A Protect Solution for Data Security in Mobile Cloud Storage

被引:0
作者
Yu, Xiaojun [1 ]
Wen, Qiaoyan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
来源
FIFTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2012): ALGORITHMS, PATTERN RECOGNITION AND BASIC TECHNOLOGIES | 2013年 / 8784卷
关键词
cloud storage; data security; protect solution; searchable encryption; trusted computing;
D O I
10.1117/12.2014030
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
It is popular to access the cloud storage by mobile devices. However, this application suffer data security risk, especial the data leakage and privacy violate problem. This risk exists not only in cloud storage system, but also in mobile client platform. To reduce the security risk, this paper proposed a new security solution. It makes full use of the searchable encryption and trusted computing technology. Given the performance limit of the mobile devices, it proposes the trusted proxy based protection architecture. The design basic idea, deploy model and key flows are detailed. The analysis from the security and performance shows the advantage.
引用
收藏
页数:6
相关论文
共 7 条
[1]  
[Anonymous], 2010, TOP THREATS CLOUD CO
[2]  
[Anonymous], NIST SPECIAL PUBLICA
[3]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[4]  
Li JC, 2010, INT ARCH PHOTOGRAMM, V38, P1
[5]  
Song DXD, 2000, P IEEE S SECUR PRIV, P44, DOI 10.1109/SECPRI.2000.848445
[6]  
Yu X., 2011, J INF TECHNOL, V1, P54
[7]  
Yu Xiaojun, 2010, P 2010 INT C COMP IN, V2, P1