Enhancing Property-Based Token Attestation With Homomorphic Encryption (PTA-HE) for Secure Mobile Computing
DOI:
https://doi.org/10.63665/jhdjsh85Keywords:
Property-based Token Attestation, Homomorphic Encryption, Mobile Cloud Computing, Security, Privacy, Scyther VerificationAbstract
This paper proposes PTA-HE, an enhanced Property-based Token Attestation scheme integrated with Homomorphic Encryption for secure mobile cloud computing environments. Traditional PTA protocols lack sufficient protection during active data processing, leading to confidentiality risks. The proposed system enables computations directly on encrypted data, ensuring privacy and integrity throughout the attestation workflow. Trusted Third Parties manage verification securely, while experimental evaluation analyzes computational overhead, latency, scalability, and communication cost. Formal verification using the Scyther tool proves resistance against replay and man-in-the-middle attacks. The solution provides strong security guarantees for modern mobile cloud systems.
Downloads
References
1. Muheidat, F., & Tawalbeh, L. — Mobile Cloud Computing Security: Challenges and Solutions, IEEE Access, 2020.
2. Gong, L., Wang, H., & Zhou, Y. — Efficient Homomorphic Encryption for Privacy-Preserving Cloud Computing, Future Generation Computer Systems, 2021.
3. Banks, D., Smith, P., & Jones, R. — Remote Attestation Techniques Using Trusted Platform Modules, IEEE Transactions on Dependable and Secure Computing, 2019.
4. Zheng, K., Chen, X., & Li, J. — Privacy-Preserving Query Processing Over Encrypted Cloud Databases, Journal of Cloud Computing, 2020.
5. Cremers, C. — The Scyther Tool for Security Protocol Verification, International Conference on Computer Aided Verification, 2008.
6. Rivest, R., Adleman, L., & Dertouzos, M. — On Data Banks and Privacy Homomorphisms, Foundations of Secure Computation, 1978.
7. Gentry, C. — Fully Homomorphic Encryption Using Ideal Lattices, STOC Conference Proceedings, 2009.
8. Stallings, W. — Cryptography and Network Security: Principles and Practice, Pearson Education, 7th Edition.
9. Trusted Computing Group (TCG). — Trusted Platform Module Library Specification, TCG Publications.
10. Boneh, D., & Shoup, V. — A Graduate Course in Applied Cryptography, Stanford University Press.
11. Diffie, W., & Hellman, M. — New Directions in Cryptography, IEEE Transactions on Information Theory, 1976.
12. Kaur, P., & Singh, M. — Cloud Security Using Homomorphic Encryption Techniques, International Journal of Information Security, 2022.
13. Li, X., Zhao, Y., & Kumar, S. — Secure Mobile Cloud Authentication Using TPM-Based Attestation, Journal of Network Security, 2021.
14. Wang, C., Ren, K., & Lou, W. — Secure and Dependable Cloud Computing Services, IEEE Network, 2010.
15. Zhang, Y., & Liu, H. — Privacy-Aware Secure Computation in Mobile Edge Computing, IEEE Internet of Things Journal, 2023.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Authors

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
