Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing

被引:35
作者
Khan, Abdul Nasir [1 ]
Kiah, M. L. Mat [1 ]
Madani, Sajjad A. [2 ]
Khan, Atta ur Rehman [1 ]
Ali, Mazhar [3 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur, Malaysia
[2] COMSATS Inst Informat Technol, Dept Comp Sci, Abbottabad, Pakistan
[3] N Dakota State Univ, Dept Elect & Comp Engn, Fargo, ND 58105 USA
关键词
Cloud computing; Mobile-cloud computing; Security; Privacy;
D O I
10.1007/s11227-013-0967-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To improve the resource limitation of mobile devices, mobile users may utilize cloud-computational and storage services. Although the utilization of the cloud services improves the processing and storage capacity of mobile devices, the migration of confidential information on untrusted cloud raises security and privacy issues. Considering the security of mobile-cloud-computing subscribers' information, a mechanism to authenticate legitimate mobile users in the cloud environment is sought. Usually, the mobile users are authenticated in the cloud environment through digital credential methods, such as password. Once the users' credential information theft occurs, the adversary can use the hacked information for impersonating the mobile user later on. The alarming situation is that the mobile user is unaware about adversary's malicious activities. In this paper, a light-weight security scheme is proposed for mobile user in cloud environment to protect the mobile user's identity with dynamic credentials. The proposed scheme offloads the frequently occurring dynamic credential generation operations on a trusted entity to keep minimum processing burden on the mobile device. To enhance the security and reliability of the scheme, the credential information is updated frequently on the basis of mobile-cloud packets exchange. Furthermore, the proposed scheme is compared with the existing scheme on the basis of performance metrics i.e. turnaround time and energy consumption. The experimental results for the proposed scheme showed significant improvement in turnaround time and energy consumption as compared to the existing scheme.
引用
收藏
页码:1687 / 1706
页数:20
相关论文
共 31 条
[1]  
[Anonymous], 2012, ADJUSTING APPL PERFO
[2]  
[Anonymous], 2012, MOBILE CLOUD COMPUTI
[3]  
[Anonymous], 2013, ANDROID DO SOMETHING
[4]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[5]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[6]   Meetings through the cloud: Privacy-preserving scheduling on mobile devices [J].
Bilogrevic, Igor ;
Jadliwala, Murtuza ;
Kumar, Praveen ;
Walia, Sudeep Singh ;
Hubaux, Jean-Pierre ;
Aad, Imad ;
Niemi, Valtteri .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (11) :1910-1927
[7]   Authentication in the Clouds: A Framework and its Application to Mobile Users [J].
Chow, Richard ;
Jakobsson, Markus ;
Masuoka, Ryusuke ;
Molina, Jesus ;
Niu, Yuan ;
Shi, Elaine ;
Song, Zhexuan .
PROCEEDINGS OF THE 2010 ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'10:), 2010, :1-6
[8]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[9]  
Force.com, 2011, AP COD DEV GUID
[10]   PROBABILISTIC ENCRYPTION [J].
GOLDWASSER, S ;
MICALI, S .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1984, 28 (02) :270-299