Security analysis and improvement on resilient storage outsourcing schemes in mobile cloud computing

被引:0
|
作者
Liu, Xiao [1 ]
Jiang, Rui [1 ]
机构
[1] School of Information Science and Engineering, Southeast University, Nanjing 210096, China
关键词
Mobile cloud computing - Public key cryptography - Outsourcing - Security systems - Cobalt compounds - Cloud storage;
D O I
10.3969/j.issn.1003-7985.2012.04.004
中图分类号
学科分类号
摘要
The resilient storage outsourcing schemes in mobile cloud computing are analyzed. It is pointed out that the sharing-based scheme (ShS) has vulnerabilities regarding confidentiality and integrity; meanwhile, the coding-based scheme (CoS) and the encryption-based scheme (EnS) have vulnerabilities on integrity. The corresponding attacks on these vulnerabilities are given. Then, the improved protocols such as the secure sharing-based protocol (SShP), the secure coding-based protocol (SCoP) and the secure encryption-based protocol (SEnP), are proposed to overcome these vulnerabilities. The core elements are protected through public key encryptions and digital signatures. Security analyses show that the confidentiality and the integrity of the improved protocols are guaranteed. Meanwhile, the improved protocols can keep the frame of the former schemes and have higher security. The simulation results illustrate that compared with the existing protocols, the communication overhead of the improved protocols is not significantly increased. © right.
引用
收藏
页码:392 / 397
相关论文
共 50 条
  • [1] Lightweight and Compromise Resilient Storage Outsourcing with Distributed Secure Accessibility in Mobile Cloud Computing
    Wei Ren1
    2.Department of Electronic Engineering
    3.Department of Management Science and Engineering
    Tsinghua Science and Technology, 2011, 16 (05) : 520 - 528
  • [2] SSOP: Secure Storage Outsourcing Protocols in Mobile Cloud Computing
    Liu, Xiao
    Jiang, Rui
    Kong, Huafeng
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 678 - 683
  • [3] Outsourcing Mobile Security in the Cloud
    Hurel, Gaeetan
    Badonnel, Remi
    Lahmadi, Abdelkader
    Festor, Olivier
    MONITORING AND SECURING VIRTUALIZED NETWORKS AND SERVICES, 2014, 8508 : 69 - 73
  • [4] Mobile Cloud Computing: Security Analysis
    Gamlo, Amina H.
    Zhang, Ning
    Bamasag, Omaimah
    2017 5TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD), 2017, : 191 - 198
  • [5] COMPARISON OF DATA SECURITY SCHEMES FRAMEWORK FOR MOBILE CLOUD COMPUTING
    Chauhan, Sumant Raj
    Kumar, Pankaj
    Bali, Vikram
    ADVANCES AND APPLICATIONS IN MATHEMATICAL SCIENCES, 2019, 18 (08): : 767 - 774
  • [6] A Study of Incremental Cryptography for Security Schemes in Mobile Cloud Computing Environments
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Khan, Samee U.
    Madani, Sajjad A.
    Khan, Atta Ur Rehman
    2013 IEEE SYMPOSIUM ON WIRELESS TECHNOLOGY & APPLICATIONS (ISWTA2013), 2013, : 62 - 67
  • [7] Resilient Collaboration for Mobile Cloud Computing
    Guetmi, Nadir
    Mechaoui, Moulay Driss
    Imine, Abdessamad
    ERCIM NEWS, 2015, (102): : 47 - 48
  • [8] Security Analysis of Cloud Computing in the Mobile Internet Environment
    Luo Mingwan
    PROCEEDINGS OF THE 2016 3RD INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING, MANUFACTURING TECHNOLOGY AND CONTROL, 2016, 67 : 1699 - 1705
  • [9] Study on Mobile Large Data Storage Security in Cloud Computing Environment
    Li, Xianwei
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 77 - 81
  • [10] Mobile cloud computing: Architecture and Security
    Wang, Suzhen
    Du, Zhijuan
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2274 - 2281