A Mobile Terminal Security Strategy Based On the Cloud Storage

Publications

Share / Export Citation / Email / Print / Text size:

International Journal of Advanced Network, Monitoring and Controls

Xi'an Technological University

Subject: Computer Science, Software Engineering

GET ALERTS

eISSN: 2470-8038

DESCRIPTION

8
Reader(s)
12
Visit(s)
0
Comment(s)
0
Share(s)

SEARCH WITHIN CONTENT

FIND ARTICLE

Volume / Issue / page

Related articles

VOLUME 2 , ISSUE 2 (June 2017) > List of articles

A Mobile Terminal Security Strategy Based On the Cloud Storage

Wang Hui / Tang Junyong

Keywords : Cloud Storage, HDFS, Dynamo, Dynamic Consistent Hashing Algorithm, AES, RSA, Multi - Copy Mechanism

Citation Information : International Journal of Advanced Network, Monitoring and Controls. Volume 2, Issue 2, Pages 46-59, DOI: https://doi.org/10.21307/ijanmc-2017-009

License : (CC BY-NC-ND 4.0)

Published Online: 08-April-2018

ARTICLE

ABSTRACT

With the emergence of mass storage systems and the development of the Distributed File System, Cloud storage system has become the focus of the industry. The cloud storage services on mobile terminal have been putted on the agenda based on the rapid development of intelligent mobile terminal. Based on the analysis of the architecture of HDFS and Dynamo, a mobile Terminal Security strategy is presented in this paper. The database technology and the dynamic consistent hashing algorithm are adopted to deal with different target groups. According to the storage costs of nodes, data would be integrated scheduling by the storage system. Make full use of the advantages of AES(Advanced Encryption Standard) and RSA. A solution that combines AES and RSA encryption algorithm is proposed to implement the mobile terminal cloud storage security. Through the theoretical analysis and the simulation results, the cloud storage strategy proposed in this paper can make the cloud system achieve load balance. Moreover, multi-copy mechanism can improve the overall efficiency of the system.

Content not available PDF Share

FIGURES & TABLES

REFERENCES

IDZIOREK J, TANNIAN M, JACOBSON D. Attribution of Fraudulent Resource Consumption in the Cloud [J]. 2012 IEEE Fifth International Conference on Cloud Computing, 201299-106.

 

TSAI T, THEERA -AMPORNPUNT N, BAGCHI S. A study of soft error consequences in hard disk drives [J].IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), 2012:1-8.

 

Schmuck F B, Haskin R L.GPFS: A shared-disk file system for large computing clusters[C]//Proceedings of the Conference on File and Storage Technologies, January 28-30, 2002:231-244.

 

Namjoshi J, Gupte A. Service oriented architecture for cloud based travel reservation software as a service[C]// Proceedingsof the 2009 IEEE International Conference on Cloud Computing(CLOUD’09), Bangalore, India Sep 21-25, 2009.Los Alamitos, CA, USA: IEEE Computer Society, 2009:147-150.

 

Goth G. Virtualization: Old technology offers huge new potential [J].IEEE Distributed Systems Online, 2007,8(2).

 

BOWERS K D, JUELS A, OPREA A. Proofs of retrievability : theory and implementation [J]. Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW′ 09), 2009:43.

 

ARMBRUST M, STOICA I, ZAHARIA M, et al. A view of cloud computing [C]. Communications of the ACM , 2010, 53(4):50.

 

MELL P, GRANCE T. NIST Special Publication 800 -145:The NIST Definition of Cloud Computing [J]. National Institute of Standards and Technology, 2011.

 

KARAME G O, CAPKUN S, MAURER U. Privacy -preserving outsourcing of brute-force key searches[J]. Proceedings of the 3rd ACM workshop on Cloud computing security workshop (CCSW′ 11): 2011:101.

 

SCHIFFMAN J, MOYER T, VIJAYAKUMAR H, et al. Seeding clouds with trust anchors [J]. Proceedings of the2010 ACM workshop on Cloud computing security workshop (CCSW′ 10), 2010: 43

 

EXTRA FILES

COMMENTS