留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

基于身份的并行增量移动云存储方案

上一篇

下一篇

柯钢. 基于身份的并行增量移动云存储方案[J]. 西南师范大学学报(自然科学版), 2018, 43(10): 87-96. doi: 10.13718/j.cnki.xsxb.2018.10.016
引用本文: 柯钢. 基于身份的并行增量移动云存储方案[J]. 西南师范大学学报(自然科学版), 2018, 43(10): 87-96. doi: 10.13718/j.cnki.xsxb.2018.10.016
KE Gang. Parallel Incremental Mobile Cloud Data Storage Scheme on Identity-Based Cryptography[J]. Journal of Southwest China Normal University(Natural Science Edition), 2018, 43(10): 87-96. doi: 10.13718/j.cnki.xsxb.2018.10.016
Citation: KE Gang. Parallel Incremental Mobile Cloud Data Storage Scheme on Identity-Based Cryptography[J]. Journal of Southwest China Normal University(Natural Science Edition), 2018, 43(10): 87-96. doi: 10.13718/j.cnki.xsxb.2018.10.016

基于身份的并行增量移动云存储方案

Parallel Incremental Mobile Cloud Data Storage Scheme on Identity-Based Cryptography

  • 摘要: 针对移动云计算环境中的数据存储问题,提出了一种基于身份的并行增量移动云存储方案.该方案引用了并行计算思想,使用密文聚合技术,充分挖掘了现有移动客户端的性能,在效率和能耗之间达到了平衡;使用增量代理重加密算法,在将部分计算迁移至云计算中心的同时,提高其整体性能;不使用传统公钥证书,既减少了密钥管理压力,也实现了信息的保密性和完整性.实验表明,该方案提高了CPU的使用率,具有较强的可用性.
  • 加载中
  • [1] MEHTA M,AJMERA I,JONDHALE.Mobile Cloud Computing[J].International Journal of Electronics and Communication Engineering & Technology, 2013, 4(5):152-160.
    [2] FERNANDO N,LOKE S W,RAHAYU W.Mobile Cloud Computing:A Survey[J].Future Generation Computer Systems,2013,29(1):84-106.
    [3] HSUEH S C,LIN J Y,LIN M Y.Secure Cloud Storage for Convenient Data Archive of Smart Phones[C]//2011 IEEE 15th International Conference on Consumer Electronics. Singapore:IEEE,2011:156-161.
    [4] AI-RIYAMI S S,PATERSON K G.Certificateless Public Key Cryptography[C]//International Conference on the Theory and Application of Cryptology and Information Security.Advances in Cryptology-ASIACRYPT 2003.Taipei,Taiwan:Springer,2003:452-473.
    [5] BLAZE M,BLEUMER G,STRAUSS M.Divertible Protocols and Atomic Proxy Cryptography[C]//International Conference on the Theory and Application of Crytographic Techniques:Advances in Cryptology-EUROCRYPT'98.Espoo,Finland:Springer,1998:127-144.
    [6] TYSOWSKI P K,HASAN M A.Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds[J].IACR Cryptology ePrint Archive,2011, 668:1-10.
    [7] ITANI W,KAYSSI A,CHEHAB A.Energy-Efficient Incremental Integrity for Securing Storage in Mobile Cloud Computing[C]//2010 International Conference on Energy Aware Computing (ICEAC 2010),Cairo,Egypt:IEEE,2010:1-2.
    [8] JIA W,ZHU H,CAO Z,et al.SDSM:A Secure Data Service Mechanism in Mobile Cloud Computing[C]//2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Shanghai,China:IEEE,2011:1060-1065.
    [9] YANG J,WANG H,WANG J,et al.Provable Data Possession of Resource-Constrained Mobile Devices in Cloud Computing[J].Journal of Networks,2011,6(7):1033-1040.
    [10] KHAN A N,KIAH M L M,MADANI S A,et al.Incremental Proxy Re-Encryption Scheme for Mobile Cloud Computing Environment[J].Journal of Supercomputing,2014,68(2):624-651.
    [11] SON J,KIM D,BHUIYAN M Z A,et al.A New Outsourcing Conditional Proxy Re-Encryption Suitable for Mobile Cloud Environment[J].Concurrency & Computation Practice & Experience,2017, 29(14):e3946
    [12] NISHIKAWA N,AMANO H,IWAI K.Implementation of Bitsliced AES Encryption on CUDA-Enabled GPU[C]//International Conference on Network and System Security:NSS 2017.Helsinki,Finland:Springer,2017:273-287.
    [13] LIU B,BASS B M.Parallel AES Encryption Engines for Many-Core Processor Arrays[J].IEEE Transactions on Computers,2013,62(3):536-547.
    [14] HUANG R,RHEE K H,UCHIDA S.A Parallel Image Encryption Method Based on Compressive Sensing[J].Multimedia Tools and Applications,2014,72(1):71-93.
    [15] HAN Y,GUI X,WU X.Parallel Multi-Recipient Signcryption for Imbalanced Wireless Networks[J].International Journal of Innovative Computing Information & Control,2010,6(8):3621-3630.
    [16] ZHANG M, WU X,HAN Y.Parallel Multi-Recipient Proxy Re-Encryption for Secure Group Communication in Wireless Networks[J]. ICIC Express Letters,2013,7(8):2203-2209.
    [17] 柯钢.适用于云存储的并行无证书代理重加密方案[J].西南师范大学学报(自然科学版),2016,41(7):61-67.
    [18] GREEN M,ATENIESE G.Identity-Based Proxy Re-Encryption[C]//International Conference on Applied Cryptography and Network Security.Zhuhai,China:ACNS,2007:288-306.
    [19] GOETZ B,PEIERLS T,BLOCH J,et al.Java Concurrency in Practice[M].Boston:Addison-Wesley,2006.
    [20] KRISHNAPRASAD S.Uses and Abuses of Amdahl's Law[J].Journal of Computing Sciences in Colleges,2001,17(2):288-293.
    [21] BUONANNO E,KATZ J,YUNG M.Incremental Unforgeable Encryption[J].Lecture Notes in Computer Science,2002:109-124.
  • 加载中
计量
  • 文章访问数:  590
  • HTML全文浏览数:  336
  • PDF下载数:  33
  • 施引文献:  0
出版历程
  • 收稿日期:  2017-11-04

基于身份的并行增量移动云存储方案

  • 东莞职业技术学院 计算机工程系, 广东 东莞 523808

摘要: 针对移动云计算环境中的数据存储问题,提出了一种基于身份的并行增量移动云存储方案.该方案引用了并行计算思想,使用密文聚合技术,充分挖掘了现有移动客户端的性能,在效率和能耗之间达到了平衡;使用增量代理重加密算法,在将部分计算迁移至云计算中心的同时,提高其整体性能;不使用传统公钥证书,既减少了密钥管理压力,也实现了信息的保密性和完整性.实验表明,该方案提高了CPU的使用率,具有较强的可用性.

English Abstract

参考文献 (21)

目录

/

返回文章
返回