Incremental proxy re-encryption scheme for mobile cloud computing environment

被引:0
|
作者
Abdul Nasir Khan
M. L. Mat Kiah
Sajjad A. Madani
Mazhar Ali
Atta ur Rehman Khan
Shahaboddin Shamshirband
机构
[1] University of Malaya,Faculty of Computer Science and Information Technology
[2] COMSATS Institute of Information Technology,Department of Computer Science
[3] North Dakota State University,Department of Electrical and Computer Engineering
来源
关键词
Cloud computing; Mobile cloud computing; Security; Privacy;
D O I
暂无
中图分类号
学科分类号
摘要
Due to the limited computational capability of mobile devices, the research organization and academia are working on computationally secure schemes that have capability for offloading the computational intensive data access operations on the cloud/trusted entity for execution. Most of the existing security schemes, such as proxy re-encryption, manager-based re-encryption, and cloud-based re-encryption, are based on El-Gamal cryptosystem for offloading the computational intensive data access operation on the cloud/trusted entity. However, the resource hungry pairing-based cryptographic operations, such as encryption and decryption, are executed using the limited computational power of mobile device. Similarly, if the data owner wants to modify the encrypted file uploaded on the cloud storage, after modification the data owner must encrypt and upload the entire file on the cloud storage without considering the altered portion(s) of the file. In this paper, we have proposed an incremental version of proxy re-encryption scheme for improving the file modification operation and compared with the original version of the proxy re-encryption scheme on the basis of turnaround time, energy consumption, CPU utilization, and memory consumption while executing the security operations on mobile device. The incremental version of proxy re-encryption scheme shows significant improvement in results while performing file modification operations using limited processing capability of mobile devices.
引用
收藏
页码:624 / 651
页数:27
相关论文
共 50 条
  • [31] A Secure Re-Encryption Scheme for Data Sharing in Unreliable Cloud Environment
    Sultan, Nazatul Haque
    Barbhuiya, Ferdous Ahmed
    [J]. PROCEEDINGS 2016 IEEE WORLD CONGRESS ON SERVICES - SERVICES 2016, 2016, : 75 - 80
  • [32] A proxy broadcast re-encryption for cloud data sharing
    Sun, Maosheng
    Ge, Chunpeng
    Fang, Liming
    Wang, Jiandong
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (09) : 10455 - 10469
  • [33] A proxy broadcast re-encryption for cloud data sharing
    Maosheng Sun
    Chunpeng Ge
    Liming Fang
    Jiandong Wang
    [J]. Multimedia Tools and Applications, 2018, 77 : 10455 - 10469
  • [34] A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing
    Chen, Zhenhua
    Li, Shundong
    Guo, Yimin
    Wang, Yilei
    Chu, Yunjie
    [J]. NETWORK AND SYSTEM SECURITY, 2014, 8792 : 82 - 95
  • [35] Identity-Based Proxy Re-encryption over NTRU Lattices for Cloud Computing
    Yue, Na
    Wang, Yang
    Wang, Mingqiang
    [J]. 2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 : 264 - 269
  • [36] Performance Analysis of the Symmetric Proxy Re-encryption Scheme
    Meiliasari, Rizky Putri
    Syalim, Amril
    Yazid, Setiadi
    [J]. 2019 4TH INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2019), 2019, : 91 - 96
  • [37] On the Insecurity of an Identity Based Proxy Re-encryption Scheme
    Wang, Xu An
    Yang, Xiaoyuan
    [J]. FUNDAMENTA INFORMATICAE, 2010, 98 (2-3) : 277 - 281
  • [38] A real-time parking service with proxy re-encryption in vehicular cloud computing
    Lin, Iuon-Chang
    Cheng, Chen-Yang
    Chen, Hsiang-Yu
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2019, 85 : 208 - 213
  • [39] A Timed-Release Proxy Re-Encryption Scheme
    Emura, Keita
    Miyaji, Atsuko
    Omote, Kazumasa
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (08) : 1682 - 1695
  • [40] Improved Proxy Re-encryption Scheme with Equality Test
    Yang, Chih-Chen
    Tso, Raylin
    Liu, Zi-Yuan
    Hsu, Jen-Chieh
    Tseng, Yi-Fan
    [J]. 2021 16TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2021), 2021, : 37 - 44