A remotely keyed file encryption scheme under mobile cloud computing

Abstract The storage and computing capacity limitations of a mobile terminal pare down the file sharing ability between mobile terminals and public clouds. Moreover, the security of public clouds increases perceived risks. Private clouds represent a very effective platform and can be regarded as a trusted third party for improving the level of security when a user uses a file from public clouds. Thus, we propose a new scheme called FREDP (File Remotely keyed Encryption and Data Protection). This scheme involves three-party interaction among a mobile terminal, private clouds and public clouds. The private clouds share the ciphertext file to the public clouds until the mobile terminal and the trusted third party, the private clouds, finish the encryption of the plaintext file using a remotely keyed encryption algorithm. To ensure security when a mobile terminal uses data, the private clouds as the third party regularly verify the integrity of the data in the public clouds. Finally, the mobile terminal and private clouds decrypt the ciphertext file to allow the user of the mobile terminal to use the data. In addition, we analyze the security of FREDP using BAN. The FREDP satisfies the security standard. In addition, we conduct an experiment to measure the scheme's performance. The results show that FREDP achieves good performance.

[1]  Sherali Zeadally,et al.  Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks , 2018, IEEE Systems Journal.

[2]  Matt Blaze,et al.  High-Bandwidth Encryption with Low-Bandwidth Smartcards , 1996, FSE.

[3]  Mojtaba Alizadeh,et al.  Authentication in mobile cloud computing: A survey , 2016, J. Netw. Comput. Appl..

[4]  Diana K. Smetters,et al.  Securing a remote terminal application with a mobile trusted device , 2004, 20th Annual Computer Security Applications Conference.

[5]  Jin Li,et al.  Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.

[6]  Fatos Xhafa,et al.  Secure deduplication storage systems supporting keyword search , 2015, J. Comput. Syst. Sci..

[7]  Rajkumar Buyya,et al.  An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing , 2016, J. Netw. Comput. Appl..

[8]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[9]  Huaqun Wang,et al.  Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud , 2016, IEEE Transactions on Information Forensics and Security.

[10]  Angelos D. Keromytis,et al.  Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware , 2005, ICICS.

[11]  Y.M.Y. Hasan Key-Joined Block Ciphers with Input-Output Pseudorandom Shuffling Applied to Remotely Keyed Authenticated Encryption , 2007, 2007 IEEE International Symposium on Signal Processing and Information Technology.

[12]  Ali Chehab,et al.  Energy-efficient incremental integrity for securing storage in mobile cloud computing , 2010, 2010 International Conference on Energy Aware Computing.

[13]  Jin Li,et al.  Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks , 2017, IEEE Systems Journal.

[14]  Kaushik Deb,et al.  User-authentication approach for data security between smartphone and cloud , 2013, Ifost.

[15]  Jianfeng Ma,et al.  A delegation based cross trusted domain direct anonymous attestation scheme , 2015, Comput. Networks.

[16]  Samee Ullah Khan,et al.  Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .

[17]  Jian Yang,et al.  Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing , 2011, J. Networks.

[18]  Joan Feigenbaum,et al.  Security with Low Communication Overhead , 1990, CRYPTO.

[19]  Joan Feigenbaum,et al.  A formal treatment of remotely keyed encryption , 1998, SODA '99.

[20]  Xiaofeng Chen,et al.  Secure Distributed Deduplication Systems with Improved Reliability , 2015, IEEE Trans. Computers.