Security analysis and improvement on resilient storage outsourcing schemes in mobile cloud computing

被引:0
|
作者
Liu, Xiao [1 ]
Jiang, Rui [1 ]
机构
[1] School of Information Science and Engineering, Southeast University, Nanjing 210096, China
关键词
Mobile cloud computing - Public key cryptography - Outsourcing - Security systems - Cobalt compounds - Cloud storage;
D O I
10.3969/j.issn.1003-7985.2012.04.004
中图分类号
学科分类号
摘要
The resilient storage outsourcing schemes in mobile cloud computing are analyzed. It is pointed out that the sharing-based scheme (ShS) has vulnerabilities regarding confidentiality and integrity; meanwhile, the coding-based scheme (CoS) and the encryption-based scheme (EnS) have vulnerabilities on integrity. The corresponding attacks on these vulnerabilities are given. Then, the improved protocols such as the secure sharing-based protocol (SShP), the secure coding-based protocol (SCoP) and the secure encryption-based protocol (SEnP), are proposed to overcome these vulnerabilities. The core elements are protected through public key encryptions and digital signatures. Security analyses show that the confidentiality and the integrity of the improved protocols are guaranteed. Meanwhile, the improved protocols can keep the frame of the former schemes and have higher security. The simulation results illustrate that compared with the existing protocols, the communication overhead of the improved protocols is not significantly increased. © right.
引用
收藏
页码:392 / 397
相关论文
共 50 条
  • [31] Cheating-Resilient Bandwidth Distribution in Mobile Cloud Computing
    Das, Snigdha
    Khatua, Manas
    Misra, Sudip
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (02) : 469 - 482
  • [32] Design of Security Solution to Mobile Cloud Storage
    Yu, Xiaojun
    Wen, Qiaoyan
    KNOWLEDGE DISCOVERY AND DATA MINING, 2012, 135 : 255 - 263
  • [33] A study on virtual machine deployment for application outsourcing in mobile cloud computing
    Muhammad Shiraz
    Saeid Abolfazli
    Zohreh Sanaei
    Abdullah Gani
    The Journal of Supercomputing, 2013, 63 : 946 - 964
  • [34] ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing
    Zhou, Kai
    Afifi, M. H.
    Ren, Jian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) : 2518 - 2531
  • [35] A study on virtual machine deployment for application outsourcing in mobile cloud computing
    Shiraz, Muhammad
    Abolfazli, Saeid
    Sanaei, Zohreh
    Gani, Abdullah
    JOURNAL OF SUPERCOMPUTING, 2013, 63 (03): : 946 - 964
  • [36] Analysis and measurement of data broadcast schemes on error prone wireless link for resilient mobile computing
    Jeong, EJ
    Lim, SH
    Kim, JH
    CIC'2000: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN COMPUTING, 2000, : 135 - 140
  • [37] Security Issues of Mobile Application Using Cloud Computing
    Cimler, Richard
    Matyska, Jan
    Balik, Ladislav
    Horalek, Josef
    Sobeslav, Vladimir
    AFRO-EUROPEAN CONFERENCE FOR INDUSTRIAL ADVANCEMENT, AECIA 2014, 2015, 334 : 347 - 357
  • [38] An Efficient Model for Privacy and Security in Mobile Cloud Computing
    Ragini
    Mehrotra, Parul
    Venkatesan, S.
    2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
  • [39] A Review and a Classifications of Mobile Cloud Computing Security Issues
    Al Ladan, Mohamad Ibrahim
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 214 - 222
  • [40] Mobile Cloud Computing: Architecture, Advantages and Security Issues
    Fellah, Hadjer
    Mezioud, Chaker
    Batouche, Mohamed Chaouki
    3RD INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEM & SECURITY (NISS'20), 2020,