Abstract
Storing data in the cloud environment becomes more and more popular for users and also for entrepreneurs. It offers high scalability, efficiency and good price. However, it’s not always secure, even if providers ensures about high security of their service. “Arms race” never stops, attackers have sophisticated tools and often specialized knowledge. Combination of these two may result in danger for data stored in clouds. Furthermore, by uploading data on cloud, we’re giving away control about them. Rapid technological progress and popularity of mobile devices results with users increasing awareness about threats. On the other hand, there’s not as many solutions for mobile devices as for desktop devices. Also their quality is not always very high. Proposed model reduces the role of “third-parties”, offering much more control for user, the owner of stored data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
https://www.newgenapps.com/blog/top-10-cloud-computing-examples-and-uses
Chang, V., Ramachandran, M.: Towards achieving data security with the cloud computing adoption framework. IEEE Trans. Serv. Comput. 9(1), 138–151 (2016)
Popovicand, K., Hocenski, Z.: Cloud computing security issues and challenges. In: MIPRO, 2010 Proceedings of the 33rd International Convention, pp. 24–28, May 2010
Mell, P., Grance, T.: The NIST definition of cloud computing. U.S. Department of Commerce, National Institute of Standards and Technology (2011)
Wheeler, A., Winburn, M.: Cloud Storage Security: A Practical Guide, 1st edn. Elsevier, Amsterdam (2015)
Swenson, Ch.: Modern Cryptanalysis: Techniques for Advanced Code Breaking. Wiley, Indianapolis (2008)
Mitnick, K.: The Art of Deception: Controlling the Human Element of Security. Wiley, Indianapolis (2003)
Moore, G.E.: Cramming more components onto integrated circuits. Electronics 38 (1965)
https://www.wired.com/2016/03/biometrics-coming-along-serious-security-concerns/. Accessed 03 Apr 2018
https://www.usenix.org/system/files/conference/woot14/woot14-malvoni.pdf
https://gist.github.com/epixoip/a83d38f412b4737e99bbef804a270c40
Rajasekhar Reddy, M., Akilandeswari, R., Priyadarshini, S., Karthikeyan, B., Ponmani, E.: A modified cryptographic approach for securing distributed data storage in cloud computing. In: International Conference on Networks and Advances in Computational Technologies (NetACT) (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Kłos, M., El Fray, I. (2018). Model of Secure Data Storage in the Cloud for Mobile Devices. In: Saeed, K., Homenda, W. (eds) Computer Information Systems and Industrial Management. CISIM 2018. Lecture Notes in Computer Science(), vol 11127. Springer, Cham. https://doi.org/10.1007/978-3-319-99954-8_37
Download citation
DOI: https://doi.org/10.1007/978-3-319-99954-8_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-99953-1
Online ISBN: 978-3-319-99954-8
eBook Packages: Computer ScienceComputer Science (R0)