Author : D. Bhanu Pratap 1
Date of Publication :19th April 2018
Abstract: With the recognition of cloud computing, mobile devices will store/retrieve personal knowledge from anyplace at any time. Consequently, the information security drawback in mobile cloud becomes additional and additional severe and prevents additional development of mobile cloud. There square measure substantial studies that are conducted to enhance the cloud security. However, most of them don't seem to be applicable for mobile cloud since mobile devices solely have restricted computing resources and power. Solutions with low process overhead square measure in nice want for mobile cloud applications. during this paper, we tend to propose a light-weight knowledge sharing theme (LDSS) for mobile cloud computing. It adopts CP-ABE, AN access management technology employed in traditional cloud surroundings, however changes the structure of access management tree to create it appropriate for mobile cloud environments. LDSS moves an outsized portion of the process intensive access management tree transformation in CP-ABE from mobile devices to external proxy servers. what is more, to cut back the user revocation value, it introduces attribute description fields to implement lazy-revocation, that could be a thorny issue in program based mostly CP-ABE systems. The experimental results show that LDSS will effectively cut back the overhead on the mobile device aspect once users square measure sharing knowledge in mobile cloud environments.
Reference :
-
- upper crust C, Halevi S. Implementing gentry’s fullyhomomorphic cryptography theme. in: Advances in Cryptology–EUROCRYPT 2011. Berlin, Heidelberg: Springer press, pp. 129-148, 2011.
- Brakerski Z, Vaikuntanathan V. economical absolutely homomorphic cryptography from (standard) LWE. in: continuing of IEEE conference on Foundations of engineering. California, USA: IEEE press, pp. 97-106, Oct. 2011.
- Qihua Wang, Hongxia Jin. "Data run mitigation for discertionary access management together clouds". the sixteenth ACM conference on Access management Models and Technologies (SACMAT), pp.103-122, Jun. 201