Header menu link for other important links
X
A study of incremental cryptography for security schemes in mobile cloud computing environments
A.N. Khan, M.L.M. Kiah, S.U. Khan, S.A. Madani,
Published in IEEE Computer Society
2013
Pages: 62 - 67
Abstract
While using the cloud storage services on resource constraint mobile device, the mobile user needs to ensure the confidentiality of the critical data before uploading on the cloud storage. The resource limitation of mobile devices restricts mobile users for executing complex security operations using computational power of mobile devices. To make security schemes suitable for mobile devices, large volume of existing security schemes execute complex security operations remotely on cloud or trusted third party. Alternatively, few of the existing security schemes focus on the reduction of the computational complexity of the cryptographic algorithms. Keeping in view the resource limitation of mobile devices, this paper, introduces an incremental cryptographic version of the existing security schemes, such as encryption-based scheme, coding-based scheme, and sharing-based scheme, for improving the block(s) modification operations in term of resource utilization on mobile device. The experimental results show significant improvement in resource utilization on mobile device while performing block insertion, deletion, and modification operations as compared to the original version of the aforementioned schemes. © 2013 IEEE.
About the journal
JournalData powered by TypesetIEEE Symposium on Wireless Technology and Applications, ISWTA
PublisherData powered by TypesetIEEE Computer Society
ISSN23247843