Abstract
The 21st century has witnessed the rapid development of small and convenient mobile devices such as smartphones, tablets, game players, sensor nodes, etc. The rise of such mobile devices indicates the increase of colossal data transmission through the Internet and online services along with the challenges of data security. It is common to think of a solution to protect sensitive data from unauthorized users, and the most popular solution is to use encryption. While many research activities in functional encryption have widely been applied to network devices, computers, and applications, mobile devices still attract much attention to security issues due to the limitations of system resources, connectivity, data transmission and power consumption that malicious users can exploit to launch attacks. Especially, mobile devices have become a principal tool to share data on the Internet through online services, such as Facebook, Youtube, DropBox, Amazon, Online Games, etc. This paper presents a study of the Attribute-Based Encryption (ABE) scheme that exploits user attributes to build the secret key and the ciphertext. ABE encryption is specified by a set of attributes or a policy defining attributes that users possess. The paper also describes a few implementations of ABE applied in the cryptography community and the challenges of integrating ABE into real-world applications. Finally, the paper proposes an implementation of ABE for Android mobile devices. This implementation associated with the Kerberos protocol can be applied to secured data sharing applications. The Kerberos protocol aims at providing mutual authentication for the client server model. Experiments have evaluated the proposed ABE implementation on Android mobile devices along with the Kerberos system. The evaluation also includes ABE performance with discussions and lessons learned.
Highlights
Many cryptographic schemes are based on the notion of the secret/private key within asymmetric cryptography or symmetric cryptography
We have provided an implementation of the Attribute-Based Encryption (ABE) scheme for Android mobile devices with the Kerberos protocol and evaluated several security features for secured data sharing and performance of ABE on various file sizes
With the increasing expansion of cloud computing, IoT, mobile devices, this study can be applied for data security and privacy protection
Summary
Many cryptographic schemes are based on the notion of the secret/private key within asymmetric cryptography or symmetric cryptography. Users use mobile devices to send data to such services or servers, and it is recommended for users to encrypt data before sending it For both asymmetric and symmetric cryptography mechanisms, the receiving entity must have a secret/private key to decrypt data that is intentionally encrypted for that entity. The theoretical ABE scheme resolves these processes by exploiting user attributes when constructing the private key and the ciphertext This scheme can be applied to protecting communication between mobile devices and a server. We use a mobile application for users to scan around the vicinity of the current location for the nearest doctors Users can upload their encrypted health records with a policy that specifies the doctors of specialized fields depending on their particular symptoms.
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have