The Journal of Supercomputing

, Volume 68, Issue 2, pp 624–651 | Cite as

Incremental proxy re-encryption scheme for mobile cloud computing environment

  • Abdul Nasir KhanEmail author
  • M. L. Mat Kiah
  • Sajjad A. Madani
  • Mazhar Ali
  • Atta ur Rehman Khan
  • Shahaboddin Shamshirband
Original Paper


Due to the limited computational capability of mobile devices, the research organization and academia are working on computationally secure schemes that have capability for offloading the computational intensive data access operations on the cloud/trusted entity for execution. Most of the existing security schemes, such as proxy re-encryption, manager-based re-encryption, and cloud-based re-encryption, are based on El-Gamal cryptosystem for offloading the computational intensive data access operation on the cloud/trusted entity. However, the resource hungry pairing-based cryptographic operations, such as encryption and decryption, are executed using the limited computational power of mobile device. Similarly, if the data owner wants to modify the encrypted file uploaded on the cloud storage, after modification the data owner must encrypt and upload the entire file on the cloud storage without considering the altered portion(s) of the file. In this paper, we have proposed an incremental version of proxy re-encryption scheme for improving the file modification operation and compared with the original version of the proxy re-encryption scheme on the basis of turnaround time, energy consumption, CPU utilization, and memory consumption while executing the security operations on mobile device. The incremental version of proxy re-encryption scheme shows significant improvement in results while performing file modification operations using limited processing capability of mobile devices.


Cloud computing Mobile cloud computing Security Privacy 



We would like to acknowledge the financial support of the BrightSparks Program at University of Malaya, Malaysia for carrying out this research experiments.


