Privacy-preserving personal data operation on mobile cloud-Chances and challenges over advanced persistent threat

被引:31
作者
Au, Man Ho [1 ]
Liang, Kaitai [2 ]
Liu, Joseph K. [3 ]
Lu, Rongxing [4 ]
Ning, Jianting [5 ]
机构
[1] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
[2] Manchester Metropolitan Univ, Sch Comp Math & Digital Technol, Manchester, Lancs, England
[3] Monash Univ, Fac Informat Technol, Clayton, Vic, Australia
[4] Univ New Brunswick, Fac Comp Sci, Fredericton, NB, Canada
[5] Natl Univ Singapore, Dept Comp Sci, Singapore, Singapore
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 79卷
基金
英国工程与自然科学研究理事会;
关键词
Mobile could; Security; Privacy; Applied cryptography; PROXY RE-ENCRYPTION; IDENTITY-BASED ENCRYPTION; SEARCHABLE ENCRYPTION; SECURE; EFFICIENT; MANAGEMENT; SUPPORT; SCHEME;
D O I
10.1016/j.future.2017.06.021
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Bring your own devices have become a new symbol of industrial and education institutional culture to date. A single individual can gain access to personal data anytime at anywhere of his/her workplace due to the advanced WiFi/5G network and cloud technology. The most convenient way for us to access to cloud data is to use personal smartphone. However, smartphone is somewhat vulnerable (because of its innate disadvantage, e.g., low security protection and limited computation resource) while encountering with malicious attacks in open network. Mobile users may be the victims of a recent new type of attack - advanced persistent threat (APT), since attackers may penetrate into different levels of cloud and mobile infrastructures to eavesdrop, steal and temper data. This survey paper introduces some security/privacy risks on mobile cloud in the view point of applied cryptography. Meanwhile, it provides some insights as possible solutions for the risks. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:337 / 349
页数:13
相关论文
共 107 条
[61]   A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing [J].
Liang, Kaitai ;
Au, Man Ho ;
Liu, Joseph K. ;
Susilo, Willy ;
Wong, Duncan S. ;
Yang, Guomin ;
Tran Viet Xuan Phuong ;
Xie, Qi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (10) :1667-1680
[62]   Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts [J].
Liang, Kaitai ;
Chu, Cheng-Kang ;
Tan, Xiao ;
Wong, Duncan S. ;
Tang, Chunming ;
Zhou, Jianying .
THEORETICAL COMPUTER SCIENCE, 2014, 539 :87-105
[63]  
Libert B, 2014, LECT NOTES COMPUT SC, V8383, P592, DOI 10.1007/978-3-642-54631-0_34
[64]   Two-Factor Data Security Protection Mechanism for Cloud Storage System [J].
Liu, Joseph K. ;
Liang, Kaitai ;
Susilo, Willy ;
Liu, Jianghua ;
Xiang, Yang .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (06) :1992-2004
[65]   Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services [J].
Liu, Joseph K. ;
Au, Man Ho ;
Huang, Xinyi ;
Lu, Rongxing ;
Li, Jin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (03) :484-497
[66]   Secure Sharing and Searching for Real-Time Video Data in Mobile Cloud [J].
Liu, Joseph K. ;
Au, Man Ho ;
Susilo, Willy ;
Liang, Kaitai ;
Lu, Rongxing ;
Srinivasan, Bala .
IEEE NETWORK, 2015, 29 (02) :46-50
[67]   Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large UniverseaEuro [J].
Liu, Zhen ;
Wong, Duncan S. .
COMPUTER JOURNAL, 2016, 59 (07) :983-1004
[68]   RCCA-Secure multi-use bidirectional proxy re-encryption with master secret security [J].
Lu, Rongxing ;
Lin, Xiaodong ;
Shao, Jun ;
Liang, Kaitai .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8782 :194-205
[69]   Toward Efficient and Privacy-Preserving Computing in Big Data Era [J].
Lu, Rongxing ;
Zhu, Hui ;
Liu, Ximeng ;
Liu, Joseph K. ;
Shao, Jun .
IEEE NETWORK, 2014, 28 (04) :46-50
[70]   A Data Hiding Approach for Sensitive Smartphone Data [J].
Luo, Chu ;
Fylakis, Angelos ;
Partala, Juha ;
Klakegg, Simon ;
Goncalves, Jorge ;
Liang, Kaitai ;
Seppanen, Tapio ;
Kostakos, Vassilis .
UBICOMP'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING, 2016, :557-568