Mobile Device Data Security: A Cryptographic Approach by Outsourcing Mobile Data to Cloud

Abstract In the technology up-front world, mobile devices like smartphones and tablets are inevitable. When computing capacity and storage need of these devices are increasing tremendously, it demands the secure way of storing the data in cost efficient model. This paper describes how securely the mobile data can be stored in the remote cloud using cryptographic techniques with minimal performance degradation

[1]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[2]  R. Subramanian,et al.  Ensuring data storage security in cloud computing using Sobol Sequence , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).

[3]  Muhammad Mohsin Nazir,et al.  Security Framework for Cloud Computing Environment: A Review , 2012 .

[4]  Myong H. Kang,et al.  Application Lockbox for Mobile Device Security , 2011, 2011 Eighth International Conference on Information Technology: New Generations.

[5]  Ming-Yen Lin,et al.  Secure cloud storage for convenient data archive of smart phones , 2011, 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE).

[6]  Qin Liu,et al.  Efficient Sharing of Secure Cloud Storage Services , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[7]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[8]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[9]  Filip De Turck,et al.  Remote Display Solutions for Mobile Cloud Computing , 2011, Computer.

[10]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[11]  Jian Yang,et al.  Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing , 2011, J. Networks.

[12]  Shahryar Shafique Qureshi,et al.  Mobile cloud computing as future for mobile applications - Implementation methods and challenging issues , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.

[13]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[14]  Yung-Hsiang Lu,et al.  Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.

[15]  Venkata Sravan Kumar Maddineni,et al.  Security Techniques for protecting data in Cloud Computing , 2012 .

[16]  Rajan Mishra,et al.  Comparative Analysis Of Encryption Algorithms For Data Communication , 2011 .

[17]  Siani Pearson,et al.  A Privacy Manager for Cloud Computing , 2009, CloudCom.

[18]  Chia-Mu Yu,et al.  XDedup: Efficient Provably-Secure Cross-User Chunk-Level Client-Side Deduplicated Cloud Storage of Encrypted Data , 2016, IACR Cryptol. ePrint Arch..

[19]  Sasu Tarkoma,et al.  Mobile search and the cloud: The benefits of offloading , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[20]  Zhibin Zhou,et al.  Efficient and secure data storage operations for mobile cloud computing , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).

[21]  Wei Ren,et al.  Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing , 2011 .

[22]  Ali Chehab,et al.  Energy-efficient incremental integrity for securing storage in mobile cloud computing , 2010, 2010 International Conference on Energy Aware Computing.

[23]  Xinwen Zhang,et al.  Securing elastic applications on mobile devices for cloud computing , 2009, CCSW '09.