BSS: block-based sharing scheme for secure data storage services in mobile cloud environment

被引:43
作者
Khan, Abdul Nasir [1 ,3 ]
Kiah, M. L. Mat [1 ]
Ali, Mazhar [2 ]
Madani, Sajjad A. [3 ]
Khan, Atta Ur Rehman [1 ]
Shamshirband, Shahaboddin [4 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur, Malaysia
[2] N Dakota State Univ, Dept Elect & Comp Engn, Fargo, ND 58105 USA
[3] COMSATS Inst Informat Technol, Abbottabad, Pakistan
[4] IAUM, Mashhad, Iran
关键词
Cloud computing; Mobile cloud computing; Security; Privacy; PROXY RE-ENCRYPTION;
D O I
10.1007/s11227-014-1269-8
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
For the last few years, academia and research organizations are continuously investigating and resolving the security and privacy issues of mobile cloud computing environment. The additional consideration in designing security services for mobile cloud computing environment should be the resource-constrained mobile devices. The execution of computationally intensive security services on mobile device consumes battery's charging quickly. In this regard, the study presents a novel energy-efficient block-based sharing scheme that provides confidentiality and integrity services for mobile users in the cloud environment. The block-based sharing scheme is compared with the existing schemes on the basis of energy consumption, CPU utilization, memory utilization, encryption time, decryption time, and turnaround time. The experimental results show that the block-based sharing scheme consumes less energy, reduces the resources utilization, improves response time, and provides better security services to the mobile users in the presence of fully untrusted cloud server(s) as compared to the existing security schemes.
引用
收藏
页码:946 / 976
页数:31
相关论文
共 35 条
  • [11] [Anonymous], GOOGLE CLOUD STORAGE
  • [12] Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
  • [13] Meetings through the cloud: Privacy-preserving scheduling on mobile devices
    Bilogrevic, Igor
    Jadliwala, Murtuza
    Kumar, Praveen
    Walia, Sudeep Singh
    Hubaux, Jean-Pierre
    Aad, Imad
    Niemi, Valtteri
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (11) : 1910 - 1927
  • [14] Satisfiability Modulo Theories: An Appetizer
    de Moura, Leonardo
    Bjorner, Nikolaj
    [J]. FORMAL METHODS: FOUNDATIONS AND APPLICATIONS, 2009, 5902 : 23 - 36
  • [15] Dijiang Huang, 2011, IEEE INFOCOM 2011 - IEEE Conference on Computer Communications. Workshops, P614, DOI 10.1109/INFCOMW.2011.5928886
  • [16] Dijiang Huang, 2010, 2010 Fifth International Symposium on Service Oriented System Engineering (SOSE 2010), P27, DOI 10.1109/SOSE.2010.20
  • [17] Fox A., 2009, Above the clouds: A Berkeley view of cloud computing, P28
  • [18] Itani W., 2010, P IEEE INT C ENERGY, P1
  • [19] Provable Data Possession of Resource-Constrained Mobile Devices in Cloud Computing
    Yang, Jian
    Wang, Haihang
    Wang, Jian
    Tan, Chengxiang
    Yu, Dingguo
    [J]. Journal of Networks, 2011, 6 (07) : 1033 - 1040
  • [20] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Madani, Sajjad A.
    Ali, Mazhar
    Khan, Atta Ur Rehman
    Shamshirband, Shahaboddin
    [J]. JOURNAL OF SUPERCOMPUTING, 2014, 68 (02) : 624 - 651