Abstract
The cloud storage ownsadvantages in pay for use and elastic scalability. However, the data securityrisk destroysthe trustrelation between the cloud service provider and user. A direct method to avoid this problemis toencrypt databefore data stored in the cloud. Thus,without the decryption key, the leakage data cannot be decrypted. While the encryption technology is good, it is not always suitable for the mobile user. When using the mobile device, such as smart phone, to access the data that stored in cloud storage system, the performance issue should be considered, because the encryption scheme involves high workload.This paper is focus on the design of security solution to mobile cloud storage. It detailed the designprinciple, security function model, and typical deploy model. It also proposeda design case based on searchable encryptionto guide the further research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Jansen, W., Scarfone, K.: Guidelines on Cell Phone and PDA Security. Recommendations of the National Institute of Standards and Technology NIST Special Publication 800-124 (2008)
Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 44–55 (May 2000)
Goh, E.-J.: Secure Indexes Cryptology ePrint Archive, Report 2003/216 (2003), http://eprint.iacr.org/2003/216/
Li, J., Wang, Q., Wang, C.: Fuzzy Keyword Search over Encrypted Data in Cloud Computing. In: IEEE Proceedings of INFOCOM 2010 (2010)
Hwang, Y.-H., Lee, P.J.: Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 2–22. Springer, Heidelberg (2007)
TCG Mobile Trusted Module Specification Specification version 1.0 Revision 6 (June 26, 2008)
Yu, X., Wen, Q.: Trusted MobileClient for Document Security in Mobile Office AutomationI. J. Information Technology and Computer Science 1, 54–62 (2011)
Carlo, C., Jones, E.P.C., Popa, R.A., et al.: Relational Cloud: A Database-as-a-Service for the Cloud. In: 5th Biennial Conference on Innovative Data Systems Research, CIDR 2011, Asilomar, California, January 9-12 (2011)
Popa, R.A., Zeldovich, N., Balakrishnan, H.: CryptDB: A Practical Encrypted Relational DBMSMIT-CSAIL-TR-2011-005 (January 26, 2011)
Bugiel, S., Nuurnberger, S., Sadeghi, A.-R., et al.: Twin Clouds: An Architecture for Secure Cloud Computing (2011), http://www.zurich.ibm.com/~cca/csc2011/submissions/bugiel.pdf
Krautheim, F.J.: Building Trust Into Utility Cloud Computing. Phd Dissertation University of Maryland (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag GmbH Berlin Heidelberg
About this chapter
Cite this chapter
Yu, X., Wen, Q. (2012). Design of Security Solution to Mobile Cloud Storage. In: Tan, H. (eds) Knowledge Discovery and Data Mining. Advances in Intelligent and Soft Computing, vol 135. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27708-5_34
Download citation
DOI: https://doi.org/10.1007/978-3-642-27708-5_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27707-8
Online ISBN: 978-3-642-27708-5
eBook Packages: EngineeringEngineering (R0)