ABSTRACT
Secure cloud storage is a hot topic nowadays. However, most solutions are user-centric, i.e., they focus on private data owned by a single individual. In the case of Remote Mobile Data Collection, we have many collectors continuously uploading data to a central cloud storage on one hand, and several data analysts or decision makers that require this data in real time on the other. In this paper we investigate the challenges related to this model and discuss possible solutions.
- Android. http://www.android.com/. Online, Accessed March 2013.Google Scholar
- Moritz Borgmann, Tobias Hahn, Michael Herfert, Thomas Kunz, Marcel Richter, Ursula Viebeg, and Sven Vowe. On the security of cloud storage services. Technical report, Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany, 2012.Google Scholar
- Waylon Brunette, Mitchell Sundt, Nicola Dell, Rohit Chaudhri, Nathan Breit, and Gaetano Borriello. Open data kit 2.0: expanding and refining information services for developing regions. In Sharad Agarwal and Alexander Varshavsky, editors, HotMobile - 14th Workshop on Mobile Computing Systems and Applications, page 10. ACM, 2013. Google ScholarDigital Library
- Amazon Elastic Compute Cloud. http://aws.amazon.com/ec2/. Online, Accessed March 2013.Google Scholar
- Google App Engine. https://developers.google.com/appengine/. Online, Accessed March 2013.Google Scholar
- Episurveyor. http://www.episurveyor.org/. Online, Accessed March 2013.Google Scholar
- Request for Comments RFC5054. http://tools.ietf.org/html/rfc5054. Online, Accessed March 2013.Google Scholar
- Samson Gejibo, Federico Mancini, Khalid A. Mughal, Remi Valvik, and Jørn Klungsøyr. Secure data storage for mobile data collection systems. In Janusz Kacprzyk, Dominique Laurent, and Richard Chbeir, editors, MEDES'12 - International Conference on Management of Emergent Digital EcoSystems, pages 131--144. ACM, 2012. Google ScholarDigital Library
- D. Grolimund, L. Meisser, S. Schmid, and R. Wattenhofer. Cryptree: A folder tree structure for cryptographic file systems. In Reliable Distributed Systems, 2006. SRDS '06. 25th IEEE Symposium on, pages 189--198, 2006. Google ScholarDigital Library
- J. Klungsøyr, T. Tylleskar, B. MacLeod, P. Bagyenda, W. Chen, and P. Wakholi. OMEVAC - open mobile electronic vaccine trials, an interdisciplinary project to improve quality of vaccine trials in low resource settings. In Proceedings of M4D '08 - The 1st International Conference on Mobile Communication Technology for Development, pages 36--44. Karlstad University Studies, 2008.Google Scholar
- F. Mancini, K. A. Mughal, S. H. Gejibo, and J. Klungsoyr. Adding security to mobile data collection. In Healthcom 2011 - 13th IEEE International Conference on e-Health Networking Applications and Services, pages 86--89, june 2011.Google Scholar
- Federico Mancini, Samson Gejibo, Khalid A. Mughal, Remi Valvik, and Jørn Klungsøyr. Secure mobile data collection systems for low-budget settings. In ARES 2011 - The Seventh International Conference on Availability, Reliability, pages 196--205. IEEE Computer Society, 2012. Google ScholarDigital Library
- MEGA. https://mega.co.nz. Online, Accessed March 2013.Google Scholar
- Mobenzi Researcher. http://www.mobenzi.com/researcher/. Online, Accessed November 2013.Google Scholar
- nCrypted. https://www.ncryptedcloud.com/. Online, Accessed March 2013.Google Scholar
- ODK. http://opendatakit.org/about/deployments/. Online, Accessed March 2013.Google Scholar
- ODK. http://opendatakit.org/help/help-for-hire/. Online, Accessed March 2013.Google Scholar
- openXdata. http://www.openxdata.org. Online, Accessed March 2013.Google Scholar
- Oracle. Java ME reference. http://www.oracle.com/technetwork/java/javame/index.html. Online, Accessed March 2013.Google Scholar
- S. B. Roosa and S. Schultze. The "Certificate Authority" Trust Model for SSL: A Defective Foundation for Encrypted Web Traffic and a Legal Quagmire. Intellectual Property & Technology Law Journal, 22(11):3--7, 2010.Google Scholar
- Adi Shamir. How to share a secret. Commun. ACM, 22(11):612--613, 1979. Google ScholarDigital Library
- The CA/Browser Forum. Baseline requirements for the issuance and management of publicly-trusted certificates, v.1.0, 2011.Google Scholar
- Vital Wave Consulting. mHealth for Development: The Opportunity of Mobile Technology for Healthcare in the Developing World. Washington, D.C. and Berkshire, UK: UN Foundation-Vodafone Foundation Partnership, February 2009.Google Scholar
Index Terms
- Secure cloud storage for remote mobile data collection
Recommendations
Toward publicly auditable secure cloud data storage services
Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on-demand high-quality applications and services from a shared pool of configurable computing resources. While ...
Data storage auditing service in cloud computing: challenges, methods and opportunities
Cloud computing is a promising computing model that enables convenient and on-demand network access to a shared pool of configurable computing resources. The first offered cloud service is moving data into the cloud: data owners let cloud service ...
Efficient and secure data storage operations for mobile cloud computing
CNSM '12: Proceedings of the 8th International Conference on Network and Service ManagementIn a mobile cloud computing system, lightweight wireless communication devices extend cloud services into the sensing domain. A common mobile cloud secure data service is to inquiry the data from sensing devices. The data can be collected from multiple ...
Comments