• DocumentCode
    657488
  • Title

    A study of incremental cryptography for security schemes in mobile cloud computing environments

  • Author

    Khan, A. Nayeemulla ; Kiah, M. L. Mat ; Khan, Samee U. ; Madani, Sajjad Ahmad ; Khan, Ab Rouf

  • Author_Institution
    Fac. of Comput. Sci. & IT, Univ. of Malaya, Kuala Lumpur, Malaysia
  • fYear
    2013
  • fDate
    22-25 Sept. 2013
  • Firstpage
    62
  • Lastpage
    67
  • Abstract
    While using the cloud storage services on resource constraint mobile device, the mobile user needs to ensure the confidentiality of the critical data before uploading on the cloud storage. The resource limitation of mobile devices restricts mobile users for executing complex security operations using computational power of mobile devices. To make security schemes suitable for mobile devices, large volume of existing security schemes execute complex security operations remotely on cloud or trusted third party. Alternatively, few of the existing security schemes focus on the reduction of the computational complexity of the cryptographic algorithms. Keeping in view the resource limitation of mobile devices, this paper, introduces an incremental cryptographic version of the existing security schemes, such as encryption-based scheme, coding-based scheme, and sharing-based scheme, for improving the block(s) modification operations in term of resource utilization on mobile device. The experimental results show significant improvement in resource utilization on mobile device while performing block insertion, deletion, and modification operations as compared to the original version of the aforementioned schemes.
  • Keywords
    cloud computing; cryptography; smart phones; telecommunication security; cloud storage services; coding based scheme; computational complexity; cryptographic algorithms; encryption based scheme; incremental cryptography; mobile cloud computing environments; mobile devices; resource constraint mobile device; resource utilization; security schemes; sharing based scheme; trusted third party; Cloud computing; Encryption; Message authentication; Mobile communication; Mobile handsets; cloud computing; mobile cloud computing; privacy; security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Wireless Technology and Applications (ISWTA), 2013 IEEE Symposium on
  • Conference_Location
    Kuching
  • ISSN
    2324-7843
  • Print_ISBN
    978-1-4799-0155-5
  • Type

    conf

  • DOI
    10.1109/ISWTA.2013.6688818
  • Filename
    6688818