Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds
Issue No.02 - July-December (2013 vol.1)
Piotr K. Tysowski , University of Waterloo, Waterloo
M. Anwarul Hasan , University of Waterloo, Waterloo
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TCC.2013.11
Outsourcing data to the cloud are beneficial for reasons of economy, scalability, and accessibility, but significant technical challenges remain. Sensitive data stored in the cloud must be protected from being read in the clear by a cloud provider that is honest-but-curious. Additionally, cloud-based data are increasingly being accessed by resource-constrained mobile devices for which the processing and communication cost must be minimized. Novel modifications to attribute-based encryption are proposed to allow authorized users access to cloud data based on the satisfaction of required attributes such that the higher computational load from cryptographic operations is assigned to the cloud provider and the total communication cost is lowered for the mobile user. Furthermore, data re-encryption may be optionally performed by the cloud provider to reduce the expense of user revocation in a mobile user environment while preserving the privacy of user data stored in the cloud. The proposed protocol has been realized on commercially popular mobile and cloud platforms to demonstrate real-world benchmarks that show the efficacy of the scheme. A simulation calibrated with the benchmark results shows the scalability potential of the scheme in the context of a realistic workload in a mobile cloud computing system.
Mobile communication, Encryption, Computational modeling, Outsourcing, Computer security, Scalability, Cloud computing,scalability, Distributed computing, mobile computing, security, cryptography
Piotr K. Tysowski, M. Anwarul Hasan, "Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds", IEEE Transactions on Cloud Computing, vol.1, no. 2, pp. 172-186, July-December 2013, doi:10.1109/TCC.2013.11