|Table of Contents|

[1] Liu XiaoJiang Rui,. Security analysis and improvement on resilient storageoutsourcing schemes in mobile cloud computing [J]. Journal of Southeast University (English Edition), 2012, 28 (4): 392-397. [doi:10.3969/j.issn.1003-7985.2012.04.004]

Security analysis and improvement on resilient storageoutsourcing schemes in mobile cloud computing()

Journal of Southeast University (English Edition)[ISSN:1003-7985/CN:32-1325/N]

2012 4
Research Field:
Computer Science and Engineering
Publishing date:


Security analysis and improvement on resilient storageoutsourcing schemes in mobile cloud computing
Liu XiaoJiang Rui
School of Information Science and Engineering, Southeast University, Nanjing 210096, China
mobile cloud computing cloud storage security protocols
The resilient storage outsourcing schemes in mobile cloud computing are analyzed. It is pointed out that the sharing-based scheme(ShS)has vulnerabilities regarding confidentiality and integrity; meanwhile, the coding-based scheme(CoS)and the encryption-based scheme(EnS)have vulnerabilities on integrity. The corresponding attacks on these vulnerabilities are given. Then, the improved protocols such as the secure sharing-based protocol(SShP), the secure coding-based protocol(SCoP)and the secure encryption-based protocol(SEnP), are proposed to overcome these vulnerabilities. The core elements are protected through public key encryptions and digital signatures. Security analyses show that the confidentiality and the integrity of the improved protocols are guaranteed. Meanwhile, the improved protocols can keep the frame of the former schemes and have higher security. The simulation results illustrate that compared with the existing protocols, the communication overhead of the improved protocols is not significantly increased.


[1] Park Ji Soo, Yi Ki Jung, Park Jong Hyuk. SSP-MCloud: a study on security service protocol for smartphone centric mobile cloud computing [C]//Lecture Notes in Electrical Engineering. Springer, 2012, 107:165-172.
[2] Feng Jun, Chen Yu, Summerville D, et al. Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol[C]//2011 IEEE Consumer Communications and Networking Conference. New York, USA, 2011:521-522.
[3] Bermbach D. Meta storage: a federated cloud storage system to manage consistency-latency tradeoffs [C]//2011 IEEE 4th International Conference on Cloud Computing. Washington DC, USA, 2011:452-459.
[4] Zhang Xinwen, Joshua Schiffman, Simon Gibbs, et al. Securing elastic applications on mobile devices for cloud computing [C]//Proceedings of the 2009 ACM Workshop on Cloud Computing Security. New York, USA, 2009:127-134.
[5] Park Ki-Woong, Han Jaesun, Chung Jae Woong, et al. THEMIS: towards mutually verifiable billing transactions in the cloud computing environment[C]//2010 IEEE 3rd International Conference on Cloud Computing. Miami, USA, 2010:139-147.
[6] Hsueh Sue-Chen, Lin Jing-Yan, Lin Ming-Yen. Secure cloud storage for convenient data archive of smart phones [C]//2011 IEEE 15th International Symposium on Consumer Electronics. Singapore, 2011: 251-258.
[7] Ruiz-Alvarez A, Humphrey M. An automated approach to cloud storage service selection [C]//Proceedings of the 2nd International Workshop on Scientific Cloud Computing. New York, USA, 2011: 39-48.
[8] Feng Jun, Chen Yu, Ku Wei-Shinn, et al. Analysis of integrity vulnerabilities and a non-repudiation protocol for cloud data storage platforms [C]//2010 39th International Conference on Parallel Processing Workshops. San Diego, USA, 2010: 251-258.
[9] Ren Wei, Yu Linchen, Gao Ren, et al. Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing [J]. Tsingha Science and Technology, 2011, 16(5): 520-528.


Biographies: Liu Xiao(1989—), male, graduate; Jiang Rui(corresponding author), male, doctor, associate professor, R.Jiang@seu.edu.cn.
Foundation items: The National Natural Science Foundation of China(No.60902008), the Key Laboratory Hi-Tech Program of Changzhou City(No.CM20103003), the Key Laboratory Program of Information Network Security of Ministry of Public Security(No.C12602), the Science and Technology Supporting Project of Changzhou City(No.CE20120030).
Citation: Liu Xiao, Jiang Rui. Security analysis and improvement on resilient storage outsourcing schemes in mobile cloud computing.[J]. Journal of Southeast University(English Edition), 2012, 28(4):392-397.[doi:10.3969/j.issn.1003-7985.2012.04.004]
Last Update: 2012-12-20