The Journal of Supercomputing

, Volume 70, Issue 2, pp 946–976 | Cite as

BSS: block-based sharing scheme for secure data storage services in mobile cloud environment

  • Abdul Nasir Khan
  • M. L. Mat Kiah
  • Mazhar Ali
  • Sajjad A. Madani
  • Atta ur Rehman Khan
  • Shahaboddin Shamshirband


For the last few years, academia and research organizations are continuously investigating and resolving the security and privacy issues of mobile cloud computing environment. The additional consideration in designing security services for mobile cloud computing environment should be the resource-constrained mobile devices. The execution of computationally intensive security services on mobile device consumes battery’s charging quickly. In this regard, the study presents a novel energy-efficient block-based sharing scheme that provides confidentiality and integrity services for mobile users in the cloud environment. The block-based sharing scheme is compared with the existing schemes on the basis of energy consumption, CPU utilization, memory utilization, encryption time, decryption time, and turnaround time. The experimental results show that the block-based sharing scheme consumes less energy, reduces the resources utilization, improves response time, and provides better security services to the mobile users in the presence of fully untrusted cloud server(s) as compared to the existing security schemes.


Cloud computing Mobile cloud computing Security  Privacy 



We would like to acknowledge the financial support of the BrightSparks Program at University of Malaya, Malaysia for carrying out these research experiments.


  1. 1.
    Khan AN et al (2013) Towards secure mobile cloud computing: a survey. Future Gener Comput Syst 29(5):1278–1299CrossRefGoogle Scholar
  2. 2.
    Khan A et al (2013) A survey of mobile cloud computing application models. IEEE Commun Surv Tutor 16(1):393–413CrossRefGoogle Scholar
  3. 3.
    Kumar K, Lu YH (2010) Cloud computing for mobile users: can offloading computation save energy? Computer 43(4):51–56CrossRefGoogle Scholar
  4. 4.
    Fox A et al (2009) Above the clouds: a Berkeley view of cloud computing. In: Technical report UCB/EECS, Department Electrical Engineering and Computer Sciences, University of California, Berkeley, p 28Google Scholar
  5. 5.
    Hashemi SM, Ardakani MRM (2012) Taxonomy of the security aspects of cloud computing systems—a survey. Int J Appl Inf Syst 4(1):21–28Google Scholar
  6. 6.
    Juniper (2010) Technical report: Mobile cloud computing: \({\$}\) 9.5 billion by 2014 . Accessed 24 April 2013
  7. 7.
    Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11CrossRefGoogle Scholar
  8. 8.
    Santos N, Gummadi KP, Rodrigues R (2009) Towards trusted cloud computing. In: Proceedings of the 2009 conference on Hot topics in cloud computing. USENIX AssociationGoogle Scholar
  9. 9.
    Khan AN et al (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Supercomput 66(3):1687–1706CrossRefGoogle Scholar
  10. 10.
    Jia W et al (2011) SDSM: a secure data service mechanism in mobile cloud computing, In: IEEE conference on computer communications workshops (INFOCOM ’11). IEEE, Shanghai, pp 1060–1065Google Scholar
  11. 11.
    Khan AN et al (2014) Incremental proxy re-encryption scheme for mobile cloud computing environment. J Supercomput 68(2):624–651CrossRefGoogle Scholar
  12. 12.
    Ren W et al (2011) Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing. Tsinghua Sci Technol 16(5):520–528CrossRefGoogle Scholar
  13. 13.
    Zhang X et al (2009) Securing elastic applications on mobile devices for cloud computing. In: Proceedings of the 2009 ACM workshop on cloud computing securityGoogle Scholar
  14. 14.
    Xiao S, Gong W (2010) Mobility can help: protect user identity with dynamic credential. In: 2010 IEEE 11th international conference on mobile data management (MDM)Google Scholar
  15. 15.
    Chow R et al (2010) Authentication in the clouds: a framework and its application to mobile users. In: Proceedings of the 2010 ACM workshop on cloud computing security workshopGoogle Scholar
  16. 16.
    Huang D et al (2010) MobiCloud: building secure cloud framework for mobile computing and communication. In: 5th IEEE international symposium on service oriented system engineering (SOSE ’10), pp 27–34Google Scholar
  17. 17.
    Huang D et al (2011) Secure data processing framework for mobile cloud computing. In: IEEE conference on computer communications workshops (INFOCOM WKSHPS ‘11), pp 614–618Google Scholar
  18. 18.
    Chen YJ, Wang LC (2011) A security framework of group location-based mobile applications in cloud computing. In: 40th IEEE international conference on parallel processing workshops (ICPPW ’11)Google Scholar
  19. 19.
    Bilogrevic I et al (2011) Meetings through the cloud: privacy-preserving scheduling on mobile devices. J Syst Softw 84(11):1910–1927CrossRefGoogle Scholar
  20. 20.
    Itani W, Kayssi A, Chehab A (2010) Energy-efficient incremental integrity for securing storage in mobile cloud computing. In: International conference on energy aware computing (ICEAC ’10), IEEE, Cairo, pp 1–2Google Scholar
  21. 21.
    Hsueh SC, Lin JY, Lin MY (2011) Secure cloud storage for convenient data archive of smart phones. In: IEEE 15th international symposium on consumer electronics (ISCE ’11), pp 156–161Google Scholar
  22. 22.
    Yang J et al (2011) Provable data possession of resource-constrained mobile devices in cloud computing. J Netw 6(7):1033–1040Google Scholar
  23. 23.
    Zhou Z, Huang D (2012) Efficient and secure data storage operations for mobile cloud computing. In: 8th international conference on network and service management (CNSM ’12). IEEE, AZ, pp 37–45Google Scholar
  24. 24.
    Yu S et al (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings IEEE (INFOCOM ’10) 2010. IEEE, NJ, pp 1–9Google Scholar
  25. 25.
    Shao J, Cao Z (2009) CCA-secure proxy re-encryption without pairings. Public Key Cryptogr PKC 2009:357–376MathSciNetGoogle Scholar
  26. 26.
    Tysowski PK, Hasan MA (2011) Re-encryption-based key management towards secure and scalable mobile applications in clouds. In: IACR cryptology eprint archive, vol 668Google Scholar
  27. 27.
    Ateniese G et al (2006) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur (TISSEC) 9(1):1–30CrossRefMATHGoogle Scholar
  28. 28.
    Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy (SP ’07)Google Scholar
  29. 29.
    Kim Y et al (2007) Key establishment scheme for sensor networks with low communication cost. Auton Trust Comput 441–448Google Scholar
  30. 30.
    Khan AN, Qureshi K, Khan S (2012) An intelligent approach of sniffer detection. Int Arab J Inf Technol 9(1):9–15Google Scholar
  31. 31.
    Khan AN, Qureshi K, Khan S (2009) Enhanced switched network sniffer detection technique based on IP packet routing. Inf Secur J Glob Perspect 18(4):153–162CrossRefGoogle Scholar
  32. 32.
  33. 33.
    Google Cloud Storage Java API Overview (2012) Accessed 15 August 2012
  34. 34.
  35. 35.
    Murata T (1989) Petri nets: properties, analysis and applications. Proc IEEE 77(4):541–580CrossRefGoogle Scholar
  36. 36.
    de Moura L, Bjørner N (2009) Satisfiability modulo theories: an appetizer. In: Formal methods: foundations and applications. Springer, New York, pp 23–36Google Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  • Abdul Nasir Khan
    • 1
    • 3
  • M. L. Mat Kiah
    • 1
  • Mazhar Ali
    • 2
  • Sajjad A. Madani
    • 3
  • Atta ur Rehman Khan
    • 1
  • Shahaboddin Shamshirband
    • 4
  1. 1.Faculty of Computer Science and Information TechnologyUniversity of MalayaKuala LumpurMalaysia
  2. 2.Department of Electrical and Computer EngineeringNorth Dakota State UniversityFargoUSA
  3. 3.COMSATS Institute of Information TechnologyAbbottabadPakistan
  4. 4.Islamic Azad University of Mashhad (IAUM)MashhadIran

Personalised recommendations