BSS: block-based sharing scheme for secure data storage services in mobile cloud environment

被引:43
|
作者
Khan, Abdul Nasir [1 ,3 ]
Kiah, M. L. Mat [1 ]
Ali, Mazhar [2 ]
Madani, Sajjad A. [3 ]
Khan, Atta Ur Rehman [1 ]
Shamshirband, Shahaboddin [4 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur, Malaysia
[2] N Dakota State Univ, Dept Elect & Comp Engn, Fargo, ND 58105 USA
[3] COMSATS Inst Informat Technol, Abbottabad, Pakistan
[4] IAUM, Mashhad, Iran
来源
JOURNAL OF SUPERCOMPUTING | 2014年 / 70卷 / 02期
关键词
Cloud computing; Mobile cloud computing; Security; Privacy; PROXY RE-ENCRYPTION;
D O I
10.1007/s11227-014-1269-8
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
For the last few years, academia and research organizations are continuously investigating and resolving the security and privacy issues of mobile cloud computing environment. The additional consideration in designing security services for mobile cloud computing environment should be the resource-constrained mobile devices. The execution of computationally intensive security services on mobile device consumes battery's charging quickly. In this regard, the study presents a novel energy-efficient block-based sharing scheme that provides confidentiality and integrity services for mobile users in the cloud environment. The block-based sharing scheme is compared with the existing schemes on the basis of energy consumption, CPU utilization, memory utilization, encryption time, decryption time, and turnaround time. The experimental results show that the block-based sharing scheme consumes less energy, reduces the resources utilization, improves response time, and provides better security services to the mobile users in the presence of fully untrusted cloud server(s) as compared to the existing security schemes.
引用
收藏
页码:946 / 976
页数:31
相关论文
共 50 条
  • [21] Secure Cloud-Storage-Based Big Data Analytics Scheme for Intelligent Vehicles Environment
    Agrawal, Saurabh
    Tekchandani, Prakash
    Banerjee, Soumya
    Das, Ashok Kumar
    Pal, Shantanu
    Shetty, Sachin
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (07): : 7828 - 7845
  • [22] A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage
    Xin Wang
    Bo Yang
    Zhe Xia
    Hong-xia Hou
    Frontiers of Information Technology & Electronic Engineering, 2019, 20 : 787 - 800
  • [23] A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage
    Wang, Xin
    Yang, Bo
    Xia, Zhe
    Hou, Hong-xia
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2019, 20 (06) : 787 - 800
  • [24] Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
    Liu, Qin
    Wang, Guojun
    Wu, Jie
    INFORMATION SCIENCES, 2014, 258 : 355 - 370
  • [25] Secure Data Deduplication Scheme Using Linkage of Data Blocks in Cloud Storage Environment
    Kim, Won-Bin
    Lee, Im-Yeong
    ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING, MUE/FUTURETECH 2018, 2019, 518 : 539 - 545
  • [26] A Secure and Efficient Data Sharing Scheme with Outsourced Signcryption and Decryption in Mobile Cloud Computing
    Fugkeaw, Somchart
    2021 IEEE INTERNATIONAL CONFERENCE ON JOINT CLOUD COMPUTING (JCC 2021) / 2021 9TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2021), 2021, : 72 - 79
  • [27] A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing
    Li, Haifeng
    Lan, Caihui
    Fu, Xingbing
    Wang, Caifen
    Li, Fagen
    Guo, He
    SENSORS, 2020, 20 (17) : 1 - 17
  • [28] A secure re-encryption scheme for data services in a cloud computing environment
    Xiong, Lizhi
    Xu, Zhengquan
    Xu, Yanyan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (17): : 4573 - 4585
  • [29] Secure Cloud Storage and Search Scheme for Mobile Devices
    Awad, Abir
    Matthews, Adrian
    Lee, Brian
    2014 17TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE (MELECON), 2014, : 144 - 150
  • [30] A Cryptography and Machine Learning Based Authentication for Secure Data-Sharing in Federated Cloud Services Environment
    Singh, Ashutosh Kumar
    Saxena, Deepika
    JOURNAL OF APPLIED SECURITY RESEARCH, 2022, 17 (03) : 385 - 412