An efficient secure platform for storage in MCC

The Mobile Cloud Computing offers more and more services for data storage and sharing. It offers to users enormous storage space and allows them to recover their data anywhere and anytime. But the evolution of these services in the MCC remains slow, in front of the many constraints it faces such as processing power limitation, high energy consumption and, problems related to data security and confidentiality. We, propose an efficient structure for storing and sharing data that ensures security and user privacy without overloading the mobile device. Our structure enables quick and easy access to a Cloud server for uploading and downloading data safely. Our platform uses a system of files classification and a homomorphic keyword research for more fluent and easy access.

[1]  Werasak Kurutach,et al.  Mobile cloud computing: A survey and propose solution framework , 2016, 2016 13th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON).

[2]  John W. Rittinghouse,et al.  Cloud Computing: Implementation, Management, and Security , 2009 .

[3]  Zhibin Zhou,et al.  Secure data processing framework for mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[4]  Xiaodong Lin,et al.  SDSM: A secure data service mechanism in mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[5]  Yi Mu,et al.  Identity-based data storage in cloud computing , 2013, Future Gener. Comput. Syst..

[6]  Jian Yang,et al.  Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing , 2011, J. Networks.

[7]  Sandeep K. Sood,et al.  A combined approach to ensure data security in cloud computing , 2012, J. Netw. Comput. Appl..

[8]  Yung-Hsiang Lu,et al.  Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.

[9]  Saman A. Zonouz,et al.  A cloud-based intrusion detection and response system for mobile phones , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).

[10]  Claude Turner,et al.  Homomorphic Encryption , 2013, Complex Adaptive Systems.

[11]  Wei Ren,et al.  Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing , 2011 .

[12]  Hao Chen,et al.  Defending against sensor-sniffing attacks on mobile phones , 2009, MobiHeld '09.

[13]  Xinwen Zhang,et al.  Securing elastic applications on mobile devices for cloud computing , 2009, CCSW '09.

[14]  Jason H. Christensen,et al.  Using RESTful web-services and cloud computing to create next generation mobile applications , 2009, OOPSLA Companion.

[15]  Samee Ullah Khan,et al.  Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .

[16]  Dijiang Huang,et al.  MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication , 2010, 2010 Fifth IEEE International Symposium on Service Oriented System Engineering.

[17]  Fred Cheng Security Attack Safe Mobile and Cloud-based One-time Password Tokens Using Rubbing Encryption Algorithm , 2011, Mob. Networks Appl..

[18]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[19]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..