Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2513534.2513538acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnordicloudConference Proceedingsconference-collections
research-article

Secure cloud storage for remote mobile data collection

Published: 02 September 2013 Publication History

Abstract

Secure cloud storage is a hot topic nowadays. However, most solutions are user-centric, i.e., they focus on private data owned by a single individual. In the case of Remote Mobile Data Collection, we have many collectors continuously uploading data to a central cloud storage on one hand, and several data analysts or decision makers that require this data in real time on the other. In this paper we investigate the challenges related to this model and discuss possible solutions.

References

[1]
Android. http://www.android.com/. Online, Accessed March 2013.
[2]
Moritz Borgmann, Tobias Hahn, Michael Herfert, Thomas Kunz, Marcel Richter, Ursula Viebeg, and Sven Vowe. On the security of cloud storage services. Technical report, Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany, 2012.
[3]
Waylon Brunette, Mitchell Sundt, Nicola Dell, Rohit Chaudhri, Nathan Breit, and Gaetano Borriello. Open data kit 2.0: expanding and refining information services for developing regions. In Sharad Agarwal and Alexander Varshavsky, editors, HotMobile - 14th Workshop on Mobile Computing Systems and Applications, page 10. ACM, 2013.
[4]
Amazon Elastic Compute Cloud. http://aws.amazon.com/ec2/. Online, Accessed March 2013.
[5]
Google App Engine. https://developers.google.com/appengine/. Online, Accessed March 2013.
[6]
Episurveyor. http://www.episurveyor.org/. Online, Accessed March 2013.
[7]
Request for Comments RFC5054. http://tools.ietf.org/html/rfc5054. Online, Accessed March 2013.
[8]
Samson Gejibo, Federico Mancini, Khalid A. Mughal, Remi Valvik, and Jørn Klungsøyr. Secure data storage for mobile data collection systems. In Janusz Kacprzyk, Dominique Laurent, and Richard Chbeir, editors, MEDES'12 - International Conference on Management of Emergent Digital EcoSystems, pages 131--144. ACM, 2012.
[9]
D. Grolimund, L. Meisser, S. Schmid, and R. Wattenhofer. Cryptree: A folder tree structure for cryptographic file systems. In Reliable Distributed Systems, 2006. SRDS '06. 25th IEEE Symposium on, pages 189--198, 2006.
[10]
J. Klungsøyr, T. Tylleskar, B. MacLeod, P. Bagyenda, W. Chen, and P. Wakholi. OMEVAC - open mobile electronic vaccine trials, an interdisciplinary project to improve quality of vaccine trials in low resource settings. In Proceedings of M4D '08 - The 1st International Conference on Mobile Communication Technology for Development, pages 36--44. Karlstad University Studies, 2008.
[11]
F. Mancini, K. A. Mughal, S. H. Gejibo, and J. Klungsoyr. Adding security to mobile data collection. In Healthcom 2011 - 13th IEEE International Conference on e-Health Networking Applications and Services, pages 86--89, june 2011.
[12]
Federico Mancini, Samson Gejibo, Khalid A. Mughal, Remi Valvik, and Jørn Klungsøyr. Secure mobile data collection systems for low-budget settings. In ARES 2011 - The Seventh International Conference on Availability, Reliability, pages 196--205. IEEE Computer Society, 2012.
[13]
MEGA. https://mega.co.nz. Online, Accessed March 2013.
[14]
Mobenzi Researcher. http://www.mobenzi.com/researcher/. Online, Accessed November 2013.
[15]
nCrypted. https://www.ncryptedcloud.com/. Online, Accessed March 2013.
[16]
ODK. http://opendatakit.org/about/deployments/. Online, Accessed March 2013.
[17]
ODK. http://opendatakit.org/help/help-for-hire/. Online, Accessed March 2013.
[18]
openXdata. http://www.openxdata.org. Online, Accessed March 2013.
[19]
Oracle. Java ME reference. http://www.oracle.com/technetwork/java/javame/index.html. Online, Accessed March 2013.
[20]
S. B. Roosa and S. Schultze. The "Certificate Authority" Trust Model for SSL: A Defective Foundation for Encrypted Web Traffic and a Legal Quagmire. Intellectual Property & Technology Law Journal, 22(11):3--7, 2010.
[21]
Adi Shamir. How to share a secret. Commun. ACM, 22(11):612--613, 1979.
[22]
The CA/Browser Forum. Baseline requirements for the issuance and management of publicly-trusted certificates, v.1.0, 2011.
[23]
Vital Wave Consulting. mHealth for Development: The Opportunity of Mobile Technology for Healthcare in the Developing World. Washington, D.C. and Berkshire, UK: UN Foundation-Vodafone Foundation Partnership, February 2009.

Cited By

View all
  • (2020)Data Collection in Sensor-Cloud: A Systematic Literature ReviewIEEE Access10.1109/ACCESS.2020.30295978(184664-184687)Online publication date: 2020
  • (2016)Computer Security for Data Collection TechnologiesProceedings of the Eighth International Conference on Information and Communication Technologies and Development10.1145/2909609.2909660(1-11)Online publication date: 3-Jun-2016
  • (2015)Mobile Data Collection: A Security PerspectiveMobile Health10.1007/978-3-319-12817-7_42(1015-1042)Online publication date: 2015

Recommendations

Reviews

Mariam Kiran

Securing the cloud is currently a major research issue. From banks and businesses to medical facilities, many organizations are thinking of moving to the cloud, but are hindered by the security concerns related to putting their files in cloud storage. This well-written paper discusses a remote mobile data collection application that attempts to solve these issues for mobile health (mhealth) applications. The authors describe the processes involved, with extensive background details and information on technologies already available. The figure for the proposed solution is particularly interesting, describing nearly all of the authentication processes for key acquisition and showing how data is transferred from one user to another. The transfer of keys presents some complex challenges, and the authors do not explain very well how this approach securely prevents unauthorized access. The paper goes on to discuss other issues such as the availability, integration, and usability of these applications, but as I understand these issues do not play a role in this topic. I would, however, like to read about them in future works. The paper lacks any discussion of the kind of threats one might face when using mhealth architectures and the business objective of actually migrating to one. Also, the authors do not discuss practical implementations of the application, as it seems to be in a planning phase. This too would be interesting to see in the future. All in all, I found this to be a good starting point for researchers currently investigating mhealth issues. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
NordiCloud '13: Proceedings of the Second Nordic Symposium on Cloud Computing & Internet Technologies
September 2013
88 pages
ISBN:9781450323079
DOI:10.1145/2513534
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 September 2013

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

NordiCloud '13

Acceptance Rates

NordiCloud '13 Paper Acceptance Rate 9 of 15 submissions, 60%;
Overall Acceptance Rate 9 of 15 submissions, 60%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Data Collection in Sensor-Cloud: A Systematic Literature ReviewIEEE Access10.1109/ACCESS.2020.30295978(184664-184687)Online publication date: 2020
  • (2016)Computer Security for Data Collection TechnologiesProceedings of the Eighth International Conference on Information and Communication Technologies and Development10.1145/2909609.2909660(1-11)Online publication date: 3-Jun-2016
  • (2015)Mobile Data Collection: A Security PerspectiveMobile Health10.1007/978-3-319-12817-7_42(1015-1042)Online publication date: 2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media