Abstract

Ensuring security for lightweight cryptosystems in mobile cloud computing is challenging. Encryption speed and battery consumption must be maintained while securing mobile devices, the server, and the communication channel. This study proposes a lightweight security protocol called FEATHER which implements MICKEY 2.0 to generate keystream in the cloud server and to perform mobile device decryption and encryption. FEATHER can be used to implement secure parameters and lightweight mechanisms for communication among mobile devices and between them and a cloud server. FEATHER is faster than the existing CLOAK protocol and consumes less battery power. FEATHER also allows more mobile devices to communicate at the same time during very short time periods, maintain security for more applications with minimum computation ability. FEATHER meets mobile cloud computing requirements of speed, identity, and confidentiality assurances, compatibility with mobile devices, and effective communication between cloud servers and mobile devices using an unsafe communication channel.

Highlights

  • Data transfer between two mobile devices and from a mobile device to the cloud should be done securely, through multiple different communication channels, such as Wi-Fi, 4G and 5G

  • The performance of FEATHER protocol is measured on two items: the overall speed and battery consumption

  • After running GSam and the mobile app for FEATHER, the results showed that performing the operations on 10 files varying in size from 2 to 16MB consumed less than 1% of all apps running in the background, which consumed 1% of battery power, so FEATHER consumes only 0.0001% of battery power

Read more

Summary

INTRODUCTION

Data transfer between two mobile devices and from a mobile device to the cloud should be done securely, through multiple different communication channels, such as Wi-Fi, 4G and 5G. A secure protocol for data transfer through unsecure communication methods is required. As mobile devices have limited computation power, it can be difficult to address all security cryptosystem tasks. Authors in [1] proposed a mobile cloud computing enterprise that consists of mobile devices, a wireless core, Wi-Fi access points, and regional information centres. Authors in [2] showed that mobile computing could save energy, such as battery life and wireless energy, by offloading some tasks to a cloud server, which is used to transfer the data in some applications, some applications are not energy efficient. As well as the demand for a lighter security protocol to save time and address computation. This paper proposes a new protocol, FEATHER, to better meet the security and energy needs of mobile cloud computing and mobile devices than existing protocols

Mobile Computing
Cloud Computing
LITERATURE REVIEW
The Advantage of using Stream Ciphers in Small Devices
AES and CLOAK Protocols
Algorithmic Demonstration of the FEATHER Protocol
PROTOCOL IMPLEMENTATION
UPDATE
VALIDATE
GENERATE
UPLOAD
REQUEST
Speed Performance
D-1 LG V20
Man in the Middle Attacks
Power Consumption
Insider Attacks
Denial of Service Attacks
Chosen IV-Attacks
Two-time Pad Attacks
Impersonation Attacks
Brute Force attacks
VIII. DISCUSSION
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call