Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds
نویسندگان
چکیده
Cloud computing confers strong economic advantages, but many clients are reluctant to implicitly trust a third-party cloud provider. To address these security concerns, data may be transmitted and stored in encrypted form. Major challenges exist concerning the aspects of the generation, distribution, and usage of encryption keys in cloud systems, such as the safe location of keys, and serving the recent trend of users that tend to connect to contemporary cloud applications using resource-constrained mobile devices in extremely large numbers simultaneously; these characteristics lead to difficulties in achieving efficient and highly scalable key management. In this work, a model for key distribution based on the principle of dynamic data re-encryption is applied to a cloud computing system in a unique way to address the demands of a mobile device environment, including limitations on client wireless data usage, storage capacity, processing power, and battery life. The proposed cloud-based re-encryption model is secure, efficient, and highly scalable in a cloud computing context, as keys are managed by the client for trust reasons, processor-intensive data re-encryption is handled by the cloud provider, and key redistribution is minimized to conserve communication costs on mobile devices. A versioning history mechanism effectively manages keys for a continuously changing user population. Finally, an implementation on commercial mobile and cloud platforms is used to validate the performance of the model. Keywords-Distributed systems, mobile computing, security.
منابع مشابه
Towards Secure Communication for Highly Scalable Mobile Applications in Cloud Computing Systems
Cloud computing is a distributed computing model in which clients pay for computing and data storage resources of a third-party cloud provider. Cloud applications can scale up or down almost instantly to meet real-time computational demands. Despite the economic advantages of a pay-on-demand business model, security remains a paramount concern. Cloud applications by nature must store and retain...
متن کاملScalable key management for secure multicast communication in the mobile environment
The proliferation of the Internet computing and mobile computing technologies gives rise to the growth of mobile Internet applications. There are increasing demands on secure multicast services in the mobile Internet environment. An important issue in secure group communication is key management, which is concerned with distributing and updating the keys for encrypting the multicast messages in...
متن کاملHighly Scalable and Secure Mobile Applications in Cloud Computing Systems
Cloud computing provides scalable processing and storage resources that are hosted on a third-party provider to permit clients to economically meet real-time service demands. The confidentiality of client data outsourced to the cloud is a paramount concern since the provider cannot necessarily be trusted with read access to voluminous sensitive client data. A particular challenge of mobile clou...
متن کاملHybrid Attribute-Based Encryption and Re-Encryption for Scalable Mobile Applications in Clouds
Outsourcing data to the cloud is beneficial for reasons of economy, scalability, and accessibility, but significant technical challenges remain. Sensitive data stored in the cloud must be protected from being read in the clear by a cloud provider that is honest-but-curious. Additionally, cloud-based data is increasingly being accessed by resource-constrained mobile devices for which the process...
متن کاملRSPAE: RFID Search Protocol based on Authenticated Encryption
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2011 شماره
صفحات -
تاریخ انتشار 2011