此页面上的内容需要较新版本的 Adobe Flash Player。

获取 Adobe Flash Player

Reliable cloud storage system for mobile devices using personal computer

Sanggeun Song, Junghoon Shin, Dong Cheng, Sangjun Lee

 

(Computer Science, Soongsil University, Seoul 156-743, Korea)

 

Abstract:In recent years, the use of mobile devices such as smart phones, tablet PCs, etc. is rapidly increasing. In case of these mobile devices, the storage space is limited due to their characteristics. To make up for the limited space of storage in mobile devices, several methods are being researched. Of these, cloud storage service(CSS), one of cloud computing services, is an efficient solution to compensate such limited storage space. CSS is a service of storing files to the storage and thus getting access to stored files through networks (Internet) at anytime, anywhere. As for the existing CSS, users store their personally important files in the cloud storage, not in their own computers. It may cause security problems such as the leaking of information from private files or the damaging to the information. Thus, we propose a cloud storage system which can solve the security problem of CSS for mobile devices using the personal computer. Our system is deigned to store and manage files through the direct communication between mobile devices and personal computer storages by using the software as a service(SaaS), one of computing services, instead of directly storing files into cloud storages.

 

Key words:cloud computing; storage service; mobile application

 

CLD number: TN929.53 Document code: A

 

Article ID: 1674-8042(2012)03-0255-05  doi: 10.3969/j.issn.1674-8042.2012.03.012

 

References

 

[1] Amazon Simple Storage Service. [2012-01-25]. http://aws.amazon.com/s3/
[2] Microsoft Azure Storage. [2012-01-25] http://www.microsoft.com/windowsazure/storage/
[3] DropBox.[2012-01-27]. http://www.dropbox.com/
[4] Michael A, Armando F, Rean G, et al. Above the Clouds: A Berkeley View of Cloud Computing. Technical Report, University of California at Berkeley. [2012-02-01]. http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html
[5] Mell P, Grance T. The NIST definition of cloud computing. National Institute of Standards and Technology, 2009, 53(6): 50.
[6] Salesforce CRM Service. [2012-02-04]. http://www.salesforce.com/crm/
[7] Google Docs.[2012-02-06]. https://docs.google.com/
[8] Microsoft Office Live. [2012-02-06]. http://www.officelive.com/
[9] IBM Lotus.[2012-02-08]. http://www-01.ibm.com/software/lotus/
[10] Google Apps Engine. [2012-02-08]. http://code.google.com/intl/en/appengine/
[11] Bungee Connect. [2012-02-09]. http://www.bungeeconnect.com/
[12] Amazon Web Services.[2012-02-11]. http://aws.amazon.com/
[13] Amazon Elastic Compute Cloud. [2012-02-12]. http://aws.amazon.com/ec2/
[14] Johnson N F, Jajodia S. Steganography: Seeing the Unseen. Computer, 1998, 31(2): 26-34.
[15] Johnson N F, Jajodia S. Steganalysis of images created using current steganography software. Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1998, 1525: 273-289.
[16] Andersen R J, Petitcolas F A P. On the limits of steganography. IEEE Journal of Selected Areas in Commnunications, 1998, 16(4 ): 474-481.

 

 

[full text view]