Privacy-preserving personal data operation on mobile cloud-Chances and challenges over advanced persistent threat

被引:31
作者
Au, Man Ho [1 ]
Liang, Kaitai [2 ]
Liu, Joseph K. [3 ]
Lu, Rongxing [4 ]
Ning, Jianting [5 ]
机构
[1] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
[2] Manchester Metropolitan Univ, Sch Comp Math & Digital Technol, Manchester, Lancs, England
[3] Monash Univ, Fac Informat Technol, Clayton, Vic, Australia
[4] Univ New Brunswick, Fac Comp Sci, Fredericton, NB, Canada
[5] Natl Univ Singapore, Dept Comp Sci, Singapore, Singapore
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 79卷
基金
英国工程与自然科学研究理事会;
关键词
Mobile could; Security; Privacy; Applied cryptography; PROXY RE-ENCRYPTION; IDENTITY-BASED ENCRYPTION; SEARCHABLE ENCRYPTION; SECURE; EFFICIENT; MANAGEMENT; SUPPORT; SCHEME;
D O I
10.1016/j.future.2017.06.021
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Bring your own devices have become a new symbol of industrial and education institutional culture to date. A single individual can gain access to personal data anytime at anywhere of his/her workplace due to the advanced WiFi/5G network and cloud technology. The most convenient way for us to access to cloud data is to use personal smartphone. However, smartphone is somewhat vulnerable (because of its innate disadvantage, e.g., low security protection and limited computation resource) while encountering with malicious attacks in open network. Mobile users may be the victims of a recent new type of attack - advanced persistent threat (APT), since attackers may penetrate into different levels of cloud and mobile infrastructures to eavesdrop, steal and temper data. This survey paper introduces some security/privacy risks on mobile cloud in the view point of applied cryptography. Meanwhile, it provides some insights as possible solutions for the risks. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:337 / 349
页数:13
相关论文
共 107 条
[41]   Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security [J].
He, Kai ;
Weng, Jian ;
Liu, Jia-Nan ;
Liu, Joseph K. ;
Liu, Wei ;
Deng, Robert H. .
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :247-255
[42]   Cost-Effective Authentic and Anonymous Data Sharing with Forward Security [J].
Huang, Xinyi ;
Liu, Joseph K. ;
Tang, Shaohua ;
Xiang, Yang ;
Liang, Kaitai ;
Xu, Li ;
Zhou, Jianying .
IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (04) :971-983
[43]  
Inkyung Jeun, 2012, Advances in Grid and Pervasive Computing. Proceedings 7th International Conference, GPC 2012, P350, DOI 10.1007/978-3-642-30767-6_30
[44]  
Kaitai Liang, 2014, Information Security Practice and Experience. 10th International Conference, ISPEC 2014. Proceedings: LNCS 8434, P448, DOI 10.1007/978-3-319-06320-1_33
[45]  
Kaitai Liang, 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems, P552, DOI 10.1109/INCoS.2013.103
[46]  
Kaitai Liang, 2013, Information Security Practice and Experience. 9th International Conference, ISPEC 2013. Proceedings, P132, DOI 10.1007/978-3-642-38033-4_10
[47]   Biometric personal authentication using keystroke dynamics: A review [J].
Karnan, M. ;
Akila, M. ;
Krishnaraj, N. .
APPLIED SOFT COMPUTING, 2011, 11 (02) :1565-1573
[48]  
Katz J., Tracing Insider Attacks in the Context of Predicate Encryption Schemes
[49]  
Kawai Y., 2013, IACR CRYPTOLOGY EPRI, V2013, P318
[50]   Towards secure mobile cloud computing: A survey [J].
Khan, Abdul Nasir ;
Kiah, M. L. Mat ;
Khan, Samee U. ;
Madani, Sajjad A. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (05) :1278-1299