Key Management towards Secure and Scalable Mobile Applications in Cloud using Re-encryption

Authors

  • Mohd Saleem  Department of Computer Science and Engineering, BGSBU Rajouri, India

Keywords:

Key management; Secure Data Retrieval; Re-encryption; Mobile applications

Abstract

Security concerns get to be pertinent as we outsource the capacity of conceivably sensitive data to third party cloud storage. Data stored in cloud may be disclosed later on because of malevolent assaults on the cloud or inconsiderate administration of cloud administrators. Secure information exchange is expected to keep up the information security between authorized users. A key administration plan is proposed where encoded key shares are put away in the cloud and consequently erased in view of entry of time or client action. The rate of termination may be controlled through the beginning distribution of shares and the heuristics for evacuation. Membership to client information is kept up through standard re-era of shares. A reenactment of the plan furthermore its usage on business portable and cloud stages exhibit its practical performance.

References

  1. N. Balasubramanian, A. Balasubramanian, and A. Venkataramani, “Energy consumption in mobile phones: a measurement study and implications for network applications,” in Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, ser. IMC ’09. New York, NY, USA: ACM, 2009, pp. 280–293.
  2. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext Policy Attribute- Based Encryption,” in Proceedings of the 2007 IEEE Symposium on Security and Privacy, ser. SP ’07. Washington, DC, USA: IEEE Computer Society, 2007, pp. 321–334.
  3. A. Tassanaviboon and G. Gong, “OAuth and ABE based authorization in semi-trusted cloud computing: aauth,” in Proceedings of the second international workshop on Data intensive computing in the clouds, ser. DataCloudSC ’11. New York, NY, USA: ACM, 2011, pp. 41–50.
  4. X. Liang, R. Lu, and X. Lin, “Ciphertext policy attribute based encryption with efficient revocation,” University of Waterloo, Technical Report BBCR, 2011.
  5. J. Hur and D. K. Noh, “Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, pp. 1214–1221, 2011.
  6. P. Tysowski and M. A. Hasan, “Towards Secure Communication for Highly Scalable Mobile Applications in Cloud Computing Systems,” Centre for Applied Cryptographic Research (CACR), University of Waterloo, Tech. Rep. 33, 2011.
  7. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” ACM Transactions of Information and System Security, vol. 9, pp. 1–30, Feb. 2006.
  8. Q. Liu, G. Wang, and J. Wu, “Clock-based proxy re-encryption scheme in unreliable clouds,” in Parallel Processing Workshops (ICPPW), 2012 41st International Conference on, sept. 2012, pp. 304 –305.
  9. J.-M. Do, Y.-J. Song, and N. Park, “Attribute based proxy re-encryption for data confidentiality in cloud computing environments,” in Computers, Networks, Systems and Industrial Engineering (CNSI), 2011 First ACIS/JNU International Conference on, may 2011, pp. 248 –251
  10. S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,” Cryptology ePrint Archive, Report 2003/126, 2003, http://eprint.iacr.org/.
  11. H. S.-M. Ali Khoshgozaran and C. Shahabi, “SPIRAL, a scalable private information retrieval approach to location privacy,” in Proceedings of the 2nd International Workshop on Privacy-Aware Location-based Mobile Services (PALMS), 2008.
  12. Amazon, “Amazon Web Services: Overview of Security Processes,” November 2009. [Online].Available: http://aws.amazon.com/security
  13. M. J. Atallah, K. B. Frikken, and M. Blanton, “Dynamic and efficient key management for access hierarchies,” in CCS ’05: Proceedings of the 12th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2005, pp. 190–202.
  14. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” ACM Transactions of Information and System Security, vol. 9, pp. 1–30, Feb. 2006.

Downloads

Published

2018-04-25

Issue

Section

Research Articles

How to Cite

[1]
Mohd Saleem, " Key Management towards Secure and Scalable Mobile Applications in Cloud using Re-encryption, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 1, pp.258-261, March-April-2018.