Browse > Article

A Secure Data Processing Using ID-Based Key Cryptography in Mobile Cloud Computing  

Cheon, EunHong (우석대학교 컴퓨터공학과)
Lee, YonSik (군산대학교 컴퓨터정보공학과)
Publication Information
Abstract
Most mobile cloud computing system use public key cryptography to provide data security and mutual authentication. A variant of traditional public key technologies called Identity-Based Cryptography(IBC) has recently received considerable attention. The certificate-free approach of IBC may well match the dynamic qualities of cloud environment. But, there is a need for a lightweight secure framework that provides security with minimum processing overhead on mobile devices. In this paper, we propose to use hierarchical ID-Based Encryption in mobile cloud computing. It is suitable for a mobile network since it can reduce the workload of root Public Key Generators by delegating the privilege of user authentication and private key generation. The Identity-Based Encryption and Identity-Based Signature are also proposed and an ID-Based Authentication scheme is presented to secure data processing. The proposed scheme is designed by one-way hash functions and XOR operations, thus has low computation costs for mobile users.
Keywords
Mobile Cloud Computing; Identity Based Cryptography; Identity Based Authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Zissis, D. Lekkas, "Addressing cloud computing security issues, Future Generation Computer Systems", pp.583-592, 2012.
2 Shamir, A, "Identity-based cryptosystems and signature schemes", CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg ,1985.
3 D. Huang, Z. Zhou, L. Xu, T. Xing and Y. Zhong, "Secure Data Processing Framework for Mobile Cloud Computing", IEEE INFOCOM 2011 Workshop on Cloud Computing, IEEE, pp. 620-624, 2011.
4 Gentry, C., Silverberg, A. "Hierarchical ID-Based cryptography." ASIACRYPT 2002. LNCS, vol. 2501, pp. 548-566. Springer, Heidelberg, 2002.
5 Horwitz, J., Lynn, B. "Toward Hierarchical Identity-Based Encryption." EUROCRYPT 2002. LNCS, vol. 2332, pp. 466-481. Springer, Heidelberg, 2002.
6 N. Kaaniche, A. Boundguiga. "ID-Based Cryptographty for Secure Cloud Data Storage" Communicating System Laboratory Saclay, 91400, France, 2012.
7 S .K.Parsha, M .K.Pasha, "Enhancing Data Access Security in Cloud Computing using Hierarchical Identity Based Encryption(HIBE)", International journal of scientific & engineering research volume3, issue5, May 2012.
8 J. Susilo, Y.Mu, "Identity-based data storage in cloud computing", Faculty of Engineering and Information Sciences, 2012.
9 C. Schridde, T. Dornemann, E. Juhnke, B. Freisleben, M. Smith, "An Identity-Based Security Infrastructure for Cloud Environments," 2010 IEEE International Conference on Wireless Communications, Networking and Infor- mation Security, pp. 644 - 649, 2010.