DocumentCode :
2878208
Title :
A Light-Weight Permutation Based Method for Data Privacy in Mobile Cloud Computing
Author :
Bahrami, Mehdi ; Singhal, Mukesh
Author_Institution :
Cloud Lab., Univ. of California, Merced, Merced, CA, USA
fYear :
2015
fDate :
March 30 2015-April 3 2015
Firstpage :
189
Lastpage :
198
Abstract :
Cloud computing paradigm provides virtual IT infrastructures with a set of resources that are shared with multi-tenant users. Data Privacy is one of the major challenges when users outsource their data to a cloud computing system. Privacy can be violated by the cloud vendor, vendor´s authorized users, other cloud users, unauthorized users, or external malicious entities. Encryption is one of the solutions to protect and maintain privacy of cloud-stored data. However, encryption methods are complex and expensive for mobile devices. In this paper, we propose a new light-weight method for mobile clients to store data on one or multiple clouds by using pseudo-random permutation based on chaos systems. The proposed method can be used in the client mobile devices to store data in the cloud(s) without using cloud computing resources for encryption to maintain user´s privacy. We consider JPEG image format as a case study to present and evaluate the proposed method. Our experimental results show that the proposed method achieve superior performance compared to over encryption methods, such as AES and encryption on JPEG encoders while protecting the mobile user data privacy. We review major security attack scenarios against the proposed method that shows the level of security.
Keywords :
authorisation; cloud computing; cryptography; data privacy; image coding; mobile computing; mobile handsets; AES; JPEG encoders; JPEG image format; cloud computing paradigm; cloud users; cloud vendor; cloud-stored data; data privacy; encryption methods; external malicious entities; light-weight method; light-weight permutation based method; mobile clients; mobile cloud computing; mobile devices; privacy maintain; security attack scenarios; unauthorized users; vendor authorized users; virtual IT infrastructures; Chaos; Cloud computing; Data privacy; Encryption; Mobile communication; Mobile handsets; Transform coding; Chaos System; Data storage; JPEG encryption; Mobile Cloud Computing; Permutation; Privacy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015 3rd IEEE International Conference on
Conference_Location :
San Francisco, CA
Type :
conf
DOI :
10.1109/MobileCloud.2015.36
Filename :
7130886
Link To Document :
بازگشت