Efficient key distribution protocol for mobile devices in cloud environments
-
2018-04-03 https://doi.org/10.14419/ijet.v7i2.12.11027 -
Cloud Computing, Authentication Protocol, Distribution Process, XOR, Mobile Device, Key Generation & Distribution. -
Abstract
Background/Objectives: Recently, as the fourth industrial revolution has emerged, cloud computing services have been attracting attention for efficient use of Internet-based computing resources. Among the cloud computing services, even if the data processed by the mobile device is encrypted after being stored in the server, the confidential information can be leaked. Therefore, there is a need for the key generation for data encryption and decryption.
Methods/Statistical analysis: In this paper, we propose a key distribution protocol that enables mobile devices to securely encrypt and decrypt keys in an efficient manner in a cloud environment. The main purpose of the proposed protocol is to maximize the efficiency and cost reduction of key generation, which can securely transmit and receive data, in a situation where the size of data used in the cloud environment and the storage location are increasing. As a result of the performance evaluation, the proposed method improved the authentication processing time by 4.1% on average compared with the existing protocol, and the average throughput rate of the server per unit time was 6.5%. In addition, the communication delay time between the authentication server and the mobile device improved by 9.3% on average, and the authentication overhead of the server was 11.5% lower than that of the conventional method.
Findings: In order to solve this problem, the proposed protocol can solve the security problem of the mobile device because it can receive the authentication through the one - way hash function and the XOR operation using the encrypted data using the session key.
Improvements/Applications: In future studies, we will apply the proposed protocol to the actual environment based on the results of this study and compare it with the results obtained from the theoretical studies.
Â
-
References
[1] Matsunaga R,Ricarte I, Basso T, Moraes R, Towards an Ontology-Based Definition of Data Anonymization Policy for Cloud Computing and Big Data,47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), 22017, pp. 75-82.
[2] Banerjee A, Hasan M, Rahman A, Chapagain R, CLOAK: A Stream Cipher Based Encryption Protocol for Mobile CloudComputing, IEEE Access, 2017, PP(99), pp.1-1.
[3] Ye X,Yin Y, Lsan L, Energy-Efficient Many-Objective Virtual Machine Placement Optimization in a Cloud Computing Environment, IEEE Access, 2017, 5, pp. 16006-16020.
[4] Stergiou C, Psannis K E, Algorithms for Big Data in Advanced Communication Systems and CloudComputing, IEEE 19th Conference on Business Informatics (CBI), 2017, 01, pp. 196-201.
[5] Taleb T, Samdanis K, Mada B, Flinck H, Dutta S, Sabella D, On Multi-Access Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration, IEEE Communications Surveys & Tutorials, 2017, 19(3), pp. 1657-1681.
[6] Shen P, Zhou Y, Chen K, Enhancing reliability via checkpointing in cloud computing systems, China Communications, 2017, 14(7), pp. 1-10.
[7] Li J, Yao W, Zhang Y, Qian H, Han J, Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing, IEEE Transactions on Services Computing, 2017, 10(5), pp. 785-796.
[8] Krishnamurthi G, Chan T K, Using the Liberty Alliance Architecture to Secure IP-level Handovers, 1st International Conference on Communication Systems Software & Middleware, 2006, pp. 1-10.
[9] Al-Ayed F, Liu H, Synopsis of Security: Using Kerberos Method to Secure File Transfer Sessions, International Conference on Computational Science and Computational Intelligence (CSCI), 2016, pp. 1016-1020.
[10] Achemlal M, Gharout S,Gaber C, Trusted Platform Module as an Enabler for Security in Cloud Computing, Conference on Network and Information Systems Security, 2011, pp. 1-6.
[11] Yamansavascilar B, Guvensan M A, Yavuz A G, Karsligil M E, Application identification via network traffic classification, International Conference on Computing, Networking and Communications (ICNC), 2017, pp. 843-848.
[12] Alves J M, Rodrigues T G, Beserra D W, Fonseca J C, Endo P T, Kelner J, Multi-Factor Authentication with OpenId in Virtualized Environments, IEEE Latin America Transactions, 2017, 15(3), pp. 528-533.
[13] Liao I E, Lee C C, Hwang M S, A password authentication scheme over insecure networks, Journal of Computer. System Sciences, 2006, 72(4), pp. 727-740.
[14] Shoup V, Rubin A, Session key distribution using smartcards, Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques, 1996, pp. 321-333.
[15] Bellare M, Rogaway P, Provably secure session key distribution-The third party case, Proceedings of the twenty-seventh annual ACM symposium on Theory of computing, 1995, pp. 57-66.
[16] Lee S, Ong I, Lim H T, Lee H J, Two factor authentication for cloud computing, International Journal of KIMICS, 2010, 8, pp. 427-432.
[17] Shen Z, Li L, Yan F, Wu X, Cloud Computing System Based on Trusted Computing Platform, International Conference on Intelligent Computation Technology and Automation (ICICTA),2010, 1, pp. 942-945.
[18] Celesti A, Tusa F, Villari M, Puliafito A, Security and Cloud Computing: InterCloud Identity Management Infrastructure, 19th IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), 2010, pp. 263-265.
[19] Vijay R S, Madhavi Y, Venkateswarlu C, Ipath: Path Inference in Wireless Sensor Networks, International Journal of Innovative Research in Computer and Communication Engineering, 2017, 5(3), pp. 4226-4232.
[20] OpenEMed, http://openemed.org/.
[21] Holzinger A, Sammeer P, Hofmann-Wellenhof Rainer, Mobile Computing in Medicine: Designing Mobile Questionnaires for Elderly and Partially Sighted People, International Conference on Computers for Handicapped Persons, 2006, pp. 732-739.
[22] Moteiv, www.moteiv.com, March 20 2006.
[23] Shnayder V, Chen B, Lorincz K, FulfordJones T R F, Welsh M, Sensor networks for medical care, Technical Report TR-08-05, Harvard University, Division of Engineering and Applied Sciences, 2005.
[24] Apollohospitals, http://www.apollohospitals.com, 2006.
-
Downloads
-
How to Cite
Su Jeong, Y., Tae Kim, Y., & Cheol Park, G. (2018). Efficient key distribution protocol for mobile devices in cloud environments. International Journal of Engineering & Technology, 7(2.12), 18-24. https://doi.org/10.14419/ijet.v7i2.12.11027Received date: 2018-04-03
Accepted date: 2018-04-03
Published date: 2018-04-03