![]() |
10.5120/ijca2017913259 |
Hasveen Kaur and P S Mann. An Improved Hybrid Re-Encryption Scheme for Mobile Cloud Computing Environment. International Journal of Computer Applications 162(4):12-16, March 2017. BibTeX
@article{10.5120/ijca2017913259, author = {Hasveen Kaur and P. S. Mann}, title = {An Improved Hybrid Re-Encryption Scheme for Mobile Cloud Computing Environment}, journal = {International Journal of Computer Applications}, issue_date = {March 2017}, volume = {162}, number = {4}, month = {Mar}, year = {2017}, issn = {0975-8887}, pages = {12-16}, numpages = {5}, url = {http://www.ijcaonline.org/archives/volume162/number4/27230-2017913259}, doi = {10.5120/ijca2017913259}, publisher = {Foundation of Computer Science (FCS), NY, USA}, address = {New York, USA} }
Abstract
Cloud computing is a technology or distributed network where user can move their data and any application software on it. But there is some issues in cloud computing, the main one is security because every user store their useful data on the network so they want their data should be protected from any unauthorized access, any changes that is not done on user’s behalf. There are different encryption and re-encryption techniques used for security purpose like FDE and FHE. In this paper, we have used the symmetric key agreement algorithm named Diffie Hellman, for improving cloud manager based scheme. OTP(One Time Password) is created which provides more security. The paper focuses to improve the cloud manager based scheme so that the security and integrity can be enhanced.
References
- Abdul Nasir Khan, M. L. Mat Kiah · Mazhar Ali, Shahaboddin Shamshirband, Atta ur Rehman Khan,” A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach”, 2015 Springer Science + Business Media Dordrecht
- Ankur Mishra, Ruchita Mathur, Shishir Jain, Jitendra Singh Rathore, 2013 “Cloud Computing Security” International Journal on Recent and Innovation Trends in Computing and Computation, pp 36-39
- Bhavna Makhija, VinitKumar Gupta, 2013 “Enhanced Data Security in Cloud Computing with Third Party Auditor”, International Journal of Advanced Research in Computer Science and Software Engineering, pp 341-345
- Dawn Song, Elaine Shi, 2012 “Cloud Data Protection for the Masses” IEEE Computer Society, pp 39-4
- Deyan Chen, Hong Zhao, 2012” Data Security and Privacy Protection Issues in Cloud Computing” International Conference on Computer Science and Electronics Engineering, pp 647-651
- Dr Nashaat el-Khameesy, Hossam Abdel Rahman, 2012 “A Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems” vol-3
- John Harauz, Lori M. Kaufman,Bruce Potter,” Data Security in the World of Cloud Computing ” IEEE Security and Privacy July 2009. pp. 61-64
- Sanjoli Singla, Jasmeet Singh, 2013 “Cloud Data Security using Authentication and Encryption Technique” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013, pp 2232-2235
- Punithasurya K, Esther Daniel, Dr. N. A. Vasanthi, 2013 “A Novel Role Based Cross Domain Access Control Scheme for Cloud Storage” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013, pp 942-946
- Vimmi Pandey, 2013 “Securing the Cloud Environment Using OTP” International Journal of Scientific Research in Computer Science and Engineering vol-1, Issue-4
- Young-Gi Min, Hyo-Jin Shin and Young-Hwan Bang, 2012 “Cloud Computing Security Issues and Access Control Solutions” Journal of Security Engineering, pp 135-140
- ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Advances in Cryptology, pp. 10–18. Springer,1985
- Tysowski, P.K., Hasan, M.A.: Re-encryption-based key management towards secure and scalable mobile applications in clouds. IACR Cryptology ePrint Archive 668, 2011
- Hashemi, S.M., Ardakani, M.R.M.: Taxonomy of the security aspects of cloud computing systems-a survey. Int. J.Appl. Inf. Syst. 4, 21–28 ,2012
- Kumar, K., Lu, and Y.H.: Cloud computing for mobile users: Can offloading computation save energy? Computer 43,51–56 ,2010
- De Caro, A., Iovino, V.: ”jPBC: Java pairing based cryptography ,presented at the IEEE Symposium on Computers and Communications (ISCC ’11) Kerkyra ,2011
- Secure Cloud Computing through Homomorphic Encryption, Available at: http://arxiv.org/abs/1409.0829,2013
- Ateniese, G., Fu, K., Green,M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC)9, 1–30 ,2006
- Green, M., Ateniese, G.: Identity-based proxy re-encryption, presented at the Applied Cryptography and Network Security (ACNS ’07), Zhuhai, China ,2007
- Ivan, A., Dodis, Y.: Proxy cryptography revisited, presented at the Proceedings of the Network and Distributed System Security Symposium (NDSS ’03), San Diego, California,2003
- Certicom, Standards for Efficient Cryptography,SEC 2: Recommended Elliptic Curve Domain Parameters, Version 1.0. Available: at http://www.secg.org/download/aid-386/sec2 final.pdf ,2000.
- Kumar, K., Lu, and Y.H.: Cloud computing for mobile users: Can offloading computation save energy? Computer 43,51–56 ,2010
- Itani, W., Kayssi, A., Chehab, A.: Energy-efficient incremental integrity for securing storage in mobile cloud computing, presented at the International Conference on Energy Aware Computing (ICEAC ’10) Cairo, Egypt ,2010
- Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing, presented at the 8th International Conference on Network and Service Management (CNSM ’12), AZ, USA ,2012
- Hashemi, S.M., Ardakani, M.R.M.: Taxonomy of the security aspects of cloud computing systems-a survey. Int. J.Appl. Inf. Syst. 4, 21–28 ,2012
- https://en.wikipedia.org/wiki/Proxy_re-encryption
Keywords
Cloud Computing,Security,key Management.