Share Email Print
cover

Proceedings Paper

A protect solution for data security in mobile cloud storage
Author(s): Xiaojun Yu; Qiaoyan Wen
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

It is popular to access the cloud storage by mobile devices. However, this application suffer data security risk, especial the data leakage and privacy violate problem. This risk exists not only in cloud storage system, but also in mobile client platform. To reduce the security risk, this paper proposed a new security solution. It makes full use of the searchable encryption and trusted computing technology. Given the performance limit of the mobile devices, it proposes the trusted proxy based protection architecture. The design basic idea, deploy model and key flows are detailed. The analysis from the security and performance shows the advantage.

Paper Details

Date Published: 13 March 2013
PDF: 6 pages
Proc. SPIE 8784, Fifth International Conference on Machine Vision (ICMV 2012): Algorithms, Pattern Recognition, and Basic Technologies, 87841F (13 March 2013); doi: 10.1117/12.2014030
Show Author Affiliations
Xiaojun Yu, Beijing Univ. of Posts and Telecommunications (China)
Qiaoyan Wen, Beijing Univ. of Posts and Telecommunications (China)


Published in SPIE Proceedings Vol. 8784:
Fifth International Conference on Machine Vision (ICMV 2012): Algorithms, Pattern Recognition, and Basic Technologies
Yulin Wang; Liansheng Tan; Jianhong Zhou, Editor(s)

© SPIE. Terms of Use
Back to Top
PREMIUM CONTENT
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?
close_icon_gray