Liangchen
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (05): : 2754 - 2767