A distributed mobile cloud computing model for secure big data

Mobile cloud computing provides a novel e-commerce mode for organizations without any upfront investment. Since cloud computing uses distributed resources in open environment, it is important to provide secure keys to share the data for developing cloud computing applications. To ensure a correctness of users' data in the cloud, we propose an effective and secure distributed model including a Self-Proxy Server (SPS) with self-created algorithm. The model resolves a communication bottleneck due to re-encryption of a shared data in the cloud whenever users are revoked. It offers to reduce security risks and protect their resources because a distributed SPS dynamically interacts with Key Manager (KM) when the mobile users take on cloud services. This paper presents a comprehensive mobile cloud design which provides an effective and secure cloud computing services on mobile devices.

[1]  Samee Ullah Khan,et al.  Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .

[2]  D. Popa,et al.  A security framework for mobile cloud applications , 2013, 2013 11th RoEduNet International Conference.

[3]  Hong Zhao,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[4]  Pieter H. Hartel,et al.  Computationally Efficient Searchable Symmetric Encryption , 2010, Secure Data Management.

[5]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[6]  Kaoru Kurosawa,et al.  UC-Secure Searchable Symmetric Encryption , 2012, Financial Cryptography.

[7]  Carl A. Gunter,et al.  Dynamic Searchable Encryption via Blind Storage , 2014, 2014 IEEE Symposium on Security and Privacy.

[8]  Peter Kulchyski and , 2015 .

[9]  Melissa Chase,et al.  Structured Encryption and Controlled Disclosure , 2010, IACR Cryptol. ePrint Arch..

[10]  Jae-Cheol Ryou,et al.  Mobile Cloud Computing System Using Self-Proxy Server , 2015 .

[11]  O. KuyoroS.,et al.  Cloud computing security issues and challenges , 2011 .

[12]  John C. Grundy,et al.  An Analysis of the Cloud Computing Security Problem , 2016, APSEC 2010.

[13]  Md. Shahadat Hossain,et al.  Integration of Wireless Hand-Held Devices with the Cloud Architecture: Security and Privacy Issues , 2011, 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.

[14]  Pooja A. Uplenchwar,et al.  Data Security in Unreliable Cloud Using Access Control and Access Time , 2013 .

[15]  S Ramgovind,et al.  The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.

[16]  Chun-Jung Chen,et al.  Information security issue of enterprises adopting the application of cloud computing , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.