SeC2: Secure Mobile Solution for Distributed Public Cloud Storages

Cloud Computing is an emerging technology that attracts increasing attention as a high-performance and low-cost solution to process arbitrarily huge data and share them among different users and organizations. Nonetheless, this technology rises new questions on security and privacy, especially when working with highly confidential data. Existing solutions offering end-to-end security such as TLS are of no help since the stored data is only encrypted during their transport. Therefore, a message-level security must at least be applied to protect those data during and after the storing process. This paper investigates a novel solution for secure data storage in the cloud. It presents a security concept allowing each client to encrypt outgoing data on one’s mobile device and share it among a defined user group while using a seamless service provision. As our concept is used transparently as well as independently on each device, users keep full control over their data and almost no changes on the existing infrastructure of cloud storage services are needed.

[1]  Jeff Hodges,et al.  Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V2. 0 , 2001 .

[2]  David Molnar,et al.  Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud , 2010, WEIS.

[3]  Kristin E. Lauter,et al.  Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.

[4]  Shufen Zhang,et al.  Cloud Computing Research and Development Trend , 2010, 2010 Second International Conference on Future Networks.

[5]  Stephen T. Kent,et al.  Security Architecture for the Internet Protocol , 1998, RFC.

[6]  Blake Ramsdell,et al.  Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification , 2004, RFC.

[7]  Meiko Jensen,et al.  Expressiveness Considerations of XML Signatures , 2011, 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops.

[8]  D. Sowmya,et al.  Cryptographic Cloud Storage with Hadoop Implementation , 2013 .

[9]  Ya Wang,et al.  Cloud Storage as the Infrastructure of Cloud Computing , 2010, 2010 International Conference on Intelligent Computing and Cognitive Informatics.

[10]  Christian Wietfeld,et al.  CSH-MU: Client based secure handoff solution for Mobile Units , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[11]  Raph Levien,et al.  MIME Security with OpenPGP , 2001, RFC.

[12]  Kuo-Qin Yan,et al.  Towards a Load Balancing in a three-level cloud computing network , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[13]  Donald E. Eastlake,et al.  XML-Signature Syntax and Processing , 2001, RFC.

[14]  D. Eastlake,et al.  XML Encryption Syntax and Processing , 2003 .