Incremental proxy re-encryption scheme for mobile cloud computing environment

被引:72
|
作者
Khan, Abdul Nasir [1 ]
Kiah, M. L. Mat [1 ]
Madani, Sajjad A. [2 ]
Ali, Mazhar [3 ]
Khan, Atta Ur Rehman [1 ]
Shamshirband, Shahaboddin [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur, Malaysia
[2] COMSATS Inst Informat Technol, Dept Comp Sci, Islamabad, Pakistan
[3] N Dakota State Univ, Dept Elect & Comp Engn, Fargo, ND 58105 USA
来源
JOURNAL OF SUPERCOMPUTING | 2014年 / 68卷 / 02期
关键词
Cloud computing; Mobile cloud computing; Security; Privacy;
D O I
10.1007/s11227-013-1055-z
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the limited computational capability of mobile devices, the research organization and academia are working on computationally secure schemes that have capability for offloading the computational intensive data access operations on the cloud/trusted entity for execution. Most of the existing security schemes, such as proxy re-encryption, manager-based re-encryption, and cloud-based re-encryption, are based on El-Gamal cryptosystem for offloading the computational intensive data access operation on the cloud/trusted entity. However, the resource hungry pairing-based cryptographic operations, such as encryption and decryption, are executed using the limited computational power of mobile device. Similarly, if the data owner wants to modify the encrypted file uploaded on the cloud storage, after modification the data owner must encrypt and upload the entire file on the cloud storage without considering the altered portion(s) of the file. In this paper, we have proposed an incremental version of proxy re-encryption scheme for improving the file modification operation and compared with the original version of the proxy re-encryption scheme on the basis of turnaround time, energy consumption, CPU utilization, and memory consumption while executing the security operations on mobile device. The incremental version of proxy re-encryption scheme shows significant improvement in results while performing file modification operations using limited processing capability of mobile devices.
引用
收藏
页码:624 / 651
页数:28
相关论文
共 50 条
  • [21] Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing
    Luo, Wei
    Ma, Wenping
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : 541 - 551
  • [22] Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing
    Wei Luo
    Wenping Ma
    Cluster Computing, 2019, 22 : 541 - 551
  • [23] A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing
    Li, Juyan
    Qiao, Zhiqi
    Zhang, Kejia
    Cui, Chen
    SENSORS, 2021, 21 (01) : 1 - 20
  • [24] Identity-Based Proxy Re-encryption over NTRU Lattices for Cloud Computing
    Yue, Na
    Wang, Yang
    Wang, Mingqiang
    2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 : 264 - 269
  • [25] A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing
    Chen, Zhenhua
    Li, Shundong
    Guo, Yimin
    Wang, Yilei
    Chu, Yunjie
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 82 - 95
  • [26] Anonymous attribute-based proxy re-encryption for access control in cloud computing
    Zhang, Yinghui
    Li, Jin
    Chen, Xiaofeng
    Li, Hui
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2397 - 2411
  • [27] POSTER: A Certificateless Proxy Re-Encryption Scheme for Cloud-based Data Sharing
    Wu, Xiaoxin
    Xu, Lei
    Zhang, Xinwen
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 869 - 871
  • [28] Proxy Re-Encryption Scheme Supporting a Selection of Delegatees
    Devigne, Julien
    Guerrini, Eleonora
    Laguillaumie, Fabien
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 13 - 30
  • [29] Assured Update Scheme of Authorization for Cloud Data Access Based on Proxy Re-encryption
    Su M.
    Wu B.
    Fu A.-M.
    Yu Y.
    Zhang G.-X.
    Su, Mang (sumang@njust.edu.cn), 1600, Chinese Academy of Sciences (31): : 1563 - 1572
  • [30] Proxy re-encryption based multi-factor access control scheme in cloud
    Su M.
    Shi G.
    Fu A.
    Yu Y.
    Jin W.
    Tongxin Xuebao/Journal on Communications, 2018, 39 (02): : 93 - 101