Premium
A comparative study and workload distribution model for re‐encryption schemes in a mobile cloud computing environment
Author(s) -
Khan Abdul Nasir,
Ali Mazhar,
Khan Atta ur Rehman,
Khan Fiaz Gul,
Khan Iftikhar Ahmed,
Jadoon Waqas,
Shamshirband Shahab,
Chronopoulos Anthony T.
Publication year - 2017
Publication title -
international journal of communication systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.344
H-Index - 49
eISSN - 1099-1131
pISSN - 1074-5351
DOI - 10.1002/dac.3308
Subject(s) - computer science , encryption , workload , cloud computing , mobile device , client side encryption , computer security , computer network , distributed computing , on the fly encryption , operating system
Summary The researchers are using the various variations of re‐encryption schemes, which migrate the computational intensive re‐encryption jobs of mobile devices to the trusted entity/cloud. However, the messages are still encrypted and decrypted using the limited computational power of mobile devices. Our contribution in this paper is to propose a workload distribution model for re‐encryption schemes, which offloads the computational intensive operations, such as encryption and decryption on a trusted entity. Moreover, the proposed workload distribution model is compared with existing re‐encryption schemes of resource utilization on trusted entity and mobile device. The experimental results show substantial improvement in performance compared to the existing schemes.