Research Article | OPEN ACCESS
A Study of Ten Popular Android Mobile Cloud Storage Applications
1Asou Aminnezhad, 2Pooya Khanmohamadