The Journal of Supercomputing

, Volume 68, Issue 2, pp 624–651

Incremental proxy re-encryption scheme for mobile cloud computing environment

  • Abdul Nasir Khan
  • M. L. Mat Kiah
  • Sajjad A. Madani
  • Mazhar Ali
  • Atta ur Rehman Khan
  • Shahaboddin Shamshirband
Original Paper

DOI: 10.1007/s11227-013-1055-z

Cite this article as:
Khan, A.N., Kiah, M.L.M., Madani, S.A. et al. J Supercomput (2014) 68: 624. doi:10.1007/s11227-013-1055-z

Abstract

Due to the limited computational capability of mobile devices, the research organization and academia are working on computationally secure schemes that have capability for offloading the computational intensive data access operations on the cloud/trusted entity for execution. Most of the existing security schemes, such as proxy re-encryption, manager-based re-encryption, and cloud-based re-encryption, are based on El-Gamal cryptosystem for offloading the computational intensive data access operation on the cloud/trusted entity. However, the resource hungry pairing-based cryptographic operations, such as encryption and decryption, are executed using the limited computational power of mobile device. Similarly, if the data owner wants to modify the encrypted file uploaded on the cloud storage, after modification the data owner must encrypt and upload the entire file on the cloud storage without considering the altered portion(s) of the file. In this paper, we have proposed an incremental version of proxy re-encryption scheme for improving the file modification operation and compared with the original version of the proxy re-encryption scheme on the basis of turnaround time, energy consumption, CPU utilization, and memory consumption while executing the security operations on mobile device. The incremental version of proxy re-encryption scheme shows significant improvement in results while performing file modification operations using limited processing capability of mobile devices.

Keywords

Cloud computingMobile cloud computingSecurityPrivacy

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Abdul Nasir Khan
    • 1
  • M. L. Mat Kiah
    • 1
  • Sajjad A. Madani
    • 2
  • Mazhar Ali
    • 3
  • Atta ur Rehman Khan
    • 1
  • Shahaboddin Shamshirband
    • 1
  1. 1.Faculty of Computer Science and Information TechnologyUniversity of MalayaKuala LumpurMalaysia
  2. 2.Department of Computer ScienceCOMSATS Institute of Information TechnologyIslamabadPakistan
  3. 3.Department of Electrical and Computer EngineeringNorth Dakota State UniversityFargoUSA