Title: Context-aware latency reduction protocol for secure encryption and decryption

Authors: Muder Almiani; Abdul Razaque; Toufik Aidja; Ayman Al-Dmour

Addresses: Department of Computer Information Systems, Al-Hussein Bin Talal University, Ma'an, Jordan ' Department of Computer Science, New York Institute of Technology, USA ' Department of Electrical and Computer Engineering, Cleveland State University, OH, USA ' Department of Computer Information Systems, Al-Hussein Bin Talal University, Ma'an, Jordan

Abstract: Security is one of the biggest challenges for data communication. As the use of mobile phones has increased, people started using several mobile applications to handle the internet-of-things. On other hand, the frequent use of mobile phones in the business caught the attention of researchers to protect the manufacturers and customers. Handling these issues, several paradigms for encrypting and decrypting the data-outsourcing are proposed. However, there are still new threats that challenge researchers due to new attacking methods and malicious actions of adversaries. Though, the manufacturers have implemented an industry standard to protect the customers' privacy, but existing standards do not provide comfortable zone for the customers, particularly reducing the latency of the emerging applications being used in internet-of-things. In this paper, we introduce context-aware security (ConSec) protocol to support the internet-of-things applications to reduce the latency while encrypting and decrypting the applications. Furthermore, elliptic curve cryptography is used to fully secure the encryption and decryption processes. The proposed method is implemented using Java platform and results are verified and compared with full disk method from the latency perspective.

Keywords: security; elliptic curve cryptography; ECC; mobile platform; encryption; decryption; context aware system.

DOI: 10.1504/IJHPCN.2018.094972

International Journal of High Performance Computing and Networking, 2018 Vol.12 No.3, pp.251 - 260

Available online: 25 Sep 2018 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article