Skip to main content

Advertisement

Log in

Packet Encryption for Securing Real-Time Mobile Cloud Applications

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

The evolution of smart devices has brought the most confidential data to mobile applications and cloud computing with its processing power is serving the huge processing requirements of these applications. However, these advancements has brought in serious data security concerns, as there is constant shuttling of data from devices to cloud and backforth, and encryption is the most commonly used technique for securing data in transmission. Every encryption technique is breakable, but its efficiency is calculated with the time it can withstand an attack. But in today’s world, as cloud computing comes with almost unlimited computing resources, the present day encryption techniques might become inadequate for securing confidential data in transmission and after transmission. Existing encryption techniques, encrypt the whole data packets in a session using the same session key. If a third party can decrypt a single packet during or after transmission, all the packets in that session can be compromised. This work proposes a packet encryption scheme, where a packet key once used will never be used throughout the session, with minimal latency and maximum security for real-time mobile cloud applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Khan A u R, Othman M, Madani SA, Khan SU (2014) A Survey of Mobile Cloud Computing Application Models. IEEE Commun Surve Tutorials 16(1):393–413

    Article  Google Scholar 

  2. Skourletopoulos G et al (2017) Towards Mobile Cloud Computing in 5G Mobile Networks: Applications, Big Data Services and Future Opportunities. In: Mavromoustakis C, Mastorakis G, Dobre C (eds) Advances in Mobile Cloud Computing and Big Data in the 5G Era. Studies in Big Data, vol 22. Springer, Cham

    Google Scholar 

  3. What is mobile cloud computing? (2013) https://www.ibm.com/blogs/cloud-computing/2013/06/mobile-cloud-computing/. Accessed: 14-10-2017

  4. Mollah MB, Azad MAK, Vasilakos A (2017) Security and privacy challenges in mobile cloud computing: Survey and way ahead. J Netw Comput Appl 84:38–54

    Article  Google Scholar 

  5. Akherfi K, Gerndt M, Harroud H (2018) Mobile cloud computing for computation offloading: Issues and challenges. Appl Comput Inf 14(1):1–16

    Google Scholar 

  6. Jung Y, Festijo E (2014) One-time packet key exchange scheme for secure real-time multimedia applications. J Comput Syst Sci 80:1584–1596

    Article  Google Scholar 

  7. Jung Y, Festijo E (2013) Securing RTP packets using per-packet selective encryption scheme for real-time multimedia applications: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Pages: 659–666

  8. Jung Y, Festijo E, Foster JWA (2013) Securing RTP Packets Using Per-Packet Key Exchange for Real-Time Multimedia. ETRI J 35(Number 4):726–729

    Article  Google Scholar 

  9. Rescorla E (1999) Diffie–Hellman Key Agreement Method, RFC2631 (proposed standard)

  10. Freier et al., (2011) The Secure Sockets Layer (SSL) Protocol Version 3.0, RFC 6101

  11. Dierks & Rescorla (2008) The Transport Layer Security (TLS) Protocol Version 1.2, RFC 5246

  12. Zou Y, Zhu J, Wang X, Hanzo L (2016) A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proc IEEE 104(9):1727–1765

    Article  Google Scholar 

  13. Khasawneh M, Kajman I, Alkhudaidy R, Althubyani A (2014) A Survey on Wi-Fi Protocols: WPA and WPA2. In: Martínez Pérez G., Thampi S.M., Ko R., Shu L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, vol 420. Springer, Berlin, Heidelberg

  14. Sheldon FT, Oak Ridge National Laboratory, Weber JM, Yoo S-M, Pan WD, (2012) The Insecurity of Wireless Networks, IEEE Security & Privacy Magazine, volume: 10, Issue: 4, Pages: 54–61

  15. Hamzeh, et al., (1999) Point-to-Point Tunneling Protocol (PPTP), RFC 2637

  16. Microsoft Windows CE 3.0 Support of PPP and PPTP (2000). Microsoft Corporation https://msdn.microsoft.com/en-us/library/ms834454.aspx. Accessed: 17-05-2018

  17. Simion D, Ursuleanu F, Mihai G, Adrian P, Dan A, Lavric A (2012) Efficiency Consideration for Data Packets Encryption within Wireless VPN Tunneling for Video Streaming. Int J Comput Commun Control 8:136

    Article  Google Scholar 

  18. Townsley, et al., (1999) Layer Two Tunneling Protocol "L2TP", RFC 2661

  19. L2TP Tunnel Setup and Teardown (2018) https://www.cisco.com/c/en/us/support/docs/dial-access/virtual-private-dialup-network-vpdn/23980-l2tp-23980.html#t2. Accessed: 17-05-2018

  20. Frankel K (2011) IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap, RFC 6071

  21. Rosu SM, Popescu MM, Dragoi G, Guica IR (2012) The Virtual Enterprise Network based on IPSec VPN Solutions and Management, International Journal of Advanced Computer Science and Applications, Vol. 3, No. 11

  22. VPNs and VPN Technologies (2002) http://www.ciscopress.com/articles/article.asp?p=24833&seqNum=3. Accessed: 17-05-2018

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ajay D M.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ajay D M, Umamaheswari E Packet Encryption for Securing Real-Time Mobile Cloud Applications. Mobile Netw Appl 24, 1249–1254 (2019). https://doi.org/10.1007/s11036-019-01263-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-019-01263-1

Keywords

Navigation