Abstract
Mobile cloud storage service is used for users’ multimedia content data sharing or synchronization in effective way with several mobile devices. To save various content data in the mobile cloud storage, the matters of security should be treated in the process of data sharing to provide flexibility and expandability for solving its heterogeneousness. Currently, the cloud storage service generally encrypts the content data for the security. However, this method is not perfectly safe for it manages ID, password, and encryption key simply with software; thus it may accept unauthorized users. This research suggests the data access control model and the method for multimedia content sharing and security based on XMDR-DAI in the mobile cloud storage. It supports key management based on hardware, identification for the integrity of client software, and security key sharing. Also, the suggested model saves/manages different types of multimedia content, thus it establishes XMDR-DAI-based metadata relationship for the problems that occurred in searching to increase the reliability. And this research suggests the prototype using TPM emulator that is operated in secure world of ARM TrustZone and TrustZone environment.
Similar content being viewed by others
References
Amazon S3, http://docs.amdocs.amazonwebserrvices.com/AamzonS3/latest/dev/UsingEncryption.html/
ARM (2009) ARM Securtiy technology, building a secure system using trust zone technology
Bright, JD and Chandy J (2003) A scalable architecture for clustered network attached storage. Mass Storage Systems and Technologies, 2003. (MSST 2003). Proceedings. 20th IEEE/11th NASA Goddard Conference on. IEEE
Dropbox. http://www.dropbox.com/
EMC, http://www.emc.com/
Gibson GA, Van Meter R (2000) Network attached storage architecture. Commun ACM 43.11:37–45
GlusterFS,htttp://www.gluster.org/
Greene, M and Parker, M (2016) Method and system for detecting a keylogger that encrypts data captured on a computer. U.S. Patent Application 11/492,581
Hadoop Project, http://hadoop.apache.org/
Horne JD (2010) Method and system for detecting a keylogger on a computer. U.S. Patent No. 7,721,333
https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf/, Nov 11 (2011)
https://downloads.cloudsecurityalliance.org/initiatives/top_threats/Top_Threats_Cloud_Computing_Survey_2012.pdf, Nov 11 (2012)
Hyang-Jin L (2012) Security consieration for use of secure cloud services, CloudSec 2012, Mar 13;Seoul, Korea
Keck, KD and McCarthy JL (2005) XMDR: Proposed Prototype Architecture Version 1.01
Khan AN et al (2013) Towards secure mobile cloud computing: A survey. Future Generation Computer Systems 29.5:1278–1299
Kinney SL (2006) Trusted platform module basics: using TPM in embedded systems. Newnes
Mishra AK et al (2010) Towards characterizing cloud backend workloads: insights from google compute clusters. ACM Sigmetrics Perform Eval Rev 37.4:34–41
Moon SJ, GyeDong J and Young Keun C (2010) XMDR-DAI based on GQBP and LQBP for business process. Advanced computer science and information technology. Springer Berlin Heidelberg 72–85
Mousa A, Hamad A (2006) Evaluation of the RC4 Algorithm for data encryption. IJCSA 3(2):44–56
Nahum N (2005)Storage virtualization in a storage area network. U.S. Patent No. 6,898,670
O'connor, MA (2003) Method of enabling heterogeneous platforms to utilize a universal file system in a storage area network. U.S. Patent No. 6,564,228
Openstack, http://www.openstack.org/
Sanaei Z et al (2012) Tripod of requirements in horizontal heterogeneous mobile cloud computing. arXiv preprint arXiv:1205.3247
Sanaei Z et al (2014) Heterogeneity in mobile cloud computing: taxonomy and open challenges. Commun Surv Tutorials, IEEE 16.1:369–392
Sharma S et al (2004) Viking: A multi-spanning-tree Ethernet architecture for metropolitan area and cluster networks." INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies. Vol. 4. IEEE
Tang W et al (2011) Multi-platform mobile thin client architecture in cloud environment. Procedia Environ Sci 11:499–504
Winter, J (2008) Trusted computing building blocks for embedded linux-based ARM trustzone platforms. Proceedings of the 3rd ACM workshop on Scalable trusted computing. ACM
Zhou Z and Dijiang H (2012) Efficient and secure data storage operations for mobile cloud computing." Proceedings of the 8th International Conference on Network and Service Management. International Federation for Information Processing
Acknowledgments
This work reported in this paper was conducted during the sabbatical year of Kwangwoon University in 2013.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jung, KD., Moon, SJ. & Kim, JM. Data access control method for multimedia content data sharing and security based on XMDR-DAI in mobile cloud storage. Multimed Tools Appl 76, 19983–19999 (2017). https://doi.org/10.1007/s11042-016-4016-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-4016-8