Abstract
For the last few years, academia and research organizations are continuously investigating and resolving the security and privacy issues of mobile cloud computing environment. The additional consideration in designing security services for mobile cloud computing environment should be the resource-constrained mobile devices. The execution of computationally intensive security services on mobile device consumes battery’s charging quickly. In this regard, the study presents a novel energy-efficient block-based sharing scheme that provides confidentiality and integrity services for mobile users in the cloud environment. The block-based sharing scheme is compared with the existing schemes on the basis of energy consumption, CPU utilization, memory utilization, encryption time, decryption time, and turnaround time. The experimental results show that the block-based sharing scheme consumes less energy, reduces the resources utilization, improves response time, and provides better security services to the mobile users in the presence of fully untrusted cloud server(s) as compared to the existing security schemes.















Similar content being viewed by others
References
Khan AN et al (2013) Towards secure mobile cloud computing: a survey. Future Gener Comput Syst 29(5):1278–1299
Khan A et al (2013) A survey of mobile cloud computing application models. IEEE Commun Surv Tutor 16(1):393–413
Kumar K, Lu YH (2010) Cloud computing for mobile users: can offloading computation save energy? Computer 43(4):51–56
Fox A et al (2009) Above the clouds: a Berkeley view of cloud computing. In: Technical report UCB/EECS, Department Electrical Engineering and Computer Sciences, University of California, Berkeley, p 28
Hashemi SM, Ardakani MRM (2012) Taxonomy of the security aspects of cloud computing systems—a survey. Int J Appl Inf Syst 4(1):21–28
Juniper (2010) Technical report: Mobile cloud computing: \({\$}\) 9.5 billion by 2014 . http://www.juniperresearch.com/reports/mobile_cloud_applications_and_services. Accessed 24 April 2013
Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11
Santos N, Gummadi KP, Rodrigues R (2009) Towards trusted cloud computing. In: Proceedings of the 2009 conference on Hot topics in cloud computing. USENIX Association
Khan AN et al (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Supercomput 66(3):1687–1706
Jia W et al (2011) SDSM: a secure data service mechanism in mobile cloud computing, In: IEEE conference on computer communications workshops (INFOCOM ’11). IEEE, Shanghai, pp 1060–1065
Khan AN et al (2014) Incremental proxy re-encryption scheme for mobile cloud computing environment. J Supercomput 68(2):624–651
Ren W et al (2011) Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing. Tsinghua Sci Technol 16(5):520–528
Zhang X et al (2009) Securing elastic applications on mobile devices for cloud computing. In: Proceedings of the 2009 ACM workshop on cloud computing security
Xiao S, Gong W (2010) Mobility can help: protect user identity with dynamic credential. In: 2010 IEEE 11th international conference on mobile data management (MDM)
Chow R et al (2010) Authentication in the clouds: a framework and its application to mobile users. In: Proceedings of the 2010 ACM workshop on cloud computing security workshop
Huang D et al (2010) MobiCloud: building secure cloud framework for mobile computing and communication. In: 5th IEEE international symposium on service oriented system engineering (SOSE ’10), pp 27–34
Huang D et al (2011) Secure data processing framework for mobile cloud computing. In: IEEE conference on computer communications workshops (INFOCOM WKSHPS ‘11), pp 614–618
Chen YJ, Wang LC (2011) A security framework of group location-based mobile applications in cloud computing. In: 40th IEEE international conference on parallel processing workshops (ICPPW ’11)
Bilogrevic I et al (2011) Meetings through the cloud: privacy-preserving scheduling on mobile devices. J Syst Softw 84(11):1910–1927
Itani W, Kayssi A, Chehab A (2010) Energy-efficient incremental integrity for securing storage in mobile cloud computing. In: International conference on energy aware computing (ICEAC ’10), IEEE, Cairo, pp 1–2
Hsueh SC, Lin JY, Lin MY (2011) Secure cloud storage for convenient data archive of smart phones. In: IEEE 15th international symposium on consumer electronics (ISCE ’11), pp 156–161
Yang J et al (2011) Provable data possession of resource-constrained mobile devices in cloud computing. J Netw 6(7):1033–1040
Zhou Z, Huang D (2012) Efficient and secure data storage operations for mobile cloud computing. In: 8th international conference on network and service management (CNSM ’12). IEEE, AZ, pp 37–45
Yu S et al (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings IEEE (INFOCOM ’10) 2010. IEEE, NJ, pp 1–9
Shao J, Cao Z (2009) CCA-secure proxy re-encryption without pairings. Public Key Cryptogr PKC 2009:357–376
Tysowski PK, Hasan MA (2011) Re-encryption-based key management towards secure and scalable mobile applications in clouds. In: IACR cryptology eprint archive, vol 668
Ateniese G et al (2006) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur (TISSEC) 9(1):1–30
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy (SP ’07)
Kim Y et al (2007) Key establishment scheme for sensor networks with low communication cost. Auton Trust Comput 441–448
Khan AN, Qureshi K, Khan S (2012) An intelligent approach of sniffer detection. Int Arab J Inf Technol 9(1):9–15
Khan AN, Qureshi K, Khan S (2009) Enhanced switched network sniffer detection technique based on IP packet routing. Inf Secur J Glob Perspect 18(4):153–162
Remote API for Java (2012) https://developers.google.com/appengine/docs/java/tools/remoteapiConfiguring_Remote_API_on_an_App_Engine_Client. Accessed 12 August 2012
Google Cloud Storage Java API Overview (2012) https://developers.google.com/appengine/docs/java/googlestorage/overview. Accessed 15 August 2012
DeviceInfo API (2012) http://www.blackberry.com/developers/docs/4.3.0api/net/rim/device/api/system/DeviceInfo.html. http://www.salesforce.com/us/developer/docs/apexcode/index.htm Accessed 02 April 2012
Murata T (1989) Petri nets: properties, analysis and applications. Proc IEEE 77(4):541–580
de Moura L, Bjørner N (2009) Satisfiability modulo theories: an appetizer. In: Formal methods: foundations and applications. Springer, New York, pp 23–36
Acknowledgments
We would like to acknowledge the financial support of the BrightSparks Program at University of Malaya, Malaysia for carrying out these research experiments.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Khan, A.N., Kiah, M.L.M., Ali, M. et al. BSS: block-based sharing scheme for secure data storage services in mobile cloud environment. J Supercomput 70, 946–976 (2014). https://doi.org/10.1007/s11227-014-1269-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-014-1269-8