Data Storage Operations Protection in Mobile Cloud Computing

R. Jahnavi*
Department of Computer Science and Engineering, St. Peter's Engineering College, Hyderabad, Telangana, India.
Periodicity:July - December'2023
DOI : https://doi.org/10.26634/jcc.10.2.20418

Abstract

Cloud computing is revolutionizing Customer Internet computing and the IT industry by integrating with mobile environments through remote access technologies. This growth involves using smartphones and sensors as data collection nodes interacting with the cloud. However, widespread adoption faces a hurdle in data security concerns, as users are hesitant about entrusting sensitive data to public clouds operated by external providers. To tackle barriers in cloud computing, we urgently require innovative and secure management architectures. This paper introduces a comprehensive framework addressing user concerns, focusing on secure data sharing in the cloud. The framework covers aspects like transport, aggregation, usage, and destruction of sensitive data, emphasizing the semi-trusted nature of the cloud to boost user confidence and address security concerns. One key aspect of the proposed framework is the integration of the Kerberos protocol over the network. This protocol plays a pivotal role in establishing secure and authenticated communication channels, ensuring the confidentiality and integrity of the data being transferred within the cloud infrastructure. Additionally, the paper introduces a user process protection method based on a virtual machine monitor. This method contributes to enhancing overall system security by providing a layer of isolation and protection for user processes operating in the cloud environment. The combined integration of the Kerberos protocol and the virtual machine monitor-based user process protection method forms a cohesive approach towards realizing robust system functionalities. By offering a secure foundation for data management in the cloud, this framework addresses the current limitations and instills a sense of trust among users, fostering a more widespread and confident adoption of cloud computing techniques.

Keywords

Cloud Environment, Privacy, Mobile Cloud, Data Security, Sensitive Data, Mobile Applications, Cloud Service Providers, Data Integrity, Secure Data Access, Cloud-Based Storage Solutions.

How to Cite this Article?

Jahnavi, R. (2023). Data Storage Operations Protection in Mobile Cloud Computing. i-manager's Journal on Cloud Computing, 10(2), 43-54. https://doi.org/10.26634/jcc.10.2.20418

References

[8]. Malik, A., & Nazir, M. M. (2012). Security framework for cloud computing environment: A review. Journal of Emerging Trends in Computing and Information Sciences, 3(3), 390-394.
[11]. Zhou, Z., & Huang, D. (2012, October). Efficient and secure data storage operations for mobile cloud computing. In 2012 8th International Conference on Network and Service Management (Cnsm) and 2012 Workshop on Systems Virtualiztion Management (SVM) (pp. 37-45). IEEE.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.