Knowledge Discovery and Data Mining pp 255-263 | Cite as
Design of Security Solution to Mobile Cloud Storage
Abstract
The cloud storage ownsadvantages in pay for use and elastic scalability. However, the data securityrisk destroysthe trustrelation between the cloud service provider and user. A direct method to avoid this problemis toencrypt databefore data stored in the cloud. Thus,without the decryption key, the leakage data cannot be decrypted. While the encryption technology is good, it is not always suitable for the mobile user. When using the mobile device, such as smart phone, to access the data that stored in cloud storage system, the performance issue should be considered, because the encryption scheme involves high workload.This paper is focus on the design of security solution to mobile cloud storage. It detailed the designprinciple, security function model, and typical deploy model. It also proposeda design case based on searchable encryptionto guide the further research.
Keywords
Mobile cloud storage security solution data security searchable encryptionPreview
Unable to display preview. Download preview PDF.
References
- 1.Jansen, W., Scarfone, K.: Guidelines on Cell Phone and PDA Security. Recommendations of the National Institute of Standards and Technology NIST Special Publication 800-124 (2008)Google Scholar
- 2.Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 44–55 (May 2000)Google Scholar
- 3.Goh, E.-J.: Secure Indexes Cryptology ePrint Archive, Report 2003/216 (2003), http://eprint.iacr.org/2003/216/
- 4.Li, J., Wang, Q., Wang, C.: Fuzzy Keyword Search over Encrypted Data in Cloud Computing. In: IEEE Proceedings of INFOCOM 2010 (2010)Google Scholar
- 5.Hwang, Y.-H., Lee, P.J.: Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 2–22. Springer, Heidelberg (2007)CrossRefGoogle Scholar
- 6.TCG Mobile Trusted Module Specification Specification version 1.0 Revision 6 (June 26, 2008) Google Scholar
- 7.Yu, X., Wen, Q.: Trusted MobileClient for Document Security in Mobile Office AutomationI. J. Information Technology and Computer Science 1, 54–62 (2011)CrossRefGoogle Scholar
- 8.Carlo, C., Jones, E.P.C., Popa, R.A., et al.: Relational Cloud: A Database-as-a-Service for the Cloud. In: 5th Biennial Conference on Innovative Data Systems Research, CIDR 2011, Asilomar, California, January 9-12 (2011)Google Scholar
- 9.Popa, R.A., Zeldovich, N., Balakrishnan, H.: CryptDB: A Practical Encrypted Relational DBMSMIT-CSAIL-TR-2011-005 (January 26, 2011)Google Scholar
- 10.Bugiel, S., Nuurnberger, S., Sadeghi, A.-R., et al.: Twin Clouds: An Architecture for Secure Cloud Computing (2011), http://www.zurich.ibm.com/~cca/csc2011/submissions/bugiel.pdf
- 11.Krautheim, F.J.: Building Trust Into Utility Cloud Computing. Phd Dissertation University of Maryland (2010)Google Scholar