Key Management towards Secure and Scalable Mobile Applications in Cloud using Re-encryption

Authors(1) :-Mohd Saleem

Security concerns get to be pertinent as we outsource the capacity of conceivably sensitive data to third party cloud storage. Data stored in cloud may be disclosed later on because of malevolent assaults on the cloud or inconsiderate administration of cloud administrators. Secure information exchange is expected to keep up the information security between authorized users. A key administration plan is proposed where encoded key shares are put away in the cloud and consequently erased in view of entry of time or client action. The rate of termination may be controlled through the beginning distribution of shares and the heuristics for evacuation. Membership to client information is kept up through standard re-era of shares. A reenactment of the plan furthermore its usage on business portable and cloud stages exhibit its practical performance.

Authors and Affiliations

Mohd Saleem
Department of Computer Science and Engineering, BGSBU Rajouri, India

Key management; Secure Data Retrieval; Re-encryption; Mobile applications

  1. N. Balasubramanian, A. Balasubramanian, and A. Venkataramani, “Energy consumption in mobile phones: a measurement study and implications for network applications,” in Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, ser. IMC ’09. New York, NY, USA: ACM, 2009, pp. 280–293.
  2. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext Policy Attribute- Based Encryption,” in Proceedings of the 2007 IEEE Symposium on Security and Privacy, ser. SP ’07. Washington, DC, USA: IEEE Computer Society, 2007, pp. 321–334.
  3. A. Tassanaviboon and G. Gong, “OAuth and ABE based authorization in semi-trusted cloud computing: aauth,” in Proceedings of the second international workshop on Data intensive computing in the clouds, ser. DataCloudSC ’11. New York, NY, USA: ACM, 2011, pp. 41–50.
  4. X. Liang, R. Lu, and X. Lin, “Ciphertext policy attribute based encryption with efficient revocation,” University of Waterloo, Technical Report BBCR, 2011.
  5. J. Hur and D. K. Noh, “Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, pp. 1214–1221, 2011.
  6. P. Tysowski and M. A. Hasan, “Towards Secure Communication for Highly Scalable Mobile Applications in Cloud Computing Systems,” Centre for Applied Cryptographic Research (CACR), University of Waterloo, Tech. Rep. 33, 2011.
  7. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” ACM Transactions of Information and System Security, vol. 9, pp. 1–30, Feb. 2006.
  8. Q. Liu, G. Wang, and J. Wu, “Clock-based proxy re-encryption scheme in unreliable clouds,” in Parallel Processing Workshops (ICPPW), 2012 41st International Conference on, sept. 2012, pp. 304 –305.
  9. J.-M. Do, Y.-J. Song, and N. Park, “Attribute based proxy re-encryption for data confidentiality in cloud computing environments,” in Computers, Networks, Systems and Industrial Engineering (CNSI), 2011 First ACIS/JNU International Conference on, may 2011, pp. 248 –251
  10. S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,” Cryptology ePrint Archive, Report 2003/126, 2003, http://eprint.iacr.org/.
  11. H. S.-M. Ali Khoshgozaran and C. Shahabi, “SPIRAL, a scalable private information retrieval approach to location privacy,” in Proceedings of the 2nd International Workshop on Privacy-Aware Location-based Mobile Services (PALMS), 2008.
  12. Amazon, “Amazon Web Services: Overview of Security Processes,” November 2009. [Online].Available: http://aws.amazon.com/security
  13. M. J. Atallah, K. B. Frikken, and M. Blanton, “Dynamic and efficient key management for access hierarchies,” in CCS ’05: Proceedings of the 12th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2005, pp. 190–202.
  14. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” ACM Transactions of Information and System Security, vol. 9, pp. 1–30, Feb. 2006.

Publication Details

Published in : Volume 4 | Issue 1 | March-April 2018
Date of Publication : 2018-04-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 258-261
Manuscript Number : CSEIT411843
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Mohd Saleem, "Key Management towards Secure and Scalable Mobile Applications in Cloud using Re-encryption", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 1, pp.258-261, March-April-2018.
Journal URL : http://ijsrcseit.com/CSEIT411843

Article Preview

Follow Us

Contact Us