Title :
A study of incremental cryptography for security schemes in mobile cloud computing environments
Author :
Khan, A. Nayeemulla ; Kiah, M. L. Mat ; Khan, Samee U. ; Madani, Sajjad Ahmad ; Khan, Ab Rouf
Author_Institution :
Fac. of Comput. Sci. & IT, Univ. of Malaya, Kuala Lumpur, Malaysia
Abstract :
While using the cloud storage services on resource constraint mobile device, the mobile user needs to ensure the confidentiality of the critical data before uploading on the cloud storage. The resource limitation of mobile devices restricts mobile users for executing complex security operations using computational power of mobile devices. To make security schemes suitable for mobile devices, large volume of existing security schemes execute complex security operations remotely on cloud or trusted third party. Alternatively, few of the existing security schemes focus on the reduction of the computational complexity of the cryptographic algorithms. Keeping in view the resource limitation of mobile devices, this paper, introduces an incremental cryptographic version of the existing security schemes, such as encryption-based scheme, coding-based scheme, and sharing-based scheme, for improving the block(s) modification operations in term of resource utilization on mobile device. The experimental results show significant improvement in resource utilization on mobile device while performing block insertion, deletion, and modification operations as compared to the original version of the aforementioned schemes.
Keywords :
cloud computing; cryptography; smart phones; telecommunication security; cloud storage services; coding based scheme; computational complexity; cryptographic algorithms; encryption based scheme; incremental cryptography; mobile cloud computing environments; mobile devices; resource constraint mobile device; resource utilization; security schemes; sharing based scheme; trusted third party; Cloud computing; Encryption; Message authentication; Mobile communication; Mobile handsets; cloud computing; mobile cloud computing; privacy; security;
Conference_Titel :
Wireless Technology and Applications (ISWTA), 2013 IEEE Symposium on
Conference_Location :
Kuching
Print_ISBN :
978-1-4799-0155-5
DOI :
10.1109/ISWTA.2013.6688818