A Proxy-Based Data Security Solution in Mobile Cloud

被引:0
|
作者
Yu, Xiaojun [1 ,2 ]
Wen, Qiaoyan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Beijing TOPSEC Network Secur Technol CO LTD, Beijing 100085, Peoples R China
基金
中国国家自然科学基金;
关键词
Mobile Cloud; Data Security; Proxy;
D O I
10.14257/ijsia.2015.9.5.08
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a data security solution in mobile cloud, which solves the security issues in the mobile client and cloud. The proposed solution also relieves the performance limitation of mobile client when executing security technologies. The analysis about the security, feasibility, compatibility and expansibility and the experiment suggests the proposed solution is rational.
引用
收藏
页码:77 / 84
页数:8
相关论文
共 50 条
  • [1] Proxy-based Aggregated Synchronization Scheme in Mobile Cloud Computing
    Lee, Giwon
    Ko, Haneul
    Pack, Sangheon
    [J]. 2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 187 - 188
  • [2] Proxy-based wireless data access algorithms in mobile hotspots
    Pack, Sangheon
    Rutagemwa, Humphrey
    Shen, Xuemin
    Mark, Jon W.
    Park, Kunwoo
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2008, 57 (05) : 3165 - 3177
  • [3] A Proxy-Based Mobile Computing Infrastructure
    Khalaj, Azade
    Lutfiyya, Hanan
    Perry, Mark
    [J]. 2012 THIRD FTRA INTERNATIONAL CONFERENCE ON MOBILE, UBIQUITOUS, AND INTELLIGENT COMPUTING (MUSIC), 2012, : 21 - 28
  • [4] Proxy-based Web Service Security
    Wu, Jian
    Huang, Zhimin
    [J]. 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1282 - 1288
  • [5] A proxy-based solution for interoperability of smarthome protocols
    Oliveira Albuquerque, Heldon Jose
    de Aquino, Gibeon Soares, Jr.
    [J]. 2014 EIGHTH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS),, 2014, : 287 - 293
  • [6] A proxy-based solution for device capabilities detection
    Sanchez-Loro, Xavier
    Casademont, Jordi
    Ferrer, Jose Luis
    Paradells, Josep
    [J]. PROCEEDINGS OF THE IASTED EUROPEAN CONFERENCE ON INTERNET AND MULTIMEDIA SYSTEMS AND APPLICATIONS, 2007, : 28 - +
  • [7] A Proxy-based Cloud Infrastructure for Home Service Robots
    Li, Gaofeng
    Wang, Hongpeng
    Ying, Xin
    Liu, Jingtai
    [J]. 2015 27TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2015, : 5718 - 5723
  • [8] A Protect Solution for Data Security in Mobile Cloud Storage
    Yu, Xiaojun
    Wen, Qiaoyan
    [J]. FIFTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2012): ALGORITHMS, PATTERN RECOGNITION AND BASIC TECHNOLOGIES, 2013, 8784
  • [9] A Proxy-Based Server Irrelevant Security Mechanism for VoIP
    Zhao, Yun
    Wang, Jianxin
    Wang, Xingjun
    [J]. 2013 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 1, 2013, : 111 - 115
  • [10] Data Sharing on the Cloud: A scalable proxy-based protocol for privacy-preserving queries
    Sepehri, Maryam
    Cimato, Stelvio
    Damiani, Ernesto
    Yeun, Chan Yeob
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1357 - 1362