A comparative study and workload distribution model for re-encryption schemes in a mobile cloud computing environment

Abdul Nasir Khan, Mazhar Ali, Atta ur Rehman Khan, Fiaz Gul Khan, Iftikhar Ahmed Khan, Waqas Jadoon, Shahab Shamshirband, Anthony T. Chronopoulos

Research output: Research - peer-reviewArticle

Abstract

The researchers are using the various variations of re-encryption schemes, which migrate the computational intensive re-encryption jobs of mobile devices to the trusted entity/cloud. However, the messages are still encrypted and decrypted using the limited computational power of mobile devices. Our contribution in this paper is to propose a workload distribution model for re-encryption schemes, which offloads the computational intensive operations, such as encryption and decryption on a trusted entity. Moreover, the proposed workload distribution model is compared with existing re-encryption schemes of resource utilization on trusted entity and mobile device. The experimental results show substantial improvement in performance compared to the existing schemes.

LanguageEnglish (US)
JournalInternational Journal of Communication Systems
DOIs
StateAccepted/In press - 2017

Fingerprint

Mobile cloud computing
Cryptography
Mobile devices

Keywords

  • Mobile cloud computing
  • Privacy
  • Proxy re-encryption schemes
  • Security

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Cite this

A comparative study and workload distribution model for re-encryption schemes in a mobile cloud computing environment. / Khan, Abdul Nasir; Ali, Mazhar; Khan, Atta ur Rehman; Khan, Fiaz Gul; Khan, Iftikhar Ahmed; Jadoon, Waqas; Shamshirband, Shahab; Chronopoulos, Anthony T.

In: International Journal of Communication Systems, 2017.

Research output: Research - peer-reviewArticle

Khan, Abdul Nasir ; Ali, Mazhar ; Khan, Atta ur Rehman ; Khan, Fiaz Gul ; Khan, Iftikhar Ahmed ; Jadoon, Waqas ; Shamshirband, Shahab ; Chronopoulos, Anthony T./ A comparative study and workload distribution model for re-encryption schemes in a mobile cloud computing environment. In: International Journal of Communication Systems. 2017
@article{e4b35d0aa9e24310ab066f144d691bfd,
title = "A comparative study and workload distribution model for re-encryption schemes in a mobile cloud computing environment",
abstract = "The researchers are using the various variations of re-encryption schemes, which migrate the computational intensive re-encryption jobs of mobile devices to the trusted entity/cloud. However, the messages are still encrypted and decrypted using the limited computational power of mobile devices. Our contribution in this paper is to propose a workload distribution model for re-encryption schemes, which offloads the computational intensive operations, such as encryption and decryption on a trusted entity. Moreover, the proposed workload distribution model is compared with existing re-encryption schemes of resource utilization on trusted entity and mobile device. The experimental results show substantial improvement in performance compared to the existing schemes.",
keywords = "Mobile cloud computing, Privacy, Proxy re-encryption schemes, Security",
author = "Khan, {Abdul Nasir} and Mazhar Ali and Khan, {Atta ur Rehman} and Khan, {Fiaz Gul} and Khan, {Iftikhar Ahmed} and Waqas Jadoon and Shahab Shamshirband and Chronopoulos, {Anthony T.}",
year = "2017",
doi = "10.1002/dac.3308",
journal = "International Journal of Communication Systems",
issn = "1074-5351",
publisher = "John Wiley and Sons Ltd",

}

TY - JOUR

T1 - A comparative study and workload distribution model for re-encryption schemes in a mobile cloud computing environment

AU - Khan,Abdul Nasir

AU - Ali,Mazhar

AU - Khan,Atta ur Rehman

AU - Khan,Fiaz Gul

AU - Khan,Iftikhar Ahmed

AU - Jadoon,Waqas

AU - Shamshirband,Shahab

AU - Chronopoulos,Anthony T.

PY - 2017

Y1 - 2017

N2 - The researchers are using the various variations of re-encryption schemes, which migrate the computational intensive re-encryption jobs of mobile devices to the trusted entity/cloud. However, the messages are still encrypted and decrypted using the limited computational power of mobile devices. Our contribution in this paper is to propose a workload distribution model for re-encryption schemes, which offloads the computational intensive operations, such as encryption and decryption on a trusted entity. Moreover, the proposed workload distribution model is compared with existing re-encryption schemes of resource utilization on trusted entity and mobile device. The experimental results show substantial improvement in performance compared to the existing schemes.

AB - The researchers are using the various variations of re-encryption schemes, which migrate the computational intensive re-encryption jobs of mobile devices to the trusted entity/cloud. However, the messages are still encrypted and decrypted using the limited computational power of mobile devices. Our contribution in this paper is to propose a workload distribution model for re-encryption schemes, which offloads the computational intensive operations, such as encryption and decryption on a trusted entity. Moreover, the proposed workload distribution model is compared with existing re-encryption schemes of resource utilization on trusted entity and mobile device. The experimental results show substantial improvement in performance compared to the existing schemes.

KW - Mobile cloud computing

KW - Privacy

KW - Proxy re-encryption schemes

KW - Security

UR - http://www.scopus.com/inward/record.url?scp=85016334847&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85016334847&partnerID=8YFLogxK

U2 - 10.1002/dac.3308

DO - 10.1002/dac.3308

M3 - Article

JO - International Journal of Communication Systems

T2 - International Journal of Communication Systems

JF - International Journal of Communication Systems

SN - 1074-5351

ER -