A Study of Incremental Cryptography for Security Schemes in Mobile Cloud Computing Environments

被引:0
|
作者
Khan, Abdul Nasir [1 ]
Kiah, M. L. Mat [1 ]
Khan, Samee U. [2 ]
Madani, Sajjad A. [3 ]
Khan, Atta Ur Rehman [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & IT, Kuala Lumpur, Malaysia
[2] North Dakota State Univ, Dept Elect & Comp Engn, Fargo, ND USA
[3] COMSATS Inst Informat Technol, Dept Comp Sci, Abbottabad, Pakistan
关键词
cloud computing; mobile cloud computing; security; privacy;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
While using the cloud storage services on resource constraint mobile device, the mobile user needs to ensure the confidentiality of the critical data before uploading on the cloud storage. The resource limitation of mobile devices restricts mobile users for executing complex security operations using computational power of mobile devices. To make security schemes suitable for mobile devices, large volume of existing security schemes execute complex security operations remotely on cloud or trusted third party. Alternatively, few of the existing security schemes focus on the reduction of the computational complexity of the cryptographic algorithms. Keeping in view the resource limitation of mobile devices, this paper, introduces an incremental cryptographic version of the existing security schemes, such as encryption-based scheme, coding-based scheme, and sharing-based scheme, for improving the block(s) modification operations in term of resource utilization on mobile device. The experimental results show significant improvement in resource utilization on mobile device while performing block insertion, deletion, and modification operations as compared to the original version of the aforementioned schemes.
引用
收藏
页码:62 / 67
页数:6
相关论文
共 50 条
  • [1] On incremental cache coherency schemes in mobile computing environments
    Cai, J
    Tan, KL
    Ooi, BC
    13TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING - PROCEEDINGS, 1997, : 114 - 123
  • [2] Comparative study of cryptography for cloud computing for data security
    Mathur P.
    Gupta A.K.
    Vashishtha P.
    Recent Advances in Computer Science and Communications, 2021, 14 (05) : 1508 - 1513
  • [3] COMPARISON OF DATA SECURITY SCHEMES FRAMEWORK FOR MOBILE CLOUD COMPUTING
    Chauhan, Sumant Raj
    Kumar, Pankaj
    Bali, Vikram
    ADVANCES AND APPLICATIONS IN MATHEMATICAL SCIENCES, 2019, 18 (08): : 767 - 774
  • [4] Cryptography and Data Security in Cloud Computing
    Yan, Zheng
    Deng, Robert H.
    Varadharajan, Vijay
    INFORMATION SCIENCES, 2017, 387 : 53 - 55
  • [5] Enhancing Data and Privacy Security in Mobile Cloud Computing through Quantum Cryptography
    Han, Jiawei
    Liu, Yanheng
    Sun, Xin
    Song, Lijun
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 398 - 401
  • [6] Cognitive cryptography for data security in cloud computing
    Ogiela, Urszula
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (18):
  • [7] A Hybrid Cryptography Algorithm for Cloud Computing Security
    Timothy, Divya Prathana
    Santra, Ajit Kumar
    2017 INTERNATIONAL CONFERENCE ON MICROELECTRONIC DEVICES, CIRCUITS AND SYSTEMS (ICMDCS), 2017,
  • [8] Cryptography & Security implementation in Network Computing Environments
    Pandey, Rajanikant
    Pandey, Vinay Kumar
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3136 - 3140
  • [9] Cloud computing for mobile environments
    Jeong, Hwa-Young
    Rana, Omer F.
    Hsu, Ching-Hsien
    Jeong, Young-Sik
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (10): : 2753 - 2755
  • [10] Quantum cryptography technique: A way to improve security challenges in mobile cloud computing (MCC)
    Abidin, Shafiqul
    Swami, Amit
    Ramirez-Asis, Edwin
    Alvarado-Tolentino, Joseph
    Maurya, Rajesh Kumar
    Hussain, Naziya
    MATERIALS TODAY-PROCEEDINGS, 2022, 51 : 508 - 514