Incremental proxy re-encryption scheme for mobile cloud computing environment

被引:0
|
作者
Abdul Nasir Khan
M. L. Mat Kiah
Sajjad A. Madani
Mazhar Ali
Atta ur Rehman Khan
Shahaboddin Shamshirband
机构
[1] University of Malaya,Faculty of Computer Science and Information Technology
[2] COMSATS Institute of Information Technology,Department of Computer Science
[3] North Dakota State University,Department of Electrical and Computer Engineering
来源
关键词
Cloud computing; Mobile cloud computing; Security; Privacy;
D O I
暂无
中图分类号
学科分类号
摘要
Due to the limited computational capability of mobile devices, the research organization and academia are working on computationally secure schemes that have capability for offloading the computational intensive data access operations on the cloud/trusted entity for execution. Most of the existing security schemes, such as proxy re-encryption, manager-based re-encryption, and cloud-based re-encryption, are based on El-Gamal cryptosystem for offloading the computational intensive data access operation on the cloud/trusted entity. However, the resource hungry pairing-based cryptographic operations, such as encryption and decryption, are executed using the limited computational power of mobile device. Similarly, if the data owner wants to modify the encrypted file uploaded on the cloud storage, after modification the data owner must encrypt and upload the entire file on the cloud storage without considering the altered portion(s) of the file. In this paper, we have proposed an incremental version of proxy re-encryption scheme for improving the file modification operation and compared with the original version of the proxy re-encryption scheme on the basis of turnaround time, energy consumption, CPU utilization, and memory consumption while executing the security operations on mobile device. The incremental version of proxy re-encryption scheme shows significant improvement in results while performing file modification operations using limited processing capability of mobile devices.
引用
收藏
页码:624 / 651
页数:27
相关论文
共 50 条
  • [41] Proxy Re-encryption Scheme from IBE to CBE
    Wang, Xu An
    Yang, Xiaoyuan
    Zhang, Minqing
    [J]. FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 99 - 102
  • [42] Anonymous attribute-based proxy re-encryption for access control in cloud computing
    Zhang, Yinghui
    Li, Jin
    Chen, Xiaofeng
    Li, Hui
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2397 - 2411
  • [43] Circular Transitivity of a Bidirectional Proxy Re-encryption Scheme
    Hong, Xiaojing
    Wang, Bin
    [J]. MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2639 - +
  • [44] Efficient proxy re-encryption with keyword search scheme
    Guo, Lifeng
    Lu, Bo
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (06): : 1221 - 1228
  • [45] Proxy Re-Encryption Scheme for Decentralized Storage Networks
    Kan, Jia
    Zhang, Jie
    Liu, Dawei
    Huang, Xin
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (09):
  • [46] A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage
    Luo, Wei
    Ma, Wenping
    [J]. CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 519 - 530
  • [47] POSTER: A Certificateless Proxy Re-Encryption Scheme for Cloud-based Data Sharing
    Wu, Xiaoxin
    Xu, Lei
    Zhang, Xinwen
    [J]. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 869 - 871
  • [48] Proxy Re-Encryption Scheme Supporting a Selection of Delegatees
    Devigne, Julien
    Guerrini, Eleonora
    Laguillaumie, Fabien
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 13 - 30
  • [49] Group-Based Proxy Re-encryption Scheme
    Ma, Chunbo
    Ao, Jun
    [J]. EMERGING INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, 5754 : 1025 - 1034
  • [50] Towards a Secure Certificateless Proxy Re-Encryption Scheme
    Guo, Hui
    Zhang, Zhenfeng
    Zhang, Jiang
    Chen, Cheng
    [J]. PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 330 - 346