CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing

Mobile device and its applications have revolutionized the way we store and share data. It is becoming a warehouse of users personal information. Unluckily, most of these data are stored in an unencrypted format, prone to security threats. In this paper, we propose a lightweight, computationally eff...

Full description

Bibliographic Details
Main Authors: Amit Banerjee, Mahamudul Hasan, Md. Auhidur Rahman, Rajesh Chapagain
Format: Article
Language:English
Published: IEEE 2017-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8016572/
id doaj-c9f708d47fa4440daf002dc21183a112
record_format Article
spelling doaj-c9f708d47fa4440daf002dc21183a1122021-03-29T20:18:06ZengIEEEIEEE Access2169-35362017-01-015176781769110.1109/ACCESS.2017.27446708016572CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud ComputingAmit Banerjee0Mahamudul Hasan1https://orcid.org/0000-0002-2539-5307Md. Auhidur Rahman2Rajesh Chapagain3Department of Computer Science, South Asian University, New Delhi, IndiaDepartment of Computer Science, South Asian University, New Delhi, IndiaDepartment of Computer Science, South Asian University, New Delhi, IndiaDepartment of Computer Science, South Asian University, New Delhi, IndiaMobile device and its applications have revolutionized the way we store and share data. It is becoming a warehouse of users personal information. Unluckily, most of these data are stored in an unencrypted format, prone to security threats. In this paper, we propose a lightweight, computationally efficient protocol, called CLOAK, for the mobile device. CLOAK is based on stream cipher and takes the help of an external server for the generation and distribution of cryptographically secure pseudo-random number (CSPRN). In order to enhance the security of our protocol, we use the concept of symmetric key cryptography. We present three versions of the protocol referred as s-CLOAK, r-CLOAK and d-CLOAK, varying on the basis of the key selection procedure. In CLOAK, the core encryption/decryption operation is performed within the mobile devices to secure data at its origin. The security of CSPRN is ensured using deception method. In CLOAK, all messages are exchanged securely between mobile and the server with mutual identity verification. We evaluate CLOAK on Android smart phones and use Amazon Web services for generating CSPRN. Additionally, we present attack analysis and show that the brute force attack is computationally infeasible for the proposed protocol.https://ieeexplore.ieee.org/document/8016572/Cloud computingmobile cloud computingmobile devicesecuritystream cipherencryption
collection DOAJ
language English
format Article
sources DOAJ
author Amit Banerjee
Mahamudul Hasan
Md. Auhidur Rahman
Rajesh Chapagain
spellingShingle Amit Banerjee
Mahamudul Hasan
Md. Auhidur Rahman
Rajesh Chapagain
CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing
IEEE Access
Cloud computing
mobile cloud computing
mobile device
security
stream cipher
encryption
author_facet Amit Banerjee
Mahamudul Hasan
Md. Auhidur Rahman
Rajesh Chapagain
author_sort Amit Banerjee
title CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing
title_short CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing
title_full CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing
title_fullStr CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing
title_full_unstemmed CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing
title_sort cloak: a stream cipher based encryption protocol for mobile cloud computing
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2017-01-01
description Mobile device and its applications have revolutionized the way we store and share data. It is becoming a warehouse of users personal information. Unluckily, most of these data are stored in an unencrypted format, prone to security threats. In this paper, we propose a lightweight, computationally efficient protocol, called CLOAK, for the mobile device. CLOAK is based on stream cipher and takes the help of an external server for the generation and distribution of cryptographically secure pseudo-random number (CSPRN). In order to enhance the security of our protocol, we use the concept of symmetric key cryptography. We present three versions of the protocol referred as s-CLOAK, r-CLOAK and d-CLOAK, varying on the basis of the key selection procedure. In CLOAK, the core encryption/decryption operation is performed within the mobile devices to secure data at its origin. The security of CSPRN is ensured using deception method. In CLOAK, all messages are exchanged securely between mobile and the server with mutual identity verification. We evaluate CLOAK on Android smart phones and use Amazon Web services for generating CSPRN. Additionally, we present attack analysis and show that the brute force attack is computationally infeasible for the proposed protocol.
topic Cloud computing
mobile cloud computing
mobile device
security
stream cipher
encryption
url https://ieeexplore.ieee.org/document/8016572/
work_keys_str_mv AT amitbanerjee cloakastreamcipherbasedencryptionprotocolformobilecloudcomputing
AT mahamudulhasan cloakastreamcipherbasedencryptionprotocolformobilecloudcomputing
AT mdauhidurrahman cloakastreamcipherbasedencryptionprotocolformobilecloudcomputing
AT rajeshchapagain cloakastreamcipherbasedencryptionprotocolformobilecloudcomputing
_version_ 1724194924612550656