Analysis of Visible Light Communication using Integrated Avalanche Photodiode
Volume-4 | Issue-2
A Review on Identifying Suitable Machine Learning Approach for Internet of Things Applications
Volume-3 | Issue-3
TOWARDS GHZ METALLIC ACCESS NETWORKS
Volume-1 | Issue-1
REVIEW ON UBIQUITOUS CLOUDS AND PERSONAL MOBILE NETWORKS
Volume-1 | Issue-3
Process Control Ladder Logic Trouble Shooting Techniques Fundamentals
Volume-1 | Issue-4
TRUST BASED ROUTING ALGORITHM IN INTERNET OF THINGS (IoT)
Volume-1 | Issue-1
COMPUTATIONAL OFFLOADING FOR PERFORMANCE IMPROVEMENT AND ENERGY SAVING IN MOBILE DEVICES
Volume-1 | Issue-4
ANALYSIS OF ROUTING PROTOCOLS IN FLYING WIRELESS NETWORKS
Volume-1 | Issue-3
Dual Edge-Fed Left Hand and Right Hand Circularly Polarized Rectangular Micro-Strip Patch Antenna for Wireless Communication Applications
Volume-2 | Issue-3
Modified Gray Wolf Feature Selection and Machine Learning Classification for Wireless Sensor Network Intrusion Detection
Volume-3 | Issue-2
TRUST BASED ROUTING ALGORITHM IN INTERNET OF THINGS (IoT)
Volume-1 | Issue-1
Hybrid Micro-Energy Harvesting Model using WSN for Self-Sustainable Wireless Mobile Charging Application
Volume-3 | Issue-3
Three Phase Coil based Optimized Wireless Charging System for Electric Vehicles
Volume-3 | Issue-3
Cyber-attack and Measuring its Risk
Volume-3 | Issue-4
REVIEW ON UBIQUITOUS CLOUDS AND PERSONAL MOBILE NETWORKS
Volume-1 | Issue-3
Analysis of Solar Power Generation Performance Improvement Techniques
Volume-4 | Issue-3
Pollination Inspired Clustering Model for Wireless Sensor Network Optimization
Volume-3 | Issue-3
Design of Low Power Cam Memory Cell for the Next Generation Network Processors
Volume-3 | Issue-4
A STUDY OF RESEARCH NOTIONS IN WIRELESS BODY SENSOR NETWORK (WBSN)
Volume-1 | Issue-2
Computation of Constant Gain and NF Circles for 60 GHz Ultra-low noise Amplifiers
Volume-3 | Issue-3
Volume - 2 | Issue - 3 | september 2020
Published
02 January, 2021
As the need for super-fast mobile devices incorporating cloud computing technology continues to be the need of the hour, Mobile Cloud Computing (MCC) serves as the platform for mobile users to share data with others, store information on the cloud and also compute using the data. Over the years, the most widely preferred encryption that has proven to be reliable is Attribute Based Encryption (ABE). However, this encryption methodology requires expensive pairing operation which makes it unsuitable for MCC. As a result of this, MCC remains slow in reaching the crowd due to the challenge of resource-constrained mobile devices. To tackle this resource-constraint we propose a novel method of outsourcing operations to resource-rich cloud servers so that the constraint on resources does not hinder proper functioning of the mobile device. There are a number of advantages when data sharing is incorporated with lightweight fine-grain data sharing methodology. This method has a number of advantages such as CCA security level, resisting decryption key exposure and supporting verifiable outsourced decryption. Simulation results indicate that the performance analysis and concrete security proof is apt for MCC environment.
KeywordsCCA secure outsourced decryption mobile cloud computing attribute-based encryption decryption
Full Article PDF Download Article PDF