Abstract

In mobile cloud computing (MCC), data are stored and processed by more powerful computing platforms located in clouds to enhance the capability of mobile devices. Although MCC brings many benefits to users and organizations, security has become the main concern for MCC because it involves third party environment where data confidentiality is not a guarantee. To overcome this challenge, attribute-based encryption (ABE) technique, a promising cryptography method was introduced to support both data confidentiality and access control simultaneously. However, most of the ABE used single certification authority (CA) and disjoint attribute authority (AA) to verify user identity which can be a single point of failure. Therefore, a new approach was proposed in this research to deal with the single point of failure in the authority. Furthermore, the cache-based scheduling algorithm was upgraded to improve the response time of user jobs. The experimental results show that the approach performed better compared to its competitor in terms of reliability. Additionally, it significantly reduced the number of read operations compared to its counterpart.

Highlights

  • Organizations stored their data on local servers

  • ATTRIBUTE AUTHORITY (AA) attribute authority (AA) is responsible for providing the encryption and decryption credentials to the owners/users certified by certification authority (CA)

  • WORK In this paper, an agent-based attributebased encryption (ABE) access control method was proposed for the mobile cloud environment

Read more

Summary

INTRODUCTION

Organizations stored their data on local servers. The members of the organization could access the data using mobile devices with specific software installed. Mobile cloud computing (MCC) was introduced to enable the data stored on cloud are accessible to mobile users anywhere and any time [2]. In MCC, data are stored and processed on cloud to enhance the capability of mobile device. The data stored on public cloud can be leaked if it is not stored in encrypted form [4] To solve this problem, attribute-based encryption (ABE) was introduced in the literature.

RELATED WORK
BILINIAR PAIRING
PROPOSED SOLUTION
AUTHORITY AGENT
ENCRYPTION
DECRYPTION
ACCESS OF DATA THROUGH SSA USING CACHE BASED SCHEDULING
END FOR
PROTECTION AGAINST MALWARE THREAT
CONCLUSION AND FUTURE WORK

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.