A multi-cloud approach for secure data storage on smart device

Using a mobile device to store sensitive data is not recommended, because of the high possibility of losing or thieving these data; although, neither using single cloud as a storage service is not proper solution for number of reasons; for instance, the data could be captured while uploaded to the cloud, and the data could be stolen from the cloud via using stolen ID. In this paper, we propose a solution that aims to offer a secure data storage for mobile cloud computing users based on multi-clouds scheme. The proposed solution will take the advantages of multi-clouds, data cryptography, and data compression to secure the distributed data; by splitting the data into segments, encrypting the segments, compressing the segments, distributing the segments via multi-clouds while keeping one segment on the mobile device memory; which will prevent extracting the data if the distributed segments have been phished.

[1]  Mark Ryan,et al.  Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..

[2]  Michael D. Hogan,et al.  NIST Cloud Computing Standards Roadmap , 2013 .

[3]  Avishay Traeger,et al.  To Zip or not to Zip: effective resource usage for real-time compression , 2013, FAST.

[4]  Jian Yang,et al.  Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing , 2011, J. Networks.

[5]  Borko Furht,et al.  Cloud Computing Fundamentals , 2010, Handbook of Cloud Computing.

[6]  Sukhwinder Singh,et al.  Mobile Cloud Computing , 2014 .

[7]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[8]  Md. Atiqur Rahman,et al.  A Review on Mobile Cloud Computing , 2015 .

[9]  Timothy Grance,et al.  Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .

[10]  Koichiro Hayashi,et al.  Social Issues of Big Data and Cloud: Privacy, Confidentiality, and Public Utility , 2013, 2013 International Conference on Availability, Reliability and Security.

[11]  Securing the mobile enterprise with network-based security and cloud computing , 2012, 2012 35th IEEE Sarnoff Symposium.

[12]  Matthew Metheny,et al.  Security and Privacy in Public Cloud Computing , 2013, CloudCom 2013.

[13]  Rajkumar Buyya,et al.  Inter‐Cloud architectures and application brokering: taxonomy and survey , 2014, Softw. Pract. Exp..

[14]  Arunkumar Gangula,et al.  Survey on Mobile Computing Security , 2013, 2013 European Modelling Symposium.

[15]  Siani Pearson,et al.  Privacy and Security for Cloud Computing , 2012, Computer Communications and Networks.

[16]  Juhi Sharma,et al.  Cloud Security Challenges , 2012 .

[17]  Samee Ullah Khan,et al.  Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .

[18]  K. Karuppasamy,et al.  Parallel Key Encryption for CBC And Interleaved CBC , 2010 .

[19]  V. T. Raja,et al.  Protecting the privacy and security of sensitive customer data in the cloud , 2012, Comput. Law Secur. Rev..

[20]  Petter Svärd,et al.  Self-management Challenges for Multi-cloud Architectures (Invited Paper) , 2011 .

[21]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[22]  Jianxin Li,et al.  CloudVO: Building a Secure Virtual Organization for Multiple Clouds Collaboration , 2010, 2010 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing.

[23]  Ismail Amr Ismail,et al.  A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps , 2010, Int. J. Netw. Secur..

[24]  Venkata Josyula,et al.  Cloud Computing: Automating the Virtualized Data Center , 2011 .

[25]  S. Rajalakshmi,et al.  Mobile Cloud Computing: Standard Approach to Protecting and Securing of Mobile Cloud Ecosystems , 2013, 2013 International Conference on Computer Sciences and Applications.

[26]  Pierre Riteau Building Dynamic Computing Infrastructures over Distributed Clouds , 2011, 2011 First International Symposium on Network Cloud Computing and Applications.

[27]  Hong Zhao,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[28]  Douglas Jacobson,et al.  The Insecurity of Cloud Utility Models , 2013, IT Professional.

[29]  Dijiang Huang,et al.  MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication , 2010, 2010 Fifth IEEE International Symposium on Service Oriented System Engineering.

[30]  James A. Thom,et al.  Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.

[31]  Jiafu Wan,et al.  Security and privacy in mobile cloud computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[32]  Raul Gracia-Tinedo,et al.  Cloud-as-a-Gift: Effectively Exploiting Personal Cloud Free Accounts via REST APIs , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.

[33]  Mojtaba Alizadeh,et al.  Challenges and opportunities of Mobile Cloud Computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[34]  Pierre Riteau Building Dynamic Computing Infrastructures over Distributed Clouds , 2011, NCCA.