Font Size: a A A

Study On Outsourcing The Attributed-based Decryption In Mobile Cloud Computing

Posted on:2015-09-28Degree:MasterType:Thesis
Country:ChinaCandidate:H JiaFull Text:PDF
GTID:2308330464970174Subject:Cryptography
Abstract/Summary:PDF Full Text Request
The advance of Mobile Cloud Computing combined the mobile device with the cloud platform which stores an abundance of data and offers more convenient services together, makes people more closer to the data stored in the internet. A numerous of user chooses outsourcing their private data to the remote cloud. However, the services may be unreliable, and the aggregation of the data brings more extensive and centralized attacks at the cloud servers, so the demand and challenge is put forward to protect the security of storing the data in the cloud platform. Meanwhile, to share the data between the users, it is necessary to offer the strategy of the access with limits. So far, the cryptogram deal based on attributes can satisfy the two requirements are mentioned above simultaneously. Through encrypting the outsourced data with the attribute-based cryptogram deal can keep watch the vicious servers, prevent the offend from attacker, and reach to the aim that offers rational warranty and limits an unlawful access by combined the access strategy with the ciphertext or the secret key.With updating the mobile device, the cloud servers no longer confined in the personal computer. There are three directions of developing the mobile cloud computing, that is take the mobile as the client of the cloud, by self-organize the mobiles formats the peer-to-peer networks as resource providers of the cloud, the third is utilizing the Cloudlet which is comprised of several multi-core computers. The last one is the primary way in this paper. Because in the process of encrypting the data with the attribute-based scheme will involve in calculating the enormous bilinear maps which needs higher hardware configuration, the mobile user cannot accomplish by itself. Moreover, the mobile user must undergo multi-hop to connect with the cloud server, so it will cause net-latency when the user obtain the decrypted data.Takes the above consideration into account, the primary content in this paper is build an efficent and secure system about outsourcing the decryption. The paper aims at constructing the KP-ABE and CP-ABE decryption system of the attribute-based scheme more closer to the practice with the help of the Cloudlet, cutting down the quantity of calculation in the process of decryption at the mobile device. At last, make an anslysis from the aspect of security and efficiency.
Keywords/Search Tags:Mobile Cloud Computing, Attribute-based Encryption/Decrytion scheme, Access, control, Cloudlet
PDF Full Text Request
Related items