Advertisement

A Cloud-Based Vertical Data Distribution Approach for a Secure Data Access on Mobile Devices

  • Jens KohlerEmail author
  • Thomas Specht
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 755)

Abstract

Vertical database partitioning and the distribution of the partitions to different clouds improves the level of security and privacy, as the respective partitions from one cloud are worthless without the others. SeDiCo (a framework for a secure and distributed cloud data store) is an implementation of such an approach. However, the data partitioning and distribution approach demands a powerful client with sufficient hardware capabilities to efficiently join the partitioned data. Mobile devices have limited hardware resources in terms of memory, processing power, and storage capacity. The aim of this paper is to adopt the SeDiCo approach to mobile devices and to prove its feasibility. For this purpose, an Android application that implements the vertical partitioning approach is conceptualized and developed. Furthermore, the implementation is evaluated with the TPC-W benchmark. As a result, mobile devices should be enabled to use a secure and distributed cloud storage to foster a broader dissemination of Cloud Computing for mobile devices. Furthermore, this approach fosters bring-your-own-device (BYOD) strategies for enterprises, as the level of data security and privacy is improved.

Keywords

Cloud computing security Data security and privacy Mobile cloud platform 

References

  1. 1.
    Ferretti, L., Colajanni, M., Marchetti, M.: Supporting security and consistency for cloud database. In: Proceedings of the 4th International Conference on Cyberspace Safety and Security, pp. 179–193 (2012)Google Scholar
  2. 2.
    Juels, A., Oprea, A.: New approaches to security and availability for cloud data. Commun. ACM 56(2), 64–64 (2013)CrossRefGoogle Scholar
  3. 3.
    Neves, B.A., Correia, M.P., Bruno, Q., Fernando, A., Paulo, S.: DepSky: dependable and secure storage in a cloud-of-clouds. ACM Trans. Storage (TOS) 9, 31–46. ACM (2013)Google Scholar
  4. 4.
    Kohler, J., Specht, T., Simov, K.: An approach for a security and privacy-aware cloud-based storage of data in the semantic web. In: Proceedings of The First IEEE International Conference on Computer Communication and the Internet (ICCCI 2016), Wuhan, China. IEEE Computer Society (2016)Google Scholar
  5. 5.
    Kohler, J., Simov, K., Fiech, A., Specht, T.: On the performance of query rewriting in vertically distributed cloud databases. In: Proceedings of The International Conference Advanced Computing for Innovation ACOMIN 2015, Sofia, Bulgaria (2015)Google Scholar
  6. 6.
    Kohler, J.: GitHub Page of SeDiCo Implementation (2016)Google Scholar
  7. 7.
    Balkesen, C., Alonso, G., Teubner, J., Ozsu, M.T.: Multi-core, main-memory joins: sort vs. hash revisited. Proc. VLDB Endow. 7(1), 85–96 (2014)CrossRefGoogle Scholar
  8. 8.
    Kohler, J., Specht, T.: Vertical query-join benchmark in a cloud database environment. In: Proceedings of The 2nd IEEE World Conference on Complex Systems, Agadir, Morocco (2014)Google Scholar
  9. 9.
    Fielding, R.T.: Architectural styles and the design of network-based software architectures. Ph.D. thesis, University of California (2000)Google Scholar
  10. 10.
    TPC: TPC Benchmark W (Web Commerce) Specification Version 2.0r (2003)Google Scholar
  11. 11.
    Krueger, J., Kim, C., Grund, M., Satish, N., Schwalb, D., Chhugani, J., Plattner, H., Dubey, P., Zeier, A.: Fast updates on read-optimized databases using multi-core CPUs. Proc. VLDB Endow. 5(1), 61–72 (2011)CrossRefGoogle Scholar
  12. 12.
    Domingos, J., Simões, N., Pereira, P., Silva, C., Marcelino, L.: Database synchronization model for mobile devices. In: Iberian Conference on Information Systems and Technologies, CISTI (2014)Google Scholar
  13. 13.
    Alhaj, T.A., Taha, M.M., Alim, F.M.: Synchronization wireless algorithm based on message digest (SWAMD) for mobile device database. In: Proceedings 2013 International Conference on Computer, Electrical and Electronics Engineering: Research Makes a Difference, ICCEEE 2013, pp. 259–262 (2013)Google Scholar
  14. 14.
    Balakumar, V., Sakthidevi, I.: An efficient database synchronization algorithm for mobile devices based on secured message digest. In: 2012 International Conference on Computing, Electronics and Electrical Technologies, ICCEET 2012, pp. 937–942 (2012)Google Scholar
  15. 15.
    Choi, M.-Y.C.M.-Y., Cho, E.-A.C.E.-A., Park, D.-H.P.D.-H., Moon, C.-J.M.C.-J., Baik, D.-K.B.D.-K.: A database synchronization algorithm for mobile devices. IEEE Trans. Consum. Electron. 56(2), 392–398 (2010)Google Scholar
  16. 16.
    Burckhardt, S., Fähndrich, M., Leijen, D., Wood, B.P.: Cloud types for eventual consistency. In: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7313, pp. 283–307. LNCS (2012)Google Scholar
  17. 17.
    Chun, B., Ihm, S., Maniatis, P., Naik, M., Patti, A.: Clonecloud: elastic execution between mobile device and cloud. In: Proceedings of the Sixth Conference on Computer Systems, pp. 301–314 (2011)Google Scholar
  18. 18.
    Kohler, J., Lorenz, R., Gumbel, M., Specht, T., Simov, K.: A security by distribution approach to manage big data in a federation of untrustworthy clouds. In: Sharvari Tamane, N.D., Solanki, V.K. (eds.) Privacy and Security Policies in Big Data. IGI Global (2017)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Institute for Enterprise ComputingMannheimGermany

Personalised recommendations