  1. 1.
    Khan AN, Kiah MLM, Khan SU, Madani SA (2013) Towards secure mobile cloud computing: a survey. Futur Gener Comput Syst 29:1278–1299Google Scholar
  2. 2.
    Khan AN, Kiah MLM, Madani SA, Ali M. (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Supercomput 1–20Google Scholar
  3. 3.
    Khan A, Othman M, Madani S, Khan S (2013) A survey of mobile cloud computing application models. IEEE Commun Surv Tutor 1–21Google Scholar
  4. 4.
    Nathani A, Chaudhary S, Somani G (2012) Policy based resource allocation in IaaS cloud. Futur Gener Comput Syst 28:94–103CrossRefGoogle Scholar
  5. 5.
    Wang L, Von Laszewski G, Younge A, He X, Kunze M, Tao J, Fu C (2010) Cloud computing: a perspective study. New Gener Comput 28:137–146CrossRefzbMATHGoogle Scholar
  6. 6.
    Murty J (2008) Programming Amazon Web Services: S3, EC2, SQS, FPS, and SimpleDB: O’Reilly Media (Incorporated)Google Scholar
  7. 7.
    Chen EY, Itoh M (2010) Virtual smartphone over IP. In: IEEE international symposium on a world of wireless mobile and multimedia networks (WoWMoM), 2010. IEEE, pp 1–6Google Scholar
  8. 8.
    Google Cloud Storage Java API Overview, August 15, 2012.
  9. 9.
    Dinh HT, Lee C, Niyato D, Wang P (2011) A survey of mobile cloud computing: architecture, applications, and approaches. Wirel Commun Mobile ComputGoogle Scholar
  10. 10.
    Zip cloud, May 01, 2013.
  11. 11.
    Crashplan, May 06, 2013.
  12. 12.
    Hashemi SM, Ardakani MRM (2012) Taxonomy of the security aspects of cloud computing systems-a survey. Int J Appl Inf Syst 4:21–28Google Scholar
  13. 13.
    Mobile cloud computing: 9.5 billion by 2014 (2010) Juniper, Technical Report. April 24, 2013.
  14. 14.
    Zhang X, Schiffman J, Gibbs S, Kunjithapatham A, Jeong S (2009) Securing elastic applications on mobile devices for cloud computing. In: Proceedings of the 2009 ACM workshop on cloud computing security. ACM, pp 127–134Google Scholar
  15. 15.
    Xiao S, Gong W (2010) Mobility can help: protect user identity with dynamic credential. In: Eleventh international conference on mobile data management (MDM), 2010. IEEE, pp 378–380Google Scholar
  16. 16.
    Wang S, Wang XS (2010) In-device spatial cloaking for mobile user privacy assisted by the cloud. In: Eleventh international conference on mobile data management (MDM), 2010. IEEE, pp 381–386Google Scholar
  17. 17.
    Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Shi E, Song Z (2010) Authentication in the clouds: a framework and its application to mobile users. In: Proceedings of the 2010 ACM workshop on cloud computing security workshop. ACM, pp 1–6Google Scholar
  18. 18.
    Huang D, Zhang X, Kang M, Luo J (2010) MobiCloud: building secure cloud framework for mobile computing and communication. In: Fifth IEEE international symposium on service oriented system engineering (SOSE ’10). IEEE, pp 27–34Google Scholar
  19. 19.
    Huang D, Zhou Z, Xu L, Xing T, Zhong Y (2011) Secure data processing framework for mobile cloud computing. In: IEEE conference on computer communications workshops (INFOCOM WKSHPS ’11). IEEE, pp 614–618Google Scholar
  20. 20.
    Chen YJ, Wang LC (2011) A security framework of group location-based mobile applications in cloud computing. In: 40th international conference on parallel processing workshops (ICPPW ’11). IEEE, pp 184–190Google Scholar
  21. 21.
    Bilogrevic I, Jadliwala M, Kumar P, Walia SS, Hubaux JP, Aad I, Niemi V (2011) Meetings through the cloud: privacy-preserving scheduling on mobile devices. J Syst Softw 84:1910–1927CrossRefGoogle Scholar
  22. 22.
    Zhang X, Jeong S, Kunjithapatham A, Gibbs S (2010) Towards an elastic application model for augmenting computing capabilities of mobile platforms. Mobile Wirel Middlew Oper Syst Appl 161–174Google Scholar
  23. 23.
    Ren W, Yu L, Gao R, Xiong F (2011) Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing. Tsinghua Sci Technol 16:520–528CrossRefGoogle Scholar
  24. 24.
    Hsueh SC, Lin JY, Lin MY (2011) Secure cloud storage for convenient data archive of smart phones. In: IEEE 15th international symposium on consumer electronics (ISCE ’11). IEEE, pp 156–161Google Scholar
  25. 25.
    Itani W, Kayssi A, Chehab A (2010) Energy-efficient incremental integrity for securing storage in mobile cloud computing. In: International conference on energy aware computing (ICEAC ’10). IEEE, Cairo, Egypt, pp 1–2Google Scholar
  26. 26.
    Jia W, Zhu H, Cao Z, Wei L, Lin X (2011) SDSM: A secure data service mechanism in mobile cloud computing. In: Conference IEEE on computer communications workshops (INFOCOM ’11). IEEE, Shanghai, China, pp 1060–1065Google Scholar
  27. 27.
    Yang J, Wang H, Wang J, Tan C, Yu D (2011) Provable data possession of resource-constrained mobile devices in cloud computing. J Netw 6:1033–1040Google Scholar
  28. 28.
    Tysowski PK, Hasan MA (2011) Re-encryption-based key management towards secure and scalable mobile applications in clouds. In: IACR Cryptology ePrint Archive 668Google Scholar
  29. 29.
    Zhou Z, Huang D (2011) Efficient and secure data storage operations for mobile cloud computing. In: Cryptology ePrint ArchiveGoogle Scholar
  30. 30.
    Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Nyberg K (ed) Advances in cryptology—EUROCRYPT’98. Springer, Berlin, pp 127–144Google Scholar
  31. 31.
    ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. In: Advances in cryptology. Springer, Berlin, pp 10–18Google Scholar
  32. 32.
    Bellare M, Goldreich O, Goldwasser S (1994) Incremental cryptography: the case of hashing and signing. In: Advances in cryptology—CRYPTO’94. Springer, Berlin, pp 216–233Google Scholar
  33. 33.
    Bellare M, Goldreich O, Goldwasser S (1995) Incremental cryptography and application to virus protection. In: Proceedings of the twenty-seventh annual ACM symposium on theory of computing. ACM, pp 45–56Google Scholar
  34. 34.
    Bellare M, Micciancio D (1997) A new paradigm for collision-free hashing: incrementality at reduced cost. In: Advances in cryptology–EUROCRYPT’97. Springer, Berlin, pp 163–192Google Scholar
  35. 35.
    Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings IEEE (INFOCOM ’10). IEEE, NJ, USA, pp 1–9Google Scholar
  36. 36.
    Adjusting Application Performance, September 05, 2012.
  37. 37.
    De Caro A, Iovino V (2011) jPBC: java pairing based cryptography. In: IEEE symposium on computers and communications (ISCC ’11). IEEE, Kerkyra, pp 850–855Google Scholar
  38. 38.
    Proportional Set Size, August 23, 2012.
  39. 39.
    Android Top Command To Get CPU Usage and Memory Usage, September 09, 2012.
  40. 40.
    Certicom, Standards for Efficient Cryptography, SEC 2: Recommended Elliptic Curve Domain Parameters, Version 1.0, September 2000.
  41. 41.
    Murata T (1989) Petri nets: properties, analysis and applications. Proc IEEE 77:541–580CrossRefGoogle Scholar
  42. 42.
    de Moura L, Bjørner N (2009) Satisfiability modulo theories: an appetizer. In: Formal methods: foundations and applications. Springer, Berlin, pp 23–36Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Abdul Nasir Khan
    • 1
    Email author
  • M. L. Mat Kiah
    • 1
  • Sajjad A. Madani
    • 2
  • Mazhar Ali
    • 3
  • Atta ur Rehman Khan
    • 1
  • Shahaboddin Shamshirband
    • 1
  1. 1.Faculty of Computer Science and Information TechnologyUniversity of MalayaKuala LumpurMalaysia
  2. 2.Department of Computer ScienceCOMSATS Institute of Information TechnologyIslamabadPakistan
  3. 3.Department of Electrical and Computer EngineeringNorth Dakota State UniversityFargoUSA

Personalised recommendations