skip to main content
10.1145/2513534.2513538acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnordicloudConference Proceedingsconference-collections
research-article

Secure cloud storage for remote mobile data collection

Published:02 September 2013Publication History

ABSTRACT

Secure cloud storage is a hot topic nowadays. However, most solutions are user-centric, i.e., they focus on private data owned by a single individual. In the case of Remote Mobile Data Collection, we have many collectors continuously uploading data to a central cloud storage on one hand, and several data analysts or decision makers that require this data in real time on the other. In this paper we investigate the challenges related to this model and discuss possible solutions.

References

  1. Android. http://www.android.com/. Online, Accessed March 2013.Google ScholarGoogle Scholar
  2. Moritz Borgmann, Tobias Hahn, Michael Herfert, Thomas Kunz, Marcel Richter, Ursula Viebeg, and Sven Vowe. On the security of cloud storage services. Technical report, Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany, 2012.Google ScholarGoogle Scholar
  3. Waylon Brunette, Mitchell Sundt, Nicola Dell, Rohit Chaudhri, Nathan Breit, and Gaetano Borriello. Open data kit 2.0: expanding and refining information services for developing regions. In Sharad Agarwal and Alexander Varshavsky, editors, HotMobile - 14th Workshop on Mobile Computing Systems and Applications, page 10. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Amazon Elastic Compute Cloud. http://aws.amazon.com/ec2/. Online, Accessed March 2013.Google ScholarGoogle Scholar
  5. Google App Engine. https://developers.google.com/appengine/. Online, Accessed March 2013.Google ScholarGoogle Scholar
  6. Episurveyor. http://www.episurveyor.org/. Online, Accessed March 2013.Google ScholarGoogle Scholar
  7. Request for Comments RFC5054. http://tools.ietf.org/html/rfc5054. Online, Accessed March 2013.Google ScholarGoogle Scholar
  8. Samson Gejibo, Federico Mancini, Khalid A. Mughal, Remi Valvik, and Jørn Klungsøyr. Secure data storage for mobile data collection systems. In Janusz Kacprzyk, Dominique Laurent, and Richard Chbeir, editors, MEDES'12 - International Conference on Management of Emergent Digital EcoSystems, pages 131--144. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Grolimund, L. Meisser, S. Schmid, and R. Wattenhofer. Cryptree: A folder tree structure for cryptographic file systems. In Reliable Distributed Systems, 2006. SRDS '06. 25th IEEE Symposium on, pages 189--198, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Klungsøyr, T. Tylleskar, B. MacLeod, P. Bagyenda, W. Chen, and P. Wakholi. OMEVAC - open mobile electronic vaccine trials, an interdisciplinary project to improve quality of vaccine trials in low resource settings. In Proceedings of M4D '08 - The 1st International Conference on Mobile Communication Technology for Development, pages 36--44. Karlstad University Studies, 2008.Google ScholarGoogle Scholar
  11. F. Mancini, K. A. Mughal, S. H. Gejibo, and J. Klungsoyr. Adding security to mobile data collection. In Healthcom 2011 - 13th IEEE International Conference on e-Health Networking Applications and Services, pages 86--89, june 2011.Google ScholarGoogle Scholar
  12. Federico Mancini, Samson Gejibo, Khalid A. Mughal, Remi Valvik, and Jørn Klungsøyr. Secure mobile data collection systems for low-budget settings. In ARES 2011 - The Seventh International Conference on Availability, Reliability, pages 196--205. IEEE Computer Society, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. MEGA. https://mega.co.nz. Online, Accessed March 2013.Google ScholarGoogle Scholar
  14. Mobenzi Researcher. http://www.mobenzi.com/researcher/. Online, Accessed November 2013.Google ScholarGoogle Scholar
  15. nCrypted. https://www.ncryptedcloud.com/. Online, Accessed March 2013.Google ScholarGoogle Scholar
  16. ODK. http://opendatakit.org/about/deployments/. Online, Accessed March 2013.Google ScholarGoogle Scholar
  17. ODK. http://opendatakit.org/help/help-for-hire/. Online, Accessed March 2013.Google ScholarGoogle Scholar
  18. openXdata. http://www.openxdata.org. Online, Accessed March 2013.Google ScholarGoogle Scholar
  19. Oracle. Java ME reference. http://www.oracle.com/technetwork/java/javame/index.html. Online, Accessed March 2013.Google ScholarGoogle Scholar
  20. S. B. Roosa and S. Schultze. The "Certificate Authority" Trust Model for SSL: A Defective Foundation for Encrypted Web Traffic and a Legal Quagmire. Intellectual Property & Technology Law Journal, 22(11):3--7, 2010.Google ScholarGoogle Scholar
  21. Adi Shamir. How to share a secret. Commun. ACM, 22(11):612--613, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. The CA/Browser Forum. Baseline requirements for the issuance and management of publicly-trusted certificates, v.1.0, 2011.Google ScholarGoogle Scholar
  23. Vital Wave Consulting. mHealth for Development: The Opportunity of Mobile Technology for Healthcare in the Developing World. Washington, D.C. and Berkshire, UK: UN Foundation-Vodafone Foundation Partnership, February 2009.Google ScholarGoogle Scholar

Index Terms

  1. Secure cloud storage for remote mobile data collection

          Recommendations

          Reviews

          Mariam Kiran

          Securing the cloud is currently a major research issue. From banks and businesses to medical facilities, many organizations are thinking of moving to the cloud, but are hindered by the security concerns related to putting their files in cloud storage. This well-written paper discusses a remote mobile data collection application that attempts to solve these issues for mobile health (mhealth) applications. The authors describe the processes involved, with extensive background details and information on technologies already available. The figure for the proposed solution is particularly interesting, describing nearly all of the authentication processes for key acquisition and showing how data is transferred from one user to another. The transfer of keys presents some complex challenges, and the authors do not explain very well how this approach securely prevents unauthorized access. The paper goes on to discuss other issues such as the availability, integration, and usability of these applications, but as I understand these issues do not play a role in this topic. I would, however, like to read about them in future works. The paper lacks any discussion of the kind of threats one might face when using mhealth architectures and the business objective of actually migrating to one. Also, the authors do not discuss practical implementations of the application, as it seems to be in a planning phase. This too would be interesting to see in the future. All in all, I found this to be a good starting point for researchers currently investigating mhealth issues. Online Computing Reviews Service

          Access critical reviews of Computing literature here

          Become a reviewer for Computing Reviews.

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            NordiCloud '13: Proceedings of the Second Nordic Symposium on Cloud Computing & Internet Technologies
            September 2013
            88 pages
            ISBN:9781450323079
            DOI:10.1145/2513534

            Copyright © 2013 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 2 September 2013

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            NordiCloud '13 Paper Acceptance Rate9of15submissions,60%Overall Acceptance Rate9of15submissions,60%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader