DocumentCode :
78629
Title :
Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds
Author :
Tysowski, P.K. ; Hasan, M. Anwar
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada
Volume :
1
Issue :
2
fYear :
2013
fDate :
July-December 2013
Firstpage :
172
Lastpage :
186
Abstract :
Outsourcing data to the cloud are beneficial for reasons of economy, scalability, and accessibility, but significant technical challenges remain. Sensitive data stored in the cloud must be protected from being read in the clear by a cloud provider that is honest-but-curious. Additionally, cloud-based data are increasingly being accessed by resource-constrained mobile devices for which the processing and communication cost must be minimized. Novel modifications to attribute-based encryption are proposed to allow authorized users access to cloud data based on the satisfaction of required attributes such that the higher computational load from cryptographic operations is assigned to the cloud provider and the total communication cost is lowered for the mobile user. Furthermore, data re-encryption may be optionally performed by the cloud provider to reduce the expense of user revocation in a mobile user environment while preserving the privacy of user data stored in the cloud. The proposed protocol has been realized on commercially popular mobile and cloud platforms to demonstrate real-world benchmarks that show the efficacy of the scheme. A simulation calibrated with the benchmark results shows the scalability potential of the scheme in the context of a realistic workload in a mobile cloud computing system.
Keywords :
cloud computing; cryptography; data privacy; mobile computing; cloud-based data; cryptographic operations; hybrid attribute-and re-encryption-based key management; mobile cloud computing system; mobile user environment; resource-constrained mobile devices; scalable mobile applications; secure mobile applications; user data privacy protection; Cloud computing; Computational modeling; Computer security; Encryption; Mobile communication; Outsourcing; Scalability; Distributed computing; cryptography; mobile computing; scalability; security;
fLanguage :
English
Journal_Title :
Cloud Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
2168-7161
Type :
jour
DOI :
10.1109/TCC.2013.11
Filename :
6654173
Link To Document :
بازگشت