Skip to main content

Model of Secure Data Storage in the Cloud for Mobile Devices

  • Conference paper
  • First Online:
Book cover Computer Information Systems and Industrial Management (CISIM 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11127))

  • 1195 Accesses

Abstract

Storing data in the cloud environment becomes more and more popular for users and also for entrepreneurs. It offers high scalability, efficiency and good price. However, it’s not always secure, even if providers ensures about high security of their service. “Arms race” never stops, attackers have sophisticated tools and often specialized knowledge. Combination of these two may result in danger for data stored in clouds. Furthermore, by uploading data on cloud, we’re giving away control about them. Rapid technological progress and popularity of mobile devices results with users increasing awareness about threats. On the other hand, there’s not as many solutions for mobile devices as for desktop devices. Also their quality is not always very high. Proposed model reduces the role of “third-parties”, offering much more control for user, the owner of stored data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. https://www.newgenapps.com/blog/top-10-cloud-computing-examples-and-uses

  2. Chang, V., Ramachandran, M.: Towards achieving data security with the cloud computing adoption framework. IEEE Trans. Serv. Comput. 9(1), 138–151 (2016)

    Article  Google Scholar 

  3. Popovicand, K., Hocenski, Z.: Cloud computing security issues and challenges. In: MIPRO, 2010 Proceedings of the 33rd International Convention, pp. 24–28, May 2010

    Google Scholar 

  4. Mell, P., Grance, T.: The NIST definition of cloud computing. U.S. Department of Commerce, National Institute of Standards and Technology (2011)

    Google Scholar 

  5. https://tresorit.com/

  6. https://www2.livedrive.com/

  7. https://spideroak.com/

  8. https://www.backblaze.com/

  9. Wheeler, A., Winburn, M.: Cloud Storage Security: A Practical Guide, 1st edn. Elsevier, Amsterdam (2015)

    Google Scholar 

  10. Swenson, Ch.: Modern Cryptanalysis: Techniques for Advanced Code Breaking. Wiley, Indianapolis (2008)

    Google Scholar 

  11. Mitnick, K.: The Art of Deception: Controlling the Human Element of Security. Wiley, Indianapolis (2003)

    Google Scholar 

  12. Moore, G.E.: Cramming more components onto integrated circuits. Electronics 38 (1965)

    Google Scholar 

  13. https://www.economist.com/news/leaders/21694528-era-predictable-improvement-computer-hardware-ending-what-comes-next-future

  14. https://www.wired.com/2016/03/biometrics-coming-along-serious-security-concerns/. Accessed 03 Apr 2018

  15. https://www.usenix.org/system/files/conference/woot14/woot14-malvoni.pdf

  16. https://gist.github.com/epixoip/a83d38f412b4737e99bbef804a270c40

  17. Rajasekhar Reddy, M., Akilandeswari, R., Priyadarshini, S., Karthikeyan, B., Ponmani, E.: A modified cryptographic approach for securing distributed data storage in cloud computing. In: International Conference on Networks and Advances in Computational Technologies (NetACT) (2017)

    Google Scholar 

  18. https://www.dropbox.com/

  19. https://www.google.com/drive/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Imed El Fray .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kłos, M., El Fray, I. (2018). Model of Secure Data Storage in the Cloud for Mobile Devices. In: Saeed, K., Homenda, W. (eds) Computer Information Systems and Industrial Management. CISIM 2018. Lecture Notes in Computer Science(), vol 11127. Springer, Cham. https://doi.org/10.1007/978-3-319-99954-8_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-99954-8_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-99953-1

  • Online ISBN: 978-3-319-99954-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics