Scheduled System Maintenance:
On May 6th, system maintenance will take place from 8:00 AM - 12:00 PM ET (12:00 - 16:00 UTC). During this time, there may be intermittent impact on performance. We apologize for the inconvenience.
By Topic

Secure Data Sharing in Mobile Environments

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
3 Author(s)
Matsunaka, T. ; KDDI R&D Labs. Inc., Saitama ; Warabino, T. ; Kishi, Y.

This paper proposes an approach for secure data sharing on mobile terminals with members of a particular group. To avoid the data being compromised due to loss or theft, this approach prevents data leakage, while allowing the correct members to recover the data to a new mobile terminal thanks to cooperation between a mobile terminal and a network server. The fundamental concept used to achieve data security involves applying data encryption and secret sharing of the encryption key. In addition, this approach newly introduces a key encapsulation mechanism (KEM) and threshold cryptography. The approach also combines the use of a data protection approach, based on a secret sharing scheme, in order to achieve an efficient data reading process. Once one of the members reads the data, he/she need not use threshold cryptography to reconstruct the encrypted key, but instead uses a secret sharing scheme. This paper confirms the potential of this approach via the prototype implementation onto a mobile phone.

Published in:

Mobile Data Management, 2008. MDM '08. 9th International Conference on

Date of Conference:

27-30 April 2008