Improved proxy re-encryption schemes with applications to secure distributed storage
ACM Transactions on Information and System Security (TISSEC)
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Programming amazon web services
Programming amazon web services
CCA-Secure Proxy Re-encryption without Pairings
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Securing elastic applications on mobile devices for cloud computing
Proceedings of the 2009 ACM workshop on Cloud computing security
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Mobility Can Help: Protect User Identity with Dynamic Credential
MDM '10 Proceedings of the 2010 Eleventh International Conference on Mobile Data Management
In-Device Spatial Cloaking for Mobile User Privacy Assisted by the Cloud
MDM '10 Proceedings of the 2010 Eleventh International Conference on Mobile Data Management
Achieving secure, scalable, and fine-grained data access control in cloud computing
INFOCOM'10 Proceedings of the 29th conference on Information communications
MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication
SOSE '10 Proceedings of the 2010 Fifth IEEE International Symposium on Service Oriented System Engineering
Authentication in the clouds: a framework and its application to mobile users
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
Meetings through the cloud: Privacy-preserving scheduling on mobile devices
Journal of Systems and Software
A Security Framework of Group Location-Based Mobile Applications in Cloud Computing
ICPPW '11 Proceedings of the 2011 40th International Conference on Parallel Processing Workshops
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
Policy based resource allocation in IaaS cloud
Future Generation Computer Systems
A study on virtual machine deployment for application outsourcing in mobile cloud computing
The Journal of Supercomputing
Towards secure mobile cloud computing: A survey
Future Generation Computer Systems
Hi-index | 0.00 |
To improve the resource limitation of mobile devices, mobile users may utilize cloud-computational and storage services. Although the utilization of the cloud services improves the processing and storage capacity of mobile devices, the migration of confidential information on untrusted cloud raises security and privacy issues. Considering the security of mobile-cloud-computing subscribers' information, a mechanism to authenticate legitimate mobile users in the cloud environment is sought. Usually, the mobile users are authenticated in the cloud environment through digital credential methods, such as password. Once the users' credential information theft occurs, the adversary can use the hacked information for impersonating the mobile user later on. The alarming situation is that the mobile user is unaware about adversary's malicious activities. In this paper, a light-weight security scheme is proposed for mobile user in cloud environment to protect the mobile user's identity with dynamic credentials. The proposed scheme offloads the frequently occurring dynamic credential generation operations on a trusted entity to keep minimum processing burden on the mobile device. To enhance the security and reliability of the scheme, the credential information is updated frequently on the basis of mobile-cloud packets exchange. Furthermore, the proposed scheme is compared with the existing scheme on the basis of performance metrics i.e. turnaround time and energy consumption. The experimental results for the proposed scheme showed significant improvement in turnaround time and energy consumption as compared to the existing scheme.