Approach of Security Services on Smart-Phone Using Homomorphism

Article Preview

Abstract:

The use of smart device is very increasing at recent. PC and Internet was main computing environment in existing but devices such as smart-phone and Tablet are dashing recently. But, serious security problem will happen because anyone is not providing security service for smart device. We wish to propose system that offers confidentiality, integrity service in smart device using AES-256 and MD-5. And after pass through certification process about device and user, wish to propose system that apply PEKS technology so that can simplify certification formality about service. AESSUHEA may offer various security services that confidentiality and integrity. And it support certification service easily and conveniently to smart device.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

624-627

Citation:

Online since:

September 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Byron Acohido, "New Security Flaws Detected in Mobile Devices", http://www.mobile-tech-today.com/story.xhtml?story_id=022001KSER0E&nl=8.

Google Scholar

[2] Eric Lundquist, "Security in the Borderless Enterprise", http://www.informationweek.com/news/global-cio/interviews/232601452

Google Scholar

[3] Stuart Sumner, "New Android malware can remotely control phone", http://www.computing.co.uk/ctg/news/2166409/android-malware-remotely-control-phone

Google Scholar

[4] Gareth Morgan, "Mobile security incidents costing firms nearly $500,000 a year", http://www.v3.co.uk/v3-uk/news/2154670/mobile-security-incidents-costing-firms-nearly-usd500?wt.mc_ev=click, 2012.2.23.

Google Scholar

[5] Molly Bernhart Walker, "NIST Security controls update addresses privacy, mobile, cloud", http://www.fiercegovernmentit.com/story/nist-security-controls-update-addresses-privacy-mobile-cloud/2012-02-29?utm_medium=nl&utm_source=internal, 2012.02.29.

Google Scholar

[6] George V. Hulme, "Mobile security threats are heating up: criminals, security researchers, vendors and even investors are now taking mobile security more seriously", http://www.csoonline.com/article/691043/mobile-security-threats-are-heating-up?source=CSONLE_nlt_update_2011-10-06, 2011.10.05.

DOI: 10.1016/s1353-4858(11)70087-3

Google Scholar

[7] Rivest, Adleman, Dertouzos, "On data bank and privacy homomorphisms", Proceedings of the 19th Annual Symposium on Foundations of Secure Computation-FSC, pp.169-180, 1978.

Google Scholar

[8] J. Domingo-Ferrer, " A New privacy homomorphism and applications", Information Proceeding Letters, Vol. 60, No. 5, pp.277-282, 1996.

Google Scholar

[9] Craig Gentry, "Fully Homomorphic encryption using ideal lattices", In proceedings of the 41st ACM Symposium on Theory of Computing – STOC, pp.169-178, 2009.

DOI: 10.1145/1536414.1536440

Google Scholar

[10] Pascal Paillier, "Public-key cryptiosystems based on composite degree residuosity classes", Advanced in Cryptology-Eurocrypt(LNCS1592), pp.223-238, 1999.

DOI: 10.1007/3-540-48910-x_16

Google Scholar

[11] Dan Boneh, Giovanni Di Crescenzo, "Public Key Encryption with keyword Search"

Google Scholar

[12] Dawn Xiaodong Song, David Wagner, Adrian Perrig, "Practical Techniques for Searches on Encrypted Data"

Google Scholar

[13] Yong Ho Hwang, Pil Joon Lee, "Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System", LNCS4575, pp.2-22, 2007.

DOI: 10.1007/978-3-540-73489-5_2

Google Scholar