• DocumentCode
    78629
  • Title

    Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds

  • Author

    Tysowski, P.K. ; Hasan, M. Anwar

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada
  • Volume
    1
  • Issue
    2
  • fYear
    2013
  • fDate
    July-December 2013
  • Firstpage
    172
  • Lastpage
    186
  • Abstract
    Outsourcing data to the cloud are beneficial for reasons of economy, scalability, and accessibility, but significant technical challenges remain. Sensitive data stored in the cloud must be protected from being read in the clear by a cloud provider that is honest-but-curious. Additionally, cloud-based data are increasingly being accessed by resource-constrained mobile devices for which the processing and communication cost must be minimized. Novel modifications to attribute-based encryption are proposed to allow authorized users access to cloud data based on the satisfaction of required attributes such that the higher computational load from cryptographic operations is assigned to the cloud provider and the total communication cost is lowered for the mobile user. Furthermore, data re-encryption may be optionally performed by the cloud provider to reduce the expense of user revocation in a mobile user environment while preserving the privacy of user data stored in the cloud. The proposed protocol has been realized on commercially popular mobile and cloud platforms to demonstrate real-world benchmarks that show the efficacy of the scheme. A simulation calibrated with the benchmark results shows the scalability potential of the scheme in the context of a realistic workload in a mobile cloud computing system.
  • Keywords
    cloud computing; cryptography; data privacy; mobile computing; cloud-based data; cryptographic operations; hybrid attribute-and re-encryption-based key management; mobile cloud computing system; mobile user environment; resource-constrained mobile devices; scalable mobile applications; secure mobile applications; user data privacy protection; Cloud computing; Computational modeling; Computer security; Encryption; Mobile communication; Outsourcing; Scalability; Distributed computing; cryptography; mobile computing; scalability; security;
  • fLanguage
    English
  • Journal_Title
    Cloud Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    2168-7161
  • Type

    jour

  • DOI
    10.1109/TCC.2013.11
  • Filename
    6654173