Secure sharing and searching for real-time video data in mobile cloud
- 24 March 2015
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Network
- Vol. 29 (2), 46-50
- https://doi.org/10.1109/mnet.2015.7064902
Abstract
In this article we propose an infrastructure that allows mobile users to securely share and search for their real-time video data. Specifically, the proposed infrastructure takes the advantages of the cloud platform and 5G technology to achieve its goals, where mobile users (connected with some external video taking device) can share their real-time video with their friends or families through the cloud while any other user with no permission cannot get any information about the video. More importantly, the infrastructure security is guaranteed even if the cloud server is hacked. In addition, our infrastructure also allows secure searching within the user's own video data. We believe our solution is practical to be deployed in the existing telecommunication platforms.Keywords
This publication has 9 references indexed in Scilit:
- A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data SharingIEEE Transactions on Information Forensics and Security, 2014
- Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption StandardIEEE Transactions on Information Forensics and Security, 2014
- CP-ABE With Constant-Size Keys for Lightweight DevicesIEEE Transactions on Information Forensics and Security, 2014
- The Locality of Searchable Symmetric EncryptionLecture Notes in Computer Science, 2014
- Highly-Scalable Searchable Symmetric Encryption with Support for Boolean QueriesLecture Notes in Computer Science, 2013
- Flexible and scalable digital signatures in TPM 2.0Published by Association for Computing Machinery (ACM) ,2013
- Searchable symmetric encryptionPublished by Association for Computing Machinery (ACM) ,2006
- Short Signatures from the Weil PairingJournal of Cryptology, 2004
- Efficient signature generation by smart cardsJournal of Cryptology, 1991