Enhancing Property-Based Token Attestation With Homomorphic Encryption (PTA-HE) for Secure Mobile Computing

Authors

  • Syed Abdul Nafe B.E Students – Artificial Intelligence & Data Science, ISL Engineering College, Hyderabad, India Author
  • Zaid Bin Khalid B.E Students – Artificial Intelligence & Data Science, ISL Engineering College, Hyderabad, India Author
  • Maotasum Hussaini B.E Students – Artificial Intelligence & Data Science, ISL Engineering College, Hyderabad, India Author
  • Dr.Ram Kumar Professor (Supervisor); Artificial Intelligence & Data Science ISL Engineering College, Hyderabad, India Author

DOI:

https://doi.org/10.63665/jhdjsh85

Keywords:

Property-based Token Attestation, Homomorphic Encryption, Mobile Cloud Computing, Security, Privacy, Scyther Verification

Abstract

This paper proposes PTA-HE, an enhanced Property-based Token Attestation scheme integrated with Homomorphic Encryption for secure mobile cloud computing environments. Traditional PTA protocols lack sufficient protection during active data processing, leading to confidentiality risks. The proposed system enables computations directly on encrypted data, ensuring privacy and integrity throughout the attestation workflow. Trusted Third Parties manage verification securely, while experimental evaluation analyzes computational overhead, latency, scalability, and communication cost. Formal verification using the Scyther tool proves resistance against replay and man-in-the-middle attacks. The solution provides strong security guarantees for modern mobile cloud systems.

Downloads

Download data is not yet available.

References

1. Muheidat, F., & Tawalbeh, L. — Mobile Cloud Computing Security: Challenges and Solutions, IEEE Access, 2020.

2. Gong, L., Wang, H., & Zhou, Y. — Efficient Homomorphic Encryption for Privacy-Preserving Cloud Computing, Future Generation Computer Systems, 2021.

3. Banks, D., Smith, P., & Jones, R. — Remote Attestation Techniques Using Trusted Platform Modules, IEEE Transactions on Dependable and Secure Computing, 2019.

4. Zheng, K., Chen, X., & Li, J. — Privacy-Preserving Query Processing Over Encrypted Cloud Databases, Journal of Cloud Computing, 2020.

5. Cremers, C. — The Scyther Tool for Security Protocol Verification, International Conference on Computer Aided Verification, 2008.

6. Rivest, R., Adleman, L., & Dertouzos, M. — On Data Banks and Privacy Homomorphisms, Foundations of Secure Computation, 1978.

7. Gentry, C. — Fully Homomorphic Encryption Using Ideal Lattices, STOC Conference Proceedings, 2009.

8. Stallings, W. — Cryptography and Network Security: Principles and Practice, Pearson Education, 7th Edition.

9. Trusted Computing Group (TCG). — Trusted Platform Module Library Specification, TCG Publications.

10. Boneh, D., & Shoup, V. — A Graduate Course in Applied Cryptography, Stanford University Press.

11. Diffie, W., & Hellman, M. — New Directions in Cryptography, IEEE Transactions on Information Theory, 1976.

12. Kaur, P., & Singh, M. — Cloud Security Using Homomorphic Encryption Techniques, International Journal of Information Security, 2022.

13. Li, X., Zhao, Y., & Kumar, S. — Secure Mobile Cloud Authentication Using TPM-Based Attestation, Journal of Network Security, 2021.

14. Wang, C., Ren, K., & Lou, W. — Secure and Dependable Cloud Computing Services, IEEE Network, 2010.

15. Zhang, Y., & Liu, H. — Privacy-Aware Secure Computation in Mobile Edge Computing, IEEE Internet of Things Journal, 2023.

Downloads

Published

2026-04-26

How to Cite

Enhancing Property-Based Token Attestation With Homomorphic Encryption (PTA-HE) for Secure Mobile Computing. (2026). International Journal of Multidisciplinary Engineering In Current Research, 11(4s), 66-70. https://doi.org/10.63665/jhdjsh85