Abstract
Mobile Cloud Storage Architecture is a promising service platform provided by CSPs to store and access resources on-demand via the internet. Information and data stored on these large storage platforms can be well managed than locally stored. Cloud storage services use deduplication for saving bandwidth and storage. However, using these services pose lots of doubts and challenges in the minds of its users in relation to security, privacy, reliability and integrity of their stored data and information. An adversary can exploit side-channel information in several attack scenarios when deduplication takes place at the client side, leaking information on whether a specific plaintext exists in the cloud storage. In this paper, different security techniques and algorithms adopted to enhance security, reliability and integrity of data and information stored in the cloud are discussed. Also, an analysis of trending issues with regards to security of data and information stored in the cloud as well as the reliability and integrity of these storage platforms provided by CSPs are discussed extensively..
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Purushothaman, D., Abburu, S.: An approach for data storage security in cloud computing. Int. J. Comput. Sci. 9(1), 100–105 (2012)
Guha, V., Shrivastav, M.: Review of information authentication in mobile cloud over SaaS and PaaS layer. Int. J. Adv. Comput. Res. 39(1), 119–121 (2013)
Vasu, R.: Techniques for efficiently ensuring data storage security in cloud computing. IJCTA 2(5), 1717–1721 (2011)
Garg, P., Sharma, V.: Secure data storage in mobile cloud computing. Int. J. Sci. Eng. Res. 4(4), 1154–1159 (2013)
Shimpi, A.S., Chander, R.P.: Secure framework in data processing for mobile cloud computing. Int. J. Comput. Sci. Inf. 2(3), 73–76 (2012)
Chandar, R., Kavitha, M.S., Seenivasan, K.: A proficient model for high end security in cloud computing. Int. J. Emerg. Res. Manage. Technol. 5(10), 697–702 (2014)
Singla, S., Singh, J.: Cloud computing security using authentication and encryption technique. IJARCET 2(7), 2232–2235 (2013)
Stinson, D.: Cryptography: Theory & Practice. Chapman and Hall Publications, Boca Raton (2006)
Nigoti, R., Jhuria, M., Singh, S.: A survey of cryptographic algorithms for cloud computing. Int. J. Emerg. Technol. Comput. Appl. Sci. 4(1), 141–146 (2013)
Gampala, V., Inuganti, S., Muppidi, S.: Data security in cloud computing with elliptic curve cryptography. Int. J. Soft Comput. Eng. 2(3), 138–141 (2012)
Singh, K., Kharbanda, L., Kaur, N.: Security issue occurs in cloud computing and their solution. Int. J. Comput. Sci. Eng. 4(5), 945–949 (2012)
Bokefode, J.D., Ubale, S.A., Pingale, S.V., Karane, K.J., Apate, S.S.: Developing secure cloud storage system by applying AES and RSA cryptography algorithms with role bases access control model. Int. J. Comput. Appl. 118(12), 36–47 (2015)
Sujatha, R., Ramakrishnan, M., Duraipandian, N., Ramakrishnan, B.: Optimal adaptive genetic algorithm based hybrid signcryption algorithm for information security. CMC 55(3), 523–539 (2018)
Cheang, C.F., Wang, Y., Cai, Z., Xu, G.: Multi-VMs intrusion detection for cloud security using Dempster-Shafer theory. CMC 57(2), 297–306 (2018)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Taylor, M.E., Aboagye-Darko, D. (2019). Security Approaches and Crypto Algorithms in Mobile Cloud Storage Environment to Ensure Data Security. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11632. Springer, Cham. https://doi.org/10.1007/978-3-030-24274-9_47
Download citation
DOI: https://doi.org/10.1007/978-3-030-24274-9_47
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24273-2
Online ISBN: 978-3-030-24274-9
eBook Packages: Computer ScienceComputer Science (R0)