CFP last date
20 January 2025
Reseach Article

An Improved Hybrid Re-Encryption Scheme for Mobile Cloud Computing Environment

by Hasveen Kaur, P. S. Mann
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 162 - Number 4
Year of Publication: 2017
Authors: Hasveen Kaur, P. S. Mann
10.5120/ijca2017913259

Hasveen Kaur, P. S. Mann . An Improved Hybrid Re-Encryption Scheme for Mobile Cloud Computing Environment. International Journal of Computer Applications. 162, 4 ( Mar 2017), 12-16. DOI=10.5120/ijca2017913259

@article{ 10.5120/ijca2017913259,
author = { Hasveen Kaur, P. S. Mann },
title = { An Improved Hybrid Re-Encryption Scheme for Mobile Cloud Computing Environment },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 162 },
number = { 4 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 12-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume162/number4/27230-2017913259/ },
doi = { 10.5120/ijca2017913259 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:08:03.861618+05:30
%A Hasveen Kaur
%A P. S. Mann
%T An Improved Hybrid Re-Encryption Scheme for Mobile Cloud Computing Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 162
%N 4
%P 12-16
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a technology or distributed network where user can move their data and any application software on it. But there is some issues in cloud computing, the main one is security because every user store their useful data on the network so they want their data should be protected from any unauthorized access, any changes that is not done on user’s behalf. There are different encryption and re-encryption techniques used for security purpose like FDE and FHE. In this paper, we have used the symmetric key agreement algorithm named Diffie Hellman, for improving cloud manager based scheme. OTP(One Time Password) is created which provides more security. The paper focuses to improve the cloud manager based scheme so that the security and integrity can be enhanced.

References
  1. Abdul Nasir Khan, M. L. Mat Kiah · Mazhar Ali, Shahaboddin Shamshirband, Atta ur Rehman Khan,” A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach”, 2015 Springer Science + Business Media Dordrecht
  2. Ankur Mishra, Ruchita Mathur, Shishir Jain, Jitendra Singh Rathore, 2013 “Cloud Computing Security” International Journal on Recent and Innovation Trends in Computing and Computation, pp 36-39
  3. Bhavna Makhija, VinitKumar Gupta, 2013 “Enhanced Data Security in Cloud Computing with Third Party Auditor”, International Journal of Advanced Research in Computer Science and Software Engineering, pp 341-345
  4. Dawn Song, Elaine Shi, 2012 “Cloud Data Protection for the Masses” IEEE Computer Society, pp 39-4
  5. Deyan Chen, Hong Zhao, 2012” Data Security and Privacy Protection Issues in Cloud Computing” International Conference on Computer Science and Electronics Engineering, pp 647-651
  6. Dr Nashaat el-Khameesy, Hossam Abdel Rahman, 2012 “A Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems” vol-3
  7. John Harauz, Lori M. Kaufman,Bruce Potter,” Data Security in the World of Cloud Computing ” IEEE Security and Privacy July 2009. pp. 61-64
  8. Sanjoli Singla, Jasmeet Singh, 2013 “Cloud Data Security using Authentication and Encryption Technique” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013, pp 2232-2235
  9. Punithasurya K, Esther Daniel, Dr. N. A. Vasanthi, 2013 “A Novel Role Based Cross Domain Access Control Scheme for Cloud Storage” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013, pp 942-946
  10. Vimmi Pandey, 2013 “Securing the Cloud Environment Using OTP” International Journal of Scientific Research in Computer Science and Engineering vol-1, Issue-4
  11. Young-Gi Min, Hyo-Jin Shin and Young-Hwan Bang, 2012 “Cloud Computing Security Issues and Access Control Solutions” Journal of Security Engineering, pp 135-140
  12. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Advances in Cryptology, pp. 10–18. Springer,1985
  13. Tysowski, P.K., Hasan, M.A.: Re-encryption-based key management towards secure and scalable mobile applications in clouds. IACR Cryptology ePrint Archive 668, 2011
  14. Hashemi, S.M., Ardakani, M.R.M.: Taxonomy of the security aspects of cloud computing systems-a survey. Int. J.Appl. Inf. Syst. 4, 21–28 ,2012
  15. Kumar, K., Lu, and Y.H.: Cloud computing for mobile users: Can offloading computation save energy? Computer 43,51–56 ,2010
  16. De Caro, A., Iovino, V.: ”jPBC: Java pairing based cryptography ,presented at the IEEE Symposium on Computers and Communications (ISCC ’11) Kerkyra ,2011
  17. Secure Cloud Computing through Homomorphic Encryption, Available at: http://arxiv.org/abs/1409.0829,2013
  18. Ateniese, G., Fu, K., Green,M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC)9, 1–30 ,2006
  19. Green, M., Ateniese, G.: Identity-based proxy re-encryption, presented at the Applied Cryptography and Network Security (ACNS ’07), Zhuhai, China ,2007
  20. Ivan, A., Dodis, Y.: Proxy cryptography revisited, presented at the Proceedings of the Network and Distributed System Security Symposium (NDSS ’03), San Diego, California,2003
  21. Certicom, Standards for Efficient Cryptography,SEC 2: Recommended Elliptic Curve Domain Parameters, Version 1.0. Available: at http://www.secg.org/download/aid-386/sec2 final.pdf ,2000.
  22. Kumar, K., Lu, and Y.H.: Cloud computing for mobile users: Can offloading computation save energy? Computer 43,51–56 ,2010
  23. Itani, W., Kayssi, A., Chehab, A.: Energy-efficient incremental integrity for securing storage in mobile cloud computing, presented at the International Conference on Energy Aware Computing (ICEAC ’10) Cairo, Egypt ,2010
  24. Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing, presented at the 8th International Conference on Network and Service Management (CNSM ’12), AZ, USA ,2012
  25. Hashemi, S.M., Ardakani, M.R.M.: Taxonomy of the security aspects of cloud computing systems-a survey. Int. J.Appl. Inf. Syst. 4, 21–28 ,2012
  26. https://en.wikipedia.org/wiki/Proxy_re-encryption
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Security key Management.