Design of Security Solution to Mobile Cloud Storage

Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 135)

Abstract

The cloud storage ownsadvantages in pay for use and elastic scalability. However, the data securityrisk destroysthe trustrelation between the cloud service provider and user. A direct method to avoid this problemis toencrypt databefore data stored in the cloud. Thus,without the decryption key, the leakage data cannot be decrypted. While the encryption technology is good, it is not always suitable for the mobile user. When using the mobile device, such as smart phone, to access the data that stored in cloud storage system, the performance issue should be considered, because the encryption scheme involves high workload.This paper is focus on the design of security solution to mobile cloud storage. It detailed the designprinciple, security function model, and typical deploy model. It also proposeda design case based on searchable encryptionto guide the further research.

Keywords

Mobile cloud storage security solution data security searchable encryption 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Jansen, W., Scarfone, K.: Guidelines on Cell Phone and PDA Security. Recommendations of the National Institute of Standards and Technology NIST Special Publication 800-124 (2008)Google Scholar
  2. 2.
    Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 44–55 (May 2000)Google Scholar
  3. 3.
    Goh, E.-J.: Secure Indexes Cryptology ePrint Archive, Report 2003/216 (2003), http://eprint.iacr.org/2003/216/
  4. 4.
    Li, J., Wang, Q., Wang, C.: Fuzzy Keyword Search over Encrypted Data in Cloud Computing. In: IEEE Proceedings of INFOCOM 2010 (2010)Google Scholar
  5. 5.
    Hwang, Y.-H., Lee, P.J.: Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 2–22. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  6. 6.
    TCG Mobile Trusted Module Specification Specification version 1.0 Revision 6 (June 26, 2008) Google Scholar
  7. 7.
    Yu, X., Wen, Q.: Trusted MobileClient for Document Security in Mobile Office AutomationI. J. Information Technology and Computer Science 1, 54–62 (2011)CrossRefGoogle Scholar
  8. 8.
    Carlo, C., Jones, E.P.C., Popa, R.A., et al.: Relational Cloud: A Database-as-a-Service for the Cloud. In: 5th Biennial Conference on Innovative Data Systems Research, CIDR 2011, Asilomar, California, January 9-12 (2011)Google Scholar
  9. 9.
    Popa, R.A., Zeldovich, N., Balakrishnan, H.: CryptDB: A Practical Encrypted Relational DBMSMIT-CSAIL-TR-2011-005 (January 26, 2011)Google Scholar
  10. 10.
    Bugiel, S., Nuurnberger, S., Sadeghi, A.-R., et al.: Twin Clouds: An Architecture for Secure Cloud Computing (2011), http://www.zurich.ibm.com/~cca/csc2011/submissions/bugiel.pdf
  11. 11.
    Krautheim, F.J.: Building Trust Into Utility Cloud Computing. Phd Dissertation University of Maryland (2010)Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijingChina

Personalised recommendations