z-logo
Premium
Towards a secure incremental proxy re‐encryption for e‐healthcare data sharing in mobile cloud computing
Author(s) -
Bhatia Tarunpreet,
Verma A.K.,
Sharma Gaurav
Publication year - 2019
Publication title -
concurrency and computation: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.309
H-Index - 67
eISSN - 1532-0634
pISSN - 1532-0626
DOI - 10.1002/cpe.5520
Subject(s) - computer science , cloud computing , encryption , proxy re encryption , upload , mobile device , computer security , cloud computing security , database , operating system , ciphertext
Summary Cloud computing provides universal access to a pool of shared resources to numerous stakeholders/shareholders of the e‐healthcare industry. The speedy adoption of cloud computing has inevitably raised security concerns for the outsourced data. Since mobile devices are resource constrained, the security solutions must discharge the computing comprehensive operations on the cloud for implementation. Conventionally, any modification to uploaded record would compel the mobile client to encrypt and compute the hash value from scratch. Through this paper, we intend to propose a pairing‐free incremental proxy re‐encryption scheme, without certificates, which would run proportionate to the number of modifications in time, instead of the document length for improvement in the file modification tasks. The proposed scheme shows a significant improvement in the file modification system regarding the energy consumption and the turnaround timer taken. The proposed scheme has been verified through a formal method using Z 3 solver.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here