BİLDİRİLER

BİLDİRİ DETAY

Osamah ABDULRAZZAQ ALMUNTAFEKY, Muhammad ILYAS
TRUSTED CLOUD-BASED RE-ENCRYPTION SCHEME FOR MOBILE DEVICES
 
Mobile devices have become an integral part of our daily lives, enabling us to access and share sensitive data with unprecedented convenience. However, the inherent vulnerabilities in mobile platforms pose significant security challenges, especially when it comes to the protection of user data. To address these concerns, we propose a Trusted Cloud-Based Re-Encryption Scheme (TCRSM) tailored for mobile devices. TCRSM leverages the strengths of both cloud computing and cryptographic techniques to provide a robust and secure framework for data transmission and storage. This scheme offers end-to-end encryption, ensuring the confidentiality and integrity of data, while facilitating seamless data sharing and access across mobile devices. The core innovation of TCRSM lies in the dynamic re-encryption process, which allows authorized users to access encrypted data securely and efficiently without the need to decrypt and re-encrypt it manually. Trust is established through a secure cloud infrastructure, providing key management, authentication, and access control mechanisms, all in a transparent and user-friendly manner. Furthermore, TCRSM is designed to be highly adaptable, supporting various mobile platforms and devices, and minimizing the computational overhead on mobile devices. Our comprehensive security analysis demonstrates that TCRSM is resilient against common security threats, such as eavesdropping, data breaches, and unauthorized access. In this paper, we present the theoretical foundation, technical design, and practical implementation of TCRSM, highlighting its potential to enhance data security and privacy in the mobile ecosystem while maintaining a high level of usability and performance. We believe that TCRSM represents a significant step towards building a more secure and trusted mobile environment. ORCID NO: 0009-0004-0080-5711

Anahtar Kelimeler: Cloud computing, Mobile cloud computing, Security, Privacy



 


Keywords: