SeC2: SECURE MOBILE SOLUTION FOR DISTRIBUTED PUBLIC CLOUD STORAGES

Juraj Somorovsky, Christopher Meyer, Thang Tran, Mohamad Sbeiti, Jörg Schwenk, Christian Wietfeld

2012

Abstract

Cloud Computing is an emerging technology that attracts increasing attention as a high-performance and low-cost solution to process arbitrarily huge data and share them among different users and organizations. Nonetheless, this technology rises new questions on security and privacy, especially when working with highly confidential data. Existing solutions offering end-to-end security such as TLS are of no help since the stored data is only encrypted during their transport. Therefore, a message-level security must at least be applied to protect those data during and after the storing process. This paper investigates a novel solution for secure data storage in the cloud. It presents a security concept allowing each client to encrypt outgoing data on one’s mobile device and share it among a defined user group while using a seamless service provision. As our concept is used transparently as well as independently on each device, users keep full control over their data and almost no changes on the existing infrastructure of cloud storage services are needed.

References

  1. Cantor, Kemp, Philpott, and Maler (2005). Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0. Technical report.
  2. Cantor, Kemp, Philpott, and Maler (2005). Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0. Technical report.
  3. Dierks, T. and Rescorla, E. (2008). RFC 5246 - The Transport Layer Security (TLS) Protocol Version 1.2. Technical report, Network Working Group.
  4. Dierks, T. and Rescorla, E. (2008). RFC 5246 - The Transport Layer Security (TLS) Protocol Version 1.2. Technical report, Network Working Group.
  5. Eastlake, Reagle, Imamura, Dillaway, and Simon (2002). XML Encryption Syntax and Processing. Technical report.
  6. Eastlake, Reagle, Imamura, Dillaway, and Simon (2002). XML Encryption Syntax and Processing. Technical report.
  7. Eastlake, Reagle, Solo, Hirsch, Roessler, Bartel, Boyer, Fox, LaMacchia, and Simon (2008). XML Signature Syntax and Processing (Second Edition). Technical report.
  8. Eastlake, Reagle, Solo, Hirsch, Roessler, Bartel, Boyer, Fox, LaMacchia, and Simon (2008). XML Signature Syntax and Processing (Second Edition). Technical report.
  9. Elkins, M., Torto, D. D., Levien, R., and Roessler, T. (2001). MIME Security with OpenPGP. RFC 3156 (Proposed Standard).
  10. Elkins, M., Torto, D. D., Levien, R., and Roessler, T. (2001). MIME Security with OpenPGP. RFC 3156 (Proposed Standard).
  11. Jensen and Meyer (2011). Expressiveness Considerations of XML Signatures. In SAPSE 2011: IEEE International Workshop on Security Aspects of Process and Services Engineering.
  12. Jensen and Meyer (2011). Expressiveness Considerations of XML Signatures. In SAPSE 2011: IEEE International Workshop on Security Aspects of Process and Services Engineering.
  13. Kamara, S. and Lauter, K. (2010). Cryptographic Cloud Storage. In Financial Cryptography and Data Security. Springer Berlin / Heidelberg, Berlin, Heidelberg.
  14. Kamara, S. and Lauter, K. (2010). Cryptographic Cloud Storage. In Financial Cryptography and Data Security. Springer Berlin / Heidelberg, Berlin, Heidelberg.
  15. Kent, S. and Seo, K. (2005). RFC 4301 - Security Architecture for the Internet Protocol. Technical report, Network Working Group.
  16. Kent, S. and Seo, K. (2005). RFC 4301 - Security Architecture for the Internet Protocol. Technical report, Network Working Group.
  17. Molnar, D. and Schechter, S. (2010). Self hosting vs. cloud hosting: Accounting for the security impact of hosting in the cloud. In Proceedings of the Ninth Workshop on the Economics of Information Security (WEIS).
  18. Molnar, D. and Schechter, S. (2010). Self hosting vs. cloud hosting: Accounting for the security impact of hosting in the cloud. In Proceedings of the Ninth Workshop on the Economics of Information Security (WEIS).
  19. Ramsdell, B. (2004). Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification. RFC 3851 (Proposed Standard). Obsoleted by RFC 5751.
  20. Ramsdell, B. (2004). Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification. RFC 3851 (Proposed Standard). Obsoleted by RFC 5751.
  21. Tran, T., Yousaf, F. Z., and Wietfeld, C. (2010). Cshmu: Client based secure handoff solution for mobile units. In The 21st IEEE International Symposium on Personal, Indoor and Mobile Radio Communication (PIMRC), Istanbul, Turkey. IEEE.
  22. Tran, T., Yousaf, F. Z., and Wietfeld, C. (2010). Cshmu: Client based secure handoff solution for mobile units. In The 21st IEEE International Symposium on Personal, Indoor and Mobile Radio Communication (PIMRC), Istanbul, Turkey. IEEE.
  23. Wang, S.-C., Yan, K.-Q., Liao, W.-P., and Wang, S.-S. (2010). Towards a load balancing in a three-level cloud computing network. In Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on, volume 1, pages 108 -113.
  24. Wang, S.-C., Yan, K.-Q., Liao, W.-P., and Wang, S.-S. (2010). Towards a load balancing in a three-level cloud computing network. In Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on, volume 1, pages 108 -113.
  25. Wu, J., Ping, L., Ge, X., Wang, Y., and Fu, J. (2010). Cloud storage as the infrastructure of cloud computing. In Proceedings of the 2010 International Conference on Intelligent Computing and Cognitive Informatics, ICICCI 7810, pages 380-383, Washington, DC, USA. IEEE Computer Society.
  26. Wu, J., Ping, L., Ge, X., Wang, Y., and Fu, J. (2010). Cloud storage as the infrastructure of cloud computing. In Proceedings of the 2010 International Conference on Intelligent Computing and Cognitive Informatics, ICICCI 7810, pages 380-383, Washington, DC, USA. IEEE Computer Society.
  27. Zhang, S., Zhang, S., Chen, X., and Huo, X. (2010). Cloud computing research and development trend. In Proceedings of the 2010 Second International Conference on Future Networks, ICFN 7810, pages 93-97, Washington, DC, USA. IEEE Computer Society.
  28. Zhang, S., Zhang, S., Chen, X., and Huo, X. (2010). Cloud computing research and development trend. In Proceedings of the 2010 Second International Conference on Future Networks, ICFN 7810, pages 93-97, Washington, DC, USA. IEEE Computer Society.
Download


Paper Citation


in Harvard Style

Somorovsky J., Meyer C., Tran T., Sbeiti M., Schwenk J. and Wietfeld C. (2012). SeC2: SECURE MOBILE SOLUTION FOR DISTRIBUTED PUBLIC CLOUD STORAGES . In Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8565-05-1, pages 555-561. DOI: 10.5220/0003903205550561


in Harvard Style

Somorovsky J., Meyer C., Tran T., Sbeiti M., Schwenk J. and Wietfeld C. (2012). SeC2: SECURE MOBILE SOLUTION FOR DISTRIBUTED PUBLIC CLOUD STORAGES . In Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8565-05-1, pages 555-561. DOI: 10.5220/0003903205550561


in Bibtex Style

@conference{closer12,
author={Juraj Somorovsky and Christopher Meyer and Thang Tran and Mohamad Sbeiti and Jörg Schwenk and Christian Wietfeld},
title={SeC2: SECURE MOBILE SOLUTION FOR DISTRIBUTED PUBLIC CLOUD STORAGES},
booktitle={Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2012},
pages={555-561},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003903205550561},
isbn={978-989-8565-05-1},
}


in Bibtex Style

@conference{closer12,
author={Juraj Somorovsky and Christopher Meyer and Thang Tran and Mohamad Sbeiti and Jörg Schwenk and Christian Wietfeld},
title={SeC2: SECURE MOBILE SOLUTION FOR DISTRIBUTED PUBLIC CLOUD STORAGES},
booktitle={Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2012},
pages={555-561},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003903205550561},
isbn={978-989-8565-05-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - SeC2: SECURE MOBILE SOLUTION FOR DISTRIBUTED PUBLIC CLOUD STORAGES
SN - 978-989-8565-05-1
AU - Somorovsky J.
AU - Meyer C.
AU - Tran T.
AU - Sbeiti M.
AU - Schwenk J.
AU - Wietfeld C.
PY - 2012
SP - 555
EP - 561
DO - 10.5220/0003903205550561


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - SeC2: SECURE MOBILE SOLUTION FOR DISTRIBUTED PUBLIC CLOUD STORAGES
SN - 978-989-8565-05-1
AU - Somorovsky J.
AU - Meyer C.
AU - Tran T.
AU - Sbeiti M.
AU - Schwenk J.
AU - Wietfeld C.
PY - 2012
SP - 555
EP - 561
DO - 10.5220/0003903205550561