A Cloud-Based Vertical Data Distribution Approach for a Secure Data Access on Mobile Devices

被引:0
|
作者
Kohler, Jens [1 ]
Specht, Thomas [1 ]
机构
[1] Inst Enterprise Comp, Paul Wittsack Str 10, D-68163 Mannheim, Germany
关键词
Cloud computing security; Data security and privacy; Mobile cloud platform;
D O I
10.1007/978-981-13-1951-8_21
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Vertical database partitioning and the distribution of the partitions to different clouds improves the level of security and privacy, as the respective partitions from one cloud are worthless without the others. SeDiCo (a framework for a secure and distributed cloud data store) is an implementation of such an approach. However, the data partitioning and distribution approach demands a powerful client with sufficient hardware capabilities to efficiently join the partitioned data. Mobile devices have limited hardware resources in terms of memory, processing power, and storage capacity. The aim of this paper is to adopt the SeDiCo approach to mobile devices and to prove its feasibility. For this purpose, an Android application that implements the vertical partitioning approach is conceptualized and developed. Furthermore, the implementation is evaluated with the TPC-W benchmark. As a result, mobile devices should be enabled to use a secure and distributed cloud storage to foster a broader dissemination of Cloud Computing for mobile devices. Furthermore, this approach fosters bring-your-own-device (BYOD) strategies for enterprises, as the level of data security and privacy is improved.
引用
收藏
页码:227 / 237
页数:11
相关论文
共 50 条
  • [31] A Secure Cloud-Based Nfc Mobile Payment Protocol
    Pourghomi, Pardis
    Saeed, Muhammad Qasim
    Ghinea, Gheorghita
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (10) : 24 - 31
  • [32] Data as a Currency and Cloud-Based Data Lockers
    Rana, Omer
    Weinman, Joe
    IEEE CLOUD COMPUTING, 2015, 2 (02): : 16 - 20
  • [33] Data contracts for cloud-based data marketplaces
    Truong, Hong-Linh
    Comerio, Marco
    De Paoli, Flavio
    Gangadharan, G. R.
    Dustdar, Schahram
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2012, 7 (04) : 280 - 295
  • [34] Trust Management Approach for Secure and Privacy Data Access in Cloud Computing
    Mythili, K.
    Anandakumar, H.
    2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 923 - 927
  • [35] A secure data access method based on eID for mobile Internet
    Yang, M. H.
    Yao, J. J.
    Liu, Z. X.
    Manufacturing and Engineering Technology, 2015, : 405 - 408
  • [36] Secure Cloud Data Access: Unifying Quantum Key Distribution and Attribute-Based Encryption for Enhanced Data Protection
    Kumar A.
    Verma G.
    SN Computer Science, 4 (6)
  • [37] A Secure Data Access Mechanism for Cloud Tenants
    Rong, Chunming
    Cheng, Hongbing
    THIRD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, GRIDS, AND VIRTUALIZATION (CLOUD COMPUTING 2012), 2012, : 113 - 119
  • [38] Efficient and Provably Secure Data Selective Sharing and Acquisition in Cloud-Based Systems
    Yang, Kan
    Shu, Jiangang
    Xie, Ruitao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 71 - 84
  • [39] Hierarchical group key management for secure data sharing in a cloud-based environment
    Rao, R. Velumadhava
    Selvamani, K.
    Kanimozhi, S.
    Kannan, A.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (12):
  • [40] IMPLEMENTING A SECURE CLOUD-BASED SYSTEM TO SAFEGUARD SENSITIVE MEDICAL DATA FOR HEALTHCARE
    Zghair, Noor abdul khaleq
    Al-sadi, Ameer mosa
    Taresh, Ali abdul razzaq
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (06): : 5240 - 5249