American Journal of Systems and Software
ISSN (Print): 2372-708X ISSN (Online): 2372-7071 Website: http://www.sciepub.com/journal/ajss Editor-in-chief: Josué-Antonio Nescolarde-Selva
Open Access
Journal Browser
Go
American Journal of Systems and Software. 2014, 2(1), 27-32
DOI: 10.12691/ajss-2-1-5
Open AccessReview Article

Mobicloud and Secure Data Access Framework

J. Pourqasem1, S. Karimi1 and S.A. Edalatpanah2, 3,

1Department of Computer Science, Faculty of Engineering, University of Guilan, Rasht, Iran

2Department of Applied Mathematics, Lahijan Branch, Islamic Azad University, Lahijan,Iran

3Department of Applied Mathematics, Faculty of Mathematical Sciences, University of Guilan, Rasht, Iran

Pub. Date: March 03, 2014

Cite this paper:
J. Pourqasem, S. Karimi and S.A. Edalatpanah. Mobicloud and Secure Data Access Framework. American Journal of Systems and Software. 2014; 2(1):27-32. doi: 10.12691/ajss-2-1-5

Abstract

Cloud provides the environment for the mobile users called mobicloud to performs computationally intensive operation such as searching, data mining, and multimedia processing. Addressing the trust management, secure routing, and risk management issues in this framework are notable. To this end, we present a secure mobile cloud data access framework through trust management and private data isolation.

Keywords:
cloud computing mobicloud architecture trust management

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

Figures

Figure of 4

References:

[1]  M. Walshy, “Gartner: Mobile to outpace desktop web by 2013,” Online Media Daily, January 2010.
 
[2]  D. Huang, X. Zhang, M. Kang, and J. Luo, “Mobicloud: A secure mobile cloud framework for pervasive mobile computing and communication,” in Proceedings of 5th IEEE International Symposium on ServiceOriented System Engineering, 2010.
 
[3]  X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham, and S. Jeong, “Securing elastic applications on mobile devices for cloud computing,” in Proceedings of the ACM workshop on Cloud computing security, 2009.
 
[4]  J. Lockwood, N. McKeown, G. Watson, G. Gibb, P. Hartke, J. Naous,R. Raghuraman, and J. Luo, “Net FPGA-an open platform for gigabit-rate network switching and routing,” in IEEE international Conference on Microelectronic Systems Education, 2007.
 
[5]  D. Boneh and M. Franklin, “Identity-based encryption from the weilpairing,” SIAM J. of Computing, 2003.
 
[6]  J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute-Based Encryption,” Proceedings of the 28th IEEE Symposium on Securityand Privacy (Oakland), 2007.
 
[7]  D. Huang, X. Zhang, M. Kang, and J. Luo, “Mobicloud: A secure mobicloud framework for pervasive mobile computing and communication,” in Proceedings of 5th IEEE International Symposium on Service Oriented System Engineering, 2010.
 
[8]  D. Huang and D. Medhi, “A Key-chain Based Keying Scheme for Many-to-Many Secure Group Communication,” ACM Transactions on Information and System Security, 2004.
 
[9]  A. Shamir, “How to Share a Secret,” Communications of the ACM, 1979.
 
[10]  J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute Based Encryption,” Proceedings of the 28th IEEE Symposium on Securityand Privacy (Oakland), 2007.
 
[11]  D. Boneh and M. Franklin, “Identity-based encryption from the weilpairing,” SIAM Journal of Computing, 2003.
 
[12]  J.Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute-Based Encryption,” Proceedings of the 28th IEEE Symposium on Securityand Privacy (Oakland), 2007.
 
[13]  P. Barreto, B. Libert, N. McCullagh, and J. Quisquater, “Efficient and provably-secure identity-based signatures and signcryption from bilinear maps,” Advances in Cryptology-ASIACRYPT 2005.