Author : Sharanya G 1
Date of Publication :30th November 2017
Abstract: The way we store and share data has been revolutionized with the help of mobile device and its applications. It is now becoming warehouse to store personal information of the user. The data stored here are mostly in encrypted format, resulting in security threats. In this paper, we propose a protocol called CLOAK which is computationally efficient and light in weight for the mobile devices. CLOAK is based on stream cipher that generates and distributes cryptographically secure pseudo-random numbers (CSPRN) with the help of external devices. Here we use the concept of symmetric key cryptography to enhance the security of the protocol. There are three versions of protocol referred as d-CLOAK, s-CLOAK, r-CLOAK, and these protocols differ on the basis of key selection procedure. To secure data at its origin a core encryption/decryption of a CLOAK is performed within the mobile devices. Here deception method is used ensure the security of CSPRN.Using mutual identity verification all messages are exchanged securely between mobile and the server in a CLOAK. We use Android smartphones to evaluate CLOAK, and for generating CSPRN we use Amazon web services.
Reference :
-
- H. T. Dinh, C. Lee, D. Niyato, and P. Wang, ‘A survey of mobile cloud computing: architecture, applications, and approaches,'' Wireless Communication. Mobile Comput., vol. 13, no. 18, pp. 1587_1611, 2013.
- S. Song, B. Y. Choi, and D. Kim, ``Selective encryption and component oriented deduplication for mobile cloud data computing,'' in Proc. Int.Conf. Comput., Netw. Commun. (ICNC), Feb. 2016, pp. 1_5.
- (2015). Pseudo-Random Numbers. (N.D.) Computer Desktop Encyclopedia (1981_2015). [Online]. Available: http://encyclopedia The free dictionary.com/pseudo-random Cnumbers.
- D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji, ``A methodology for empirical analysis of permission-based security models and its application to android,'' in Proc. 17th ACM Conf. Comput. Commun. Secure., 2010, pp. 73_84.