A comparative study and workload distribution model for re-encryption schemes in a mobile cloud computing environment

被引:13
作者
Khan, Abdul Nasir [1 ]
Ali, Mazhar [1 ]
Khan, Atta Ur Rehman [2 ]
Khan, Fiaz Gul [1 ]
Khan, Iftikhar Ahmed [1 ]
Jadoon, Waqas [1 ]
Shamshirband, Shahab [3 ]
Chronopoulos, Anthony T. [4 ,5 ]
机构
[1] COMSATS, Dept Comp Sci, Abbottabad, Pakistan
[2] King Saud Univ, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
[3] IAU, Dept Comp Sci, Chalous Branch, Chalous, Iran
[4] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX USA
[5] Univ Patras, Dept Comp Sci, Patras, Greece
关键词
mobile cloud computing; privacy; proxy re-encryption schemes; security;
D O I
10.1002/dac.3308
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The researchers are using the various variations of re-encryption schemes, which migrate the computational intensive re-encryption jobs of mobile devices to the trusted entity/cloud. However, the messages are still encrypted and decrypted using the limited computational power of mobile devices. Our contribution in this paper is to propose a workload distribution model for re-encryption schemes, which offloads the computational intensive operations, such as encryption and decryption on a trusted entity. Moreover, the proposed workload distribution model is compared with existing re-encryption schemes of resource utilization on trusted entity and mobile device. The experimental results show substantial improvement in performance compared to the existing schemes.
引用
收藏
页数:18
相关论文
共 24 条
[1]   Authentication in mobile cloud computing: A survey [J].
Alizadeh, Mojtaba ;
Abolfazli, Saeid ;
Zamani, Mazdak ;
Baharun, Sabariah ;
Sakurai, Kouichi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 :59-80
[2]  
[Anonymous], IACR CRYPTOLOGY EPRI
[3]  
[Anonymous], INC IMS IDC 2009 NCM
[4]  
[Anonymous], P 2009 ACM WORKSH CL
[5]  
Caro A. D., 2012, JAVA PAIRING BASED C
[6]  
Chen Y.-J., 2011, 40 INT C PAR PROC WO
[7]  
Dijiang Huang, 2011, IEEE INFOCOM 2011 - IEEE Conference on Computer Communications. Workshops, P614, DOI 10.1109/INFCOMW.2011.5928886
[8]  
Dijiang Huang, 2010, 2010 Fifth International Symposium on Service Oriented System Engineering (SOSE 2010), P27, DOI 10.1109/SOSE.2010.20
[9]  
Itani W., 2010, P IEEE INT C ENERGY, P1
[10]   Provable Data Possession of Resource-Constrained Mobile Devices in Cloud Computing [J].
Yang, Jian ;
Wang, Haihang ;
Wang, Jian ;
Tan, Chengxiang ;
Yu, Dingguo .
Journal of Networks, 2011, 6 (07) :1033-1040