A Study of Incremental Cryptography for Security Schemes in Mobile Cloud Computing Environments

被引:0
|
作者
Khan, Abdul Nasir [1 ]
Kiah, M. L. Mat [1 ]
Khan, Samee U. [2 ]
Madani, Sajjad A. [3 ]
Khan, Atta Ur Rehman [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & IT, Kuala Lumpur, Malaysia
[2] North Dakota State Univ, Dept Elect & Comp Engn, Fargo, ND USA
[3] COMSATS Inst Informat Technol, Dept Comp Sci, Abbottabad, Pakistan
来源
2013 IEEE SYMPOSIUM ON WIRELESS TECHNOLOGY & APPLICATIONS (ISWTA2013) | 2013年
关键词
cloud computing; mobile cloud computing; security; privacy;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
While using the cloud storage services on resource constraint mobile device, the mobile user needs to ensure the confidentiality of the critical data before uploading on the cloud storage. The resource limitation of mobile devices restricts mobile users for executing complex security operations using computational power of mobile devices. To make security schemes suitable for mobile devices, large volume of existing security schemes execute complex security operations remotely on cloud or trusted third party. Alternatively, few of the existing security schemes focus on the reduction of the computational complexity of the cryptographic algorithms. Keeping in view the resource limitation of mobile devices, this paper, introduces an incremental cryptographic version of the existing security schemes, such as encryption-based scheme, coding-based scheme, and sharing-based scheme, for improving the block(s) modification operations in term of resource utilization on mobile device. The experimental results show significant improvement in resource utilization on mobile device while performing block insertion, deletion, and modification operations as compared to the original version of the aforementioned schemes.
引用
收藏
页码:62 / 67
页数:6
相关论文
共 50 条
  • [31] Security Issues and Challenges of Mobile Cloud Computing
    Shahzad, Abid
    Hussain, Mureed
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2013, 6 (06): : 37 - 49
  • [32] Guest Editorial: Security in Mobile Computing Environments
    Jari Veijalainen
    Ari Visa
    Mobile Networks and Applications, 2003, 8 : 111 - 112
  • [33] Study on Mobile Large Data Storage Security in Cloud Computing Environment
    Li, Xianwei
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 77 - 81
  • [34] Security on Cloud Computing Using Split Algorithm Along with Cryptography and Steganography
    Garg, Priyansha
    Sharma, Moolchand
    Agrawal, Shivani
    Kumar, Yastika
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 71 - 79
  • [35] A Novel Scheme for Data Security in Cloud Computing using Quantum Cryptography
    Sharma, Geeta
    Kalra, Sheetal
    INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION COMMUNICATION TECHNOLOGY & COMPUTING, 2016, 2016,
  • [36] MOBDroid: An Intelligent Malware Detection System for Improved Data Security in Mobile Cloud Computing Environments
    Ogwara, Noah Oghenefego
    Petrova, Krassie
    Yang, Mee Loong Bobby
    2020 30TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2020, : 121 - 126
  • [37] Security in Cloud Computing Systems A Review of Challenges and Solutions for Security in Distributed Computing Environments
    Srivastava, Stuti
    Sudhish, Prem Sewak
    PROCEEDINGS OF THE 2015 39TH NATIONAL SYSTEMS CONFERENCE (NSC), 2015,
  • [38] A novel security mechanism using AES cryptography approach in cloud computing
    Muthulakshmi, B.
    Venkatesulu, M.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (06)
  • [39] PSR: An Improvement of Lightweight Cryptography Algorithm for Data Security in Cloud Computing
    Chandra, P. Sri Ram
    Rao, p Syamala
    Naresh, K.
    Malladi, Ravisankar
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2025, 16 (01) : 1053 - 1058
  • [40] Data and infrastructure security auditing in cloud computing environments
    Rasheed, Hassan
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2014, 34 (03) : 364 - 368