Abstract
The evolution of smart devices has brought the most confidential data to mobile applications and cloud computing with its processing power is serving the huge processing requirements of these applications. However, these advancements has brought in serious data security concerns, as there is constant shuttling of data from devices to cloud and backforth, and encryption is the most commonly used technique for securing data in transmission. Every encryption technique is breakable, but its efficiency is calculated with the time it can withstand an attack. But in today’s world, as cloud computing comes with almost unlimited computing resources, the present day encryption techniques might become inadequate for securing confidential data in transmission and after transmission. Existing encryption techniques, encrypt the whole data packets in a session using the same session key. If a third party can decrypt a single packet during or after transmission, all the packets in that session can be compromised. This work proposes a packet encryption scheme, where a packet key once used will never be used throughout the session, with minimal latency and maximum security for real-time mobile cloud applications.


Similar content being viewed by others
References
Khan A u R, Othman M, Madani SA, Khan SU (2014) A Survey of Mobile Cloud Computing Application Models. IEEE Commun Surve Tutorials 16(1):393–413
Skourletopoulos G et al (2017) Towards Mobile Cloud Computing in 5G Mobile Networks: Applications, Big Data Services and Future Opportunities. In: Mavromoustakis C, Mastorakis G, Dobre C (eds) Advances in Mobile Cloud Computing and Big Data in the 5G Era. Studies in Big Data, vol 22. Springer, Cham
What is mobile cloud computing? (2013) https://www.ibm.com/blogs/cloud-computing/2013/06/mobile-cloud-computing/. Accessed: 14-10-2017
Mollah MB, Azad MAK, Vasilakos A (2017) Security and privacy challenges in mobile cloud computing: Survey and way ahead. J Netw Comput Appl 84:38–54
Akherfi K, Gerndt M, Harroud H (2018) Mobile cloud computing for computation offloading: Issues and challenges. Appl Comput Inf 14(1):1–16
Jung Y, Festijo E (2014) One-time packet key exchange scheme for secure real-time multimedia applications. J Comput Syst Sci 80:1584–1596
Jung Y, Festijo E (2013) Securing RTP packets using per-packet selective encryption scheme for real-time multimedia applications: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Pages: 659–666
Jung Y, Festijo E, Foster JWA (2013) Securing RTP Packets Using Per-Packet Key Exchange for Real-Time Multimedia. ETRI J 35(Number 4):726–729
Rescorla E (1999) Diffie–Hellman Key Agreement Method, RFC2631 (proposed standard)
Freier et al., (2011) The Secure Sockets Layer (SSL) Protocol Version 3.0, RFC 6101
Dierks & Rescorla (2008) The Transport Layer Security (TLS) Protocol Version 1.2, RFC 5246
Zou Y, Zhu J, Wang X, Hanzo L (2016) A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proc IEEE 104(9):1727–1765
Khasawneh M, Kajman I, Alkhudaidy R, Althubyani A (2014) A Survey on Wi-Fi Protocols: WPA and WPA2. In: Martínez Pérez G., Thampi S.M., Ko R., Shu L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, vol 420. Springer, Berlin, Heidelberg
Sheldon FT, Oak Ridge National Laboratory, Weber JM, Yoo S-M, Pan WD, (2012) The Insecurity of Wireless Networks, IEEE Security & Privacy Magazine, volume: 10, Issue: 4, Pages: 54–61
Hamzeh, et al., (1999) Point-to-Point Tunneling Protocol (PPTP), RFC 2637
Microsoft Windows CE 3.0 Support of PPP and PPTP (2000). Microsoft Corporation https://msdn.microsoft.com/en-us/library/ms834454.aspx. Accessed: 17-05-2018
Simion D, Ursuleanu F, Mihai G, Adrian P, Dan A, Lavric A (2012) Efficiency Consideration for Data Packets Encryption within Wireless VPN Tunneling for Video Streaming. Int J Comput Commun Control 8:136
Townsley, et al., (1999) Layer Two Tunneling Protocol "L2TP", RFC 2661
L2TP Tunnel Setup and Teardown (2018) https://www.cisco.com/c/en/us/support/docs/dial-access/virtual-private-dialup-network-vpdn/23980-l2tp-23980.html#t2. Accessed: 17-05-2018
Frankel K (2011) IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap, RFC 6071
Rosu SM, Popescu MM, Dragoi G, Guica IR (2012) The Virtual Enterprise Network based on IPSec VPN Solutions and Management, International Journal of Advanced Computer Science and Applications, Vol. 3, No. 11
VPNs and VPN Technologies (2002) http://www.ciscopress.com/articles/article.asp?p=24833&seqNum=3. Accessed: 17-05-2018
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ajay D M, Umamaheswari E Packet Encryption for Securing Real-Time Mobile Cloud Applications. Mobile Netw Appl 24, 1249–1254 (2019). https://doi.org/10.1007/s11036-019-01263-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-019-01263-1