Skip to main content

A Cloud-Based Vertical Data Distribution Approach for a Secure Data Access on Mobile Devices

  • Conference paper
  • First Online:
Emerging Technologies in Data Mining and Information Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 755))

  • 677 Accesses

Abstract

Vertical database partitioning and the distribution of the partitions to different clouds improves the level of security and privacy, as the respective partitions from one cloud are worthless without the others. SeDiCo (a framework for a secure and distributed cloud data store) is an implementation of such an approach. However, the data partitioning and distribution approach demands a powerful client with sufficient hardware capabilities to efficiently join the partitioned data. Mobile devices have limited hardware resources in terms of memory, processing power, and storage capacity. The aim of this paper is to adopt the SeDiCo approach to mobile devices and to prove its feasibility. For this purpose, an Android application that implements the vertical partitioning approach is conceptualized and developed. Furthermore, the implementation is evaluated with the TPC-W benchmark. As a result, mobile devices should be enabled to use a secure and distributed cloud storage to foster a broader dissemination of Cloud Computing for mobile devices. Furthermore, this approach fosters bring-your-own-device (BYOD) strategies for enterprises, as the level of data security and privacy is improved.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ferretti, L., Colajanni, M., Marchetti, M.: Supporting security and consistency for cloud database. In: Proceedings of the 4th International Conference on Cyberspace Safety and Security, pp. 179–193 (2012)

    Google Scholar 

  2. Juels, A., Oprea, A.: New approaches to security and availability for cloud data. Commun. ACM 56(2), 64–64 (2013)

    Article  Google Scholar 

  3. Neves, B.A., Correia, M.P., Bruno, Q., Fernando, A., Paulo, S.: DepSky: dependable and secure storage in a cloud-of-clouds. ACM Trans. Storage (TOS) 9, 31–46. ACM (2013)

    Google Scholar 

  4. Kohler, J., Specht, T., Simov, K.: An approach for a security and privacy-aware cloud-based storage of data in the semantic web. In: Proceedings of The First IEEE International Conference on Computer Communication and the Internet (ICCCI 2016), Wuhan, China. IEEE Computer Society (2016)

    Google Scholar 

  5. Kohler, J., Simov, K., Fiech, A., Specht, T.: On the performance of query rewriting in vertically distributed cloud databases. In: Proceedings of The International Conference Advanced Computing for Innovation ACOMIN 2015, Sofia, Bulgaria (2015)

    Google Scholar 

  6. Kohler, J.: GitHub Page of SeDiCo Implementation (2016)

    Google Scholar 

  7. Balkesen, C., Alonso, G., Teubner, J., Ozsu, M.T.: Multi-core, main-memory joins: sort vs. hash revisited. Proc. VLDB Endow. 7(1), 85–96 (2014)

    Article  Google Scholar 

  8. Kohler, J., Specht, T.: Vertical query-join benchmark in a cloud database environment. In: Proceedings of The 2nd IEEE World Conference on Complex Systems, Agadir, Morocco (2014)

    Google Scholar 

  9. Fielding, R.T.: Architectural styles and the design of network-based software architectures. Ph.D. thesis, University of California (2000)

    Google Scholar 

  10. TPC: TPC Benchmark W (Web Commerce) Specification Version 2.0r (2003)

    Google Scholar 

  11. Krueger, J., Kim, C., Grund, M., Satish, N., Schwalb, D., Chhugani, J., Plattner, H., Dubey, P., Zeier, A.: Fast updates on read-optimized databases using multi-core CPUs. Proc. VLDB Endow. 5(1), 61–72 (2011)

    Article  Google Scholar 

  12. Domingos, J., Simões, N., Pereira, P., Silva, C., Marcelino, L.: Database synchronization model for mobile devices. In: Iberian Conference on Information Systems and Technologies, CISTI (2014)

    Google Scholar 

  13. Alhaj, T.A., Taha, M.M., Alim, F.M.: Synchronization wireless algorithm based on message digest (SWAMD) for mobile device database. In: Proceedings 2013 International Conference on Computer, Electrical and Electronics Engineering: Research Makes a Difference, ICCEEE 2013, pp. 259–262 (2013)

    Google Scholar 

  14. Balakumar, V., Sakthidevi, I.: An efficient database synchronization algorithm for mobile devices based on secured message digest. In: 2012 International Conference on Computing, Electronics and Electrical Technologies, ICCEET 2012, pp. 937–942 (2012)

    Google Scholar 

  15. Choi, M.-Y.C.M.-Y., Cho, E.-A.C.E.-A., Park, D.-H.P.D.-H., Moon, C.-J.M.C.-J., Baik, D.-K.B.D.-K.: A database synchronization algorithm for mobile devices. IEEE Trans. Consum. Electron. 56(2), 392–398 (2010)

    Google Scholar 

  16. Burckhardt, S., Fähndrich, M., Leijen, D., Wood, B.P.: Cloud types for eventual consistency. In: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7313, pp. 283–307. LNCS (2012)

    Google Scholar 

  17. Chun, B., Ihm, S., Maniatis, P., Naik, M., Patti, A.: Clonecloud: elastic execution between mobile device and cloud. In: Proceedings of the Sixth Conference on Computer Systems, pp. 301–314 (2011)

    Google Scholar 

  18. Kohler, J., Lorenz, R., Gumbel, M., Specht, T., Simov, K.: A security by distribution approach to manage big data in a federation of untrustworthy clouds. In: Sharvari Tamane, N.D., Solanki, V.K. (eds.) Privacy and Security Policies in Big Data. IGI Global (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jens Kohler .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kohler, J., Specht, T. (2019). A Cloud-Based Vertical Data Distribution Approach for a Secure Data Access on Mobile Devices. In: Abraham, A., Dutta, P., Mandal, J., Bhattacharya, A., Dutta, S. (eds) Emerging Technologies in Data Mining and Information Security. Advances in Intelligent Systems and Computing, vol 755. Springer, Singapore. https://doi.org/10.1007/978-981-13-1951-8_21

Download citation

Publish with us

Policies and ethics