A remotely keyed file encryption scheme under mobile cloud computing

被引:46
作者
Yang, Li [1 ]
Han, Ziyi [1 ]
Huang, Zhengan [2 ]
Ma, Jianfeng [3 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Shaanxi, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci & Educ Software, Guangzhou 510000, Guangdong, Peoples R China
[3] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
File encryption; Remotely keyed encryption; Data integrity; Mobile cloud computing; Privacy protection;
D O I
10.1016/j.jnca.2017.12.017
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The storage and computing capacity limitations of a mobile terminal pare down the file sharing ability between mobile terminals and public clouds. Moreover, the security of public clouds increases perceived risks. Private clouds represent a very effective platform and can be regarded as a trusted third party for improving the level of security when a user uses a file from public clouds. Thus, we propose a new scheme called FREDP (File Remotely keyed Encryption and Data Protection). This scheme involves three-party interaction among a mobile terminal, private clouds and public clouds. The private clouds share the ciphertext file to the public clouds until the mobile terminal and the trusted third party, the private clouds, finish the encryption of the plaintext file using a remotely keyed encryption algorithm. To ensure security when a mobile terminal uses data, the private clouds as the third party regularly verify the integrity of the data in the public clouds. Finally, the mobile terminal and private clouds decrypt the ciphertext file to allow the user of the mobile terminal to use the data. In addition, we analyze the security of FREDP using BAN. The FREDP satisfies the security standard. In addition, we conduct an experiment to measure the scheme's performance. The results show that FREDP achieves good performance.
引用
收藏
页码:90 / 99
页数:10
相关论文
共 23 条
[1]  
Al-Hasan Md, 2013, 2013 8th International Forum on Strategic Technology (IFOST), P2, DOI 10.1109/IFOST.2013.6616855
[2]   Authentication in mobile cloud computing: A survey [J].
Alizadeh, Mojtaba ;
Abolfazli, Saeid ;
Zamani, Mazdak ;
Baharun, Sabariah ;
Sakurai, Kouichi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 :59-80
[3]  
Beaver D., 1990, INT CRYPT C CRYPTO, P62
[4]  
Blaze M., 1996, Fast Software Encryption. Third International Workshop Proceedings, P33
[5]  
Blaze Matt, 1999, INT C THEOR APPL CRY, P868
[6]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[7]  
Cook DL, 2005, LECT NOTES COMPUT SC, V3783, P363
[8]  
Feng Yao, 2009, COMPUTER APPL SOFTWA, P273
[9]  
Hasan Yassin M. Y., 2007, 2007 IEEE International Symposium on Signal Processing and Information Technology, P74, DOI 10.1109/ISSPIT.2007.4458045
[10]   Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks [J].
He, Debiao ;
Zeadally, Sherali ;
Wu, Libing .
IEEE SYSTEMS JOURNAL, 2018, 12 (01) :64-73