1. Outsourced Ciphertext-Policy based Privacy Preservation for Mobile Cloud Computing
- Author
-
Shengling Wang, Sheharyar, Zahid Mahmood, and Waqas Ahmad
- Subjects
020203 distributed computing ,Authentication ,Computer science ,business.industry ,Secure Shell ,Hash function ,020207 software engineering ,02 engineering and technology ,Computer security ,computer.software_genre ,Encryption ,Crowdsourcing ,Mobile cloud computing ,Mobile phone ,Ciphertext ,0202 electrical engineering, electronic engineering, information engineering ,General Earth and Planetary Sciences ,Verifiable secret sharing ,business ,computer ,Mobile device ,General Environmental Science ,Anonymity - Abstract
With the rapid advancement of mobile phone technology, crowdsourced mobile applications are gaining importance for cheaper and abundant information gathering source. A couple of benefits of crowdsourcing are better (versatile) and less expensive responses to the requester, source of earning for crowd contributors at the same time. With the emergence of wireless access technologies and the popularity of smart and intelligent mobile terminals like smartphones, the privacy of requesters and contributors in a crowdsourced environment is becoming more crucial. Computation complexity of available privacy preserving tools and verification of outsourced schemes are not feasible for WSNs low power and resource constrained contributing devices. The low-end resource constrained mobile devices to have less capability to compute multiple access policies and the computation cost increases with the complexity of access strategy. To resolve this issue, we proposed a resourceful verifiable outsourced encryption policy based on ciphertext attributed policy (OS-ABE), which is a platform for computing exhaustive computing tasks during private data encryption and decryption. The proposed scheme works without revealing the personal data at outsource and leaves only the minimal calculation to the crowdsource contributor and the requester. To authenticate and overcome known attacks like DoS, false computing results at crowdsourced platforms, anonymity server is embedded to handle contributors privacy issues by providing a secure shell in the framework. This scheme is based on bilinear group of prime order in which two hash functions can verify outsourced computation and ensure integrity of data. The formal security and performance analysis is presented and found to be efficient and secure.
- Published
- 2018