LIFE: a lightweight and flexible key management scheme for securely and pervasively file editing in mobile cloud computing

2014 ◽  
Vol 8 (2/3) ◽  
pp. 122
Author(s):  
Wei Ren ◽  
Jiahua Lin ◽  
Qiang Cao ◽  
Liangli Ma
2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Tianqi Zhou ◽  
Jian Shen ◽  
Yongjun Ren ◽  
Sai Ji

Intelligent transportation systems (ITS) have always been an important application of Internet of Things (IoT). Today, big data and cloud computing have further promoted the construction and development of ITS. At the same time, the development of blockchain has also brought new features and convenience to ITS. However, due to the endless emergence of increasingly advanced types of attacks, the security of blockchain-based ITS needs more attention from industry and academia. In this paper, we focus on exploring the primitives in cryptography to guarantee the security of blockchain-based ITS. In particular, the authentication, encryption, and key management schemes in cryptography are discussed. Furthermore, we propose two methods for achieving the threshold key management in blockchain-based ITS. The proposed threshold key management scheme (with threshold t ) enables various stakeholders to recover a secret if the number of participated stakeholders is at least t . It should be noted that the proposed threshold key management scheme is efficient and secure for multiple users in blockchain-based ITS, especially for the data-sharing scenario.


Presently usage of smart mobiles increasing, due to internet availability most of users outsourcing their data to cloud but it is untrusted, so a security mechanism needed in this work proposing Homomorphic cipher text policy-Attribute based encryption (HCP-ABE), it derived from classic ABE. “Mobile cloud computing are combinations of mobile computing and cloud computing”, mobile applications are designed and hosted in cloud computing without verifying about mobile environment. Security models are constructed using Perturbation methods as per literature. These models are not secure compared to cryptographic techniques. When perturbation methods are used, Data reconstruction becomes a significant challenge. Hence computations are complicated to perform. Furthermore, this method suffers a trade-off between accuracy and privacy and most of the research work focused on key management issues and static access policies but due to user dynamic the access control mechanism should design for proactive strategies. To support dynamic access control and operations HCP-ABE scheme intended. In this paper we identify challenges associated with mobile cloud-based security system and possible provide solutions to understand existing research work conducting compressive review on different access control mechanisms.


2019 ◽  
Vol 8 (2) ◽  
pp. 3405-3412 ◽  

Mobile Cloud computing is define as the new paradigm, and in this new paradigm computational power is on demand service and accessible through mobiles and tablets. When user decides to go towards cloud computing, there is a risk of losing control on his own data. So providing security of the data during transmission and when saved on the cloud storage is a major issue. Any application relying upon an emerging technology should consider the different possible threats. The principal reason why people are afraid of using Cloud technology is that data security and integrity among all other issues involved in Cloud technology constitute a great challenge. As data security issues, access control as well as key management are also a reason why Cloud technology is not widely adopted. In mobile cloud computing, the security related to data involving data integrity, confidentiality, availability and traceability is the most critical concern of cloud users. As now mobile cloud is changing how users used to work over the network, by helping them in terms of cost and reduction of tasks complexity. Hence, it is very important for the user to be ensured that the transmission of the data is secure, that the consistency as well as the storage of the data on the cloud provider side is secured. Hence the necessity for developing trust security model is demanding.


2017 ◽  
Vol 9 (4) ◽  
pp. 1245-1257 ◽  
Author(s):  
Gangman Yi ◽  
Yoon-A Heo ◽  
Hwirim Byun ◽  
Young-Sik Jeong

Sign in / Sign up

Export Citation Format

Share Document