Security analysis and improvement on resilient storage outsourcing schemes in mobile cloud computing

被引:0
|
作者
Liu, Xiao [1 ]
Jiang, Rui [1 ]
机构
[1] School of Information Science and Engineering, Southeast University, Nanjing 210096, China
关键词
Mobile cloud computing - Public key cryptography - Outsourcing - Security systems - Cobalt compounds - Cloud storage;
D O I
10.3969/j.issn.1003-7985.2012.04.004
中图分类号
学科分类号
摘要
The resilient storage outsourcing schemes in mobile cloud computing are analyzed. It is pointed out that the sharing-based scheme (ShS) has vulnerabilities regarding confidentiality and integrity; meanwhile, the coding-based scheme (CoS) and the encryption-based scheme (EnS) have vulnerabilities on integrity. The corresponding attacks on these vulnerabilities are given. Then, the improved protocols such as the secure sharing-based protocol (SShP), the secure coding-based protocol (SCoP) and the secure encryption-based protocol (SEnP), are proposed to overcome these vulnerabilities. The core elements are protected through public key encryptions and digital signatures. Security analyses show that the confidentiality and the integrity of the improved protocols are guaranteed. Meanwhile, the improved protocols can keep the frame of the former schemes and have higher security. The simulation results illustrate that compared with the existing protocols, the communication overhead of the improved protocols is not significantly increased. © right.
引用
收藏
页码:392 / 397
相关论文
共 50 条
  • [41] Addressing Mobile Cloud Computing Security Issues: A Survey
    Kulkarni, Pallavi
    Khanai, Rajashri
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 1463 - 1467
  • [42] Security of Mobile Cloud Computing: A Systematic Mapping Study
    Jara Juarez, Diego X.
    Cedillo, Priscila
    2017 IEEE SECOND ECUADOR TECHNICAL CHAPTERS MEETING (ETCM), 2017,
  • [43] Security in Cloud-Computing-Based Mobile Health
    Albuquerque, Silas L.
    Gondim, Paulo R. L.
    IT PROFESSIONAL, 2016, 18 (03) : 37 - 44
  • [44] Research on the Data Storage Security based on Cloud Computing
    Ma, Xinqiang
    Huang, Yi
    Zhang, Yongdan
    Liu, Youyuan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 326 - 331
  • [45] Study on Strategy of Cloud Computing Data Storage Security
    Liu, Sha
    Zhu, Shuhua
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 64 - 67
  • [46] A Framework to Ensure Data Storage Security in Cloud Computing
    Sarkar, Mrinal Kanti
    Kumar, Sanjay
    2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON), 2016,
  • [47] A Study on Data Storage Security Issues in Cloud Computing
    Vurukonda, Naresh
    Rao, B. Thirumala
    2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, COMMUNICATION & CONVERGENCE, ICCC 2016, 2016, 92 : 128 - 135
  • [48] Analysis on Cloud Computing and its Security
    Liu Xiao-hui
    Song Xin-fang
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 839 - 842
  • [49] Analysis of cloud computing and information security
    Kenan, Wang
    Shao, Qian
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 3810 - 3813
  • [50] An analysis of security issues for cloud computing
    Hashizume, Keiko
    Rosado, David G.
    Fernandez-Medina, Eduardo
    Fernandez, Eduardo B.
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2013, 4 (01) : 1 - 13