Skip to main content

Security Approaches and Crypto Algorithms in Mobile Cloud Storage Environment to Ensure Data Security

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11632))

Abstract

Mobile Cloud Storage Architecture is a promising service platform provided by CSPs to store and access resources on-demand via the internet. Information and data stored on these large storage platforms can be well managed than locally stored. Cloud storage services use deduplication for saving bandwidth and storage. However, using these services pose lots of doubts and challenges in the minds of its users in relation to security, privacy, reliability and integrity of their stored data and information. An adversary can exploit side-channel information in several attack scenarios when deduplication takes place at the client side, leaking information on whether a specific plaintext exists in the cloud storage. In this paper, different security techniques and algorithms adopted to enhance security, reliability and integrity of data and information stored in the cloud are discussed. Also, an analysis of trending issues with regards to security of data and information stored in the cloud as well as the reliability and integrity of these storage platforms provided by CSPs are discussed extensively..

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Purushothaman, D., Abburu, S.: An approach for data storage security in cloud computing. Int. J. Comput. Sci. 9(1), 100–105 (2012)

    Google Scholar 

  2. Guha, V., Shrivastav, M.: Review of information authentication in mobile cloud over SaaS and PaaS layer. Int. J. Adv. Comput. Res. 39(1), 119–121 (2013)

    Google Scholar 

  3. Vasu, R.: Techniques for efficiently ensuring data storage security in cloud computing. IJCTA 2(5), 1717–1721 (2011)

    Google Scholar 

  4. Garg, P., Sharma, V.: Secure data storage in mobile cloud computing. Int. J. Sci. Eng. Res. 4(4), 1154–1159 (2013)

    Google Scholar 

  5. Shimpi, A.S., Chander, R.P.: Secure framework in data processing for mobile cloud computing. Int. J. Comput. Sci. Inf. 2(3), 73–76 (2012)

    Google Scholar 

  6. Chandar, R., Kavitha, M.S., Seenivasan, K.: A proficient model for high end security in cloud computing. Int. J. Emerg. Res. Manage. Technol. 5(10), 697–702 (2014)

    Google Scholar 

  7. Singla, S., Singh, J.: Cloud computing security using authentication and encryption technique. IJARCET 2(7), 2232–2235 (2013)

    Google Scholar 

  8. Stinson, D.: Cryptography: Theory & Practice. Chapman and Hall Publications, Boca Raton (2006)

    MATH  Google Scholar 

  9. Nigoti, R., Jhuria, M., Singh, S.: A survey of cryptographic algorithms for cloud computing. Int. J. Emerg. Technol. Comput. Appl. Sci. 4(1), 141–146 (2013)

    Google Scholar 

  10. Gampala, V., Inuganti, S., Muppidi, S.: Data security in cloud computing with elliptic curve cryptography. Int. J. Soft Comput. Eng. 2(3), 138–141 (2012)

    Google Scholar 

  11. Singh, K., Kharbanda, L., Kaur, N.: Security issue occurs in cloud computing and their solution. Int. J. Comput. Sci. Eng. 4(5), 945–949 (2012)

    Google Scholar 

  12. Bokefode, J.D., Ubale, S.A., Pingale, S.V., Karane, K.J., Apate, S.S.: Developing secure cloud storage system by applying AES and RSA cryptography algorithms with role bases access control model. Int. J. Comput. Appl. 118(12), 36–47 (2015)

    Google Scholar 

  13. Sujatha, R., Ramakrishnan, M., Duraipandian, N., Ramakrishnan, B.: Optimal adaptive genetic algorithm based hybrid signcryption algorithm for information security. CMC 55(3), 523–539 (2018)

    Google Scholar 

  14. Cheang, C.F., Wang, Y., Cai, Z., Xu, G.: Multi-VMs intrusion detection for cloud security using Dempster-Shafer theory. CMC 57(2), 297–306 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Micheal Ernest Taylor or David Aboagye-Darko .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Taylor, M.E., Aboagye-Darko, D. (2019). Security Approaches and Crypto Algorithms in Mobile Cloud Storage Environment to Ensure Data Security. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11632. Springer, Cham. https://doi.org/10.1007/978-3-030-24274-9_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24274-9_47

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24273-2

  • Online ISBN: 978-3-030-24274-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics