Skip to main content

Scalable and Autonomous Mobile Device-Centric Cloud for Secured D2D Sharing

  • Conference paper
  • First Online:
Information Security Applications (WISA 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8909))

Included in the following conference series:

Abstract

This study proposes a highly scalable, autonomous, and easy to implement mobile device-centric cloud (MDCC) model for secure device-to-device (D2D) sharing and user-centric services. Users of a certain sociological relation are connected via mobile devices and based on short secret sharing the mobile devices initiate an autonomous and tiny mobile data center with an elected broker. The broker administrates physical network attachments, resource associations, and multimedia service brokering such that quantitative security service level agreements (SLA) in addition to streaming quality SLAs are configured. Content owners or producers in the MDCC immediately share digital contents without uploading to a specific cloud server. Two examples are implemented. The first is video broadcasting and the second is service coverage extension of a DLNA LAN by associating the DLNA gateway with MDCC to securely publish contents outward over the Internet and to get contents from outside the LAN. Both examples show that secure D2D sharing are achieved with high scalability and autonomy while anxiety of security issues of traditional big data centers is relieved.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kandukuri, B.R., Paturi, R. V, and Rakshit, A.: Cloud security issues. In: IEEE International Conference on Services Computing (2009)

    Google Scholar 

  2. Jensen, M., Schwenk, J., Gruschka, N., and Iacono, L.L.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing (2009)

    Google Scholar 

  3. Brodkin, J.: Gartner: seven cloud-computing security risks. http://www.networkworld.com/news/2008/070208-cloud.html

  4. Huang, Y.-T.: An SLA-aware data dispersion method for short-secret-sharing cloud storage system. Thesis of Master Degree, Computer Science and Information Engineering, National Cheng-Kung University Taiwan (2013)

    Google Scholar 

  5. Guillen, J., Miranda, J., et al.: People as a service: a mobile-centric model for providing collective sociological profiles. IEEE Softw. 31, 48–53 (2014)

    Article  Google Scholar 

  6. Mahadev, S., Paramvir, B., et al.: The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput. 8, 14–23 (2009)

    Google Scholar 

  7. Mahadev, S.: Mobile computing: the next decade. In: 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond, pp. 1–6, ISBN: 978-1-4503-0155-8, New York (2010)

    Google Scholar 

  8. Mikko, R., Tommi, M., et al.: Mobile content as a service a blueprint for a vendor-neutral cloud of mobile devices. IEEE Softw. 29, 28–32 (2012)

    Google Scholar 

  9. Raj, M., Di Francesco, M., Das, S.K.: Secure Mobile Cloud Computing. In: Das, S., Kant, K., Zhang, N. (eds.) Handbook on Securing Cyber-Physical Critical Infrastructure, pp. 411–429. Elsevier, Waltham (2012)

    Chapter  Google Scholar 

  10. Oracle, VirtualBox Documentation. http://www.oracle.com/technetwork/server-storage/virtualbox/documentation/index.html

  11. Xen Project, Xen Cloud Platform. http://www.xen.org/products/cloudxen.html

  12. Qing, L., Clark, G.: Mobile security: a look ahead. IEEE Secur. Priv. 11, 78–81 (2013)

    Google Scholar 

  13. Su, W.-T., Chang, K.-M., Kuo, Y.-H.: eHIP: an energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks. Comput. Netw. 51(4), 1151–1168 (2007)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chao-Lieh Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Chen, CL., Chen, SC., Chang, CR., Lin, CF. (2015). Scalable and Autonomous Mobile Device-Centric Cloud for Secured D2D Sharing. In: Rhee, KH., Yi, J. (eds) Information Security Applications. WISA 2014. Lecture Notes in Computer Science(), vol 8909. Springer, Cham. https://doi.org/10.1007/978-3-319-15087-1_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15087-1_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15086-4

  • Online ISBN: 978-3-319-15087-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics