Incremental proxy re-encryption scheme for mobile cloud computing environment

被引:72
|
作者
Khan, Abdul Nasir [1 ]
Kiah, M. L. Mat [1 ]
Madani, Sajjad A. [2 ]
Ali, Mazhar [3 ]
Khan, Atta Ur Rehman [1 ]
Shamshirband, Shahaboddin [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur, Malaysia
[2] COMSATS Inst Informat Technol, Dept Comp Sci, Islamabad, Pakistan
[3] N Dakota State Univ, Dept Elect & Comp Engn, Fargo, ND 58105 USA
来源
JOURNAL OF SUPERCOMPUTING | 2014年 / 68卷 / 02期
关键词
Cloud computing; Mobile cloud computing; Security; Privacy;
D O I
10.1007/s11227-013-1055-z
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the limited computational capability of mobile devices, the research organization and academia are working on computationally secure schemes that have capability for offloading the computational intensive data access operations on the cloud/trusted entity for execution. Most of the existing security schemes, such as proxy re-encryption, manager-based re-encryption, and cloud-based re-encryption, are based on El-Gamal cryptosystem for offloading the computational intensive data access operation on the cloud/trusted entity. However, the resource hungry pairing-based cryptographic operations, such as encryption and decryption, are executed using the limited computational power of mobile device. Similarly, if the data owner wants to modify the encrypted file uploaded on the cloud storage, after modification the data owner must encrypt and upload the entire file on the cloud storage without considering the altered portion(s) of the file. In this paper, we have proposed an incremental version of proxy re-encryption scheme for improving the file modification operation and compared with the original version of the proxy re-encryption scheme on the basis of turnaround time, energy consumption, CPU utilization, and memory consumption while executing the security operations on mobile device. The incremental version of proxy re-encryption scheme shows significant improvement in results while performing file modification operations using limited processing capability of mobile devices.
引用
收藏
页码:624 / 651
页数:28
相关论文
共 50 条
  • [31] Conditional Proxy Re-Encryption for Secure Big Data Group Sharing in Cloud Environment
    Son, Junggab
    Kim, Donghyun
    Hussain, Rasheed
    Oh, Heekuck
    2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 541 - 546
  • [32] EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption
    Wei, Guiyi
    Lu, Rongxing
    Shao, Jun
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (08) : 1549 - 1562
  • [33] An Improved Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme
    Wang, Changji
    Fang, Jian
    Li, Yuan
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 14 - 26
  • [34] An improved proxy re-encryption scheme using resource optimization and authentication protocol
    Burra, Vijaya Babu
    Pachala, Sunitha
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2023,
  • [35] Attribute-Based Keyword Search with Proxy Re-Encryption in the Cloud
    Chen, Yanli
    Hu, Yuanyuan
    Zhu, Minhui
    Yang, Geng
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2018, E101B (08) : 1798 - 1808
  • [36] Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing
    王亮亮
    陈克非
    毛贤平
    王永涛
    JournalofShanghaiJiaotongUniversity(Science), 2014, 19 (04) : 398 - 405
  • [37] A Cloud-Assisted Proxy Re-Encryption Scheme for Efficient Data Sharing Across IoT Systems
    Muthukumaran, V
    Ezhilmaran, D.
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2020, 15 (04) : 18 - 36
  • [38] CL-PRE: a Certificateless Proxy Re-Encryption Scheme for Secure Data Sharing with Public Cloud
    Xu, Lei
    Wu, Xiaoxin
    Zhang, Xinwen
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [39] Secure Data Sharing in the Cloud Through Proxy Re-Encryption Technique
    Adilakshmi, Jyothi
    Rithika, Badgoian
    Pushpalatha, Chitikela
    Venkatesh, Thurpati
    Lohitha, Mandapati
    2024 4TH INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2024, 2024, : 700 - 705
  • [40] Dynamic Encrypted Data Sharing Scheme Based on Conditional Proxy Broadcast Re-Encryption for Cloud Storage
    Jiang, Linmei
    Guo, Donghui
    IEEE ACCESS, 2017, 5 : 13336 - 13345