Trade-offs among data security, usability and complexity in mobile cloud computing
The proliferation of mobile cloud computing changes the way that data is utilized. Huge volume of data is collected at the network edge, transmitted through the network, gathered in the cloud, and utilized by various end-users. Data security, usability, and complexity are among the most important design issues in mobile computing environment. Trade- offs generally exist among these issues. While data encryption is a primary mechanism to ensure data security, it will inevitably introduce some computational overhead to the data owners. Also, data encryption will reduce data usability since typically it is hard to conduct computations over encrypted data.In this thesis, we focus on designing secure, efficient and versatile protocols that can achieve trade-offs among data security, data usability, and computational complexity, featuring the mobile cloud computing environment. In particular, we explore the trade-offs from two aspects. First, we design secure computation outsourcing schemes for a wide variety of computational problems such as general scientific computation and cryptographic computation, trying to alleviate the computational overhead at the user side while preserving the security of the outsourced data. Our proposed scheme is cost-aware in that it provides different levels of security protection for the outsourced problem with different computational overhead. Second, we design a specific encryption scheme that enables certain computations to be conducted directly over encrypted data. In this way, data users can directly utilize encrypted data to meet the demands of various applications without compromising datasecurity. More specifically, our proposed encryption scheme encrypts two vectors in such a manner that the inner product of the vectors can be evaluated and compared to a pre-defined threshold. We show that an encryption scheme can be utilized as an essential building block to construct various privacy-preserving applications such as an online biometric authentication system. Our proposed schemes are highly efficient and suitable for resource-constrained devices in the mobile cloud computing environment to greatly expand the computational capacity and/or extend battery life.
Read
- In Collections
-
Electronic Theses & Dissertations
- Copyright Status
- In Copyright
- Material Type
-
Theses
- Thesis Advisors
-
Ren, Jian
- Committee Members
-
Li, Tongtong
Zhang, Mi
Enbody, Richard
- Date
- 2018
- Program of Study
-
Electrical Engineering - Doctor of Philosophy
- Degree Level
-
Doctoral
- Language
-
English
- Pages
- xii, 171 pages
- ISBN
-
9780355865899
0355865890
- Permalink
- https://doi.org/doi:10.25335/grzg-q807