Abstract
This study proposes a highly scalable, autonomous, and easy to implement mobile device-centric cloud (MDCC) model for secure device-to-device (D2D) sharing and user-centric services. Users of a certain sociological relation are connected via mobile devices and based on short secret sharing the mobile devices initiate an autonomous and tiny mobile data center with an elected broker. The broker administrates physical network attachments, resource associations, and multimedia service brokering such that quantitative security service level agreements (SLA) in addition to streaming quality SLAs are configured. Content owners or producers in the MDCC immediately share digital contents without uploading to a specific cloud server. Two examples are implemented. The first is video broadcasting and the second is service coverage extension of a DLNA LAN by associating the DLNA gateway with MDCC to securely publish contents outward over the Internet and to get contents from outside the LAN. Both examples show that secure D2D sharing are achieved with high scalability and autonomy while anxiety of security issues of traditional big data centers is relieved.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Kandukuri, B.R., Paturi, R. V, and Rakshit, A.: Cloud security issues. In: IEEE International Conference on Services Computing (2009)
Jensen, M., Schwenk, J., Gruschka, N., and Iacono, L.L.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing (2009)
Brodkin, J.: Gartner: seven cloud-computing security risks. http://www.networkworld.com/news/2008/070208-cloud.html
Huang, Y.-T.: An SLA-aware data dispersion method for short-secret-sharing cloud storage system. Thesis of Master Degree, Computer Science and Information Engineering, National Cheng-Kung University Taiwan (2013)
Guillen, J., Miranda, J., et al.: People as a service: a mobile-centric model for providing collective sociological profiles. IEEE Softw. 31, 48–53 (2014)
Mahadev, S., Paramvir, B., et al.: The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput. 8, 14–23 (2009)
Mahadev, S.: Mobile computing: the next decade. In: 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond, pp. 1–6, ISBN: 978-1-4503-0155-8, New York (2010)
Mikko, R., Tommi, M., et al.: Mobile content as a service a blueprint for a vendor-neutral cloud of mobile devices. IEEE Softw. 29, 28–32 (2012)
Raj, M., Di Francesco, M., Das, S.K.: Secure Mobile Cloud Computing. In: Das, S., Kant, K., Zhang, N. (eds.) Handbook on Securing Cyber-Physical Critical Infrastructure, pp. 411–429. Elsevier, Waltham (2012)
Oracle, VirtualBox Documentation. http://www.oracle.com/technetwork/server-storage/virtualbox/documentation/index.html
Xen Project, Xen Cloud Platform. http://www.xen.org/products/cloudxen.html
Qing, L., Clark, G.: Mobile security: a look ahead. IEEE Secur. Priv. 11, 78–81 (2013)
Su, W.-T., Chang, K.-M., Kuo, Y.-H.: eHIP: an energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks. Comput. Netw. 51(4), 1151–1168 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Chen, CL., Chen, SC., Chang, CR., Lin, CF. (2015). Scalable and Autonomous Mobile Device-Centric Cloud for Secured D2D Sharing. In: Rhee, KH., Yi, J. (eds) Information Security Applications. WISA 2014. Lecture Notes in Computer Science(), vol 8909. Springer, Cham. https://doi.org/10.1007/978-3-319-15087-1_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-15087-1_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15086-4
Online ISBN: 978-3-319-15087-1
eBook Packages: Computer ScienceComputer Science (R0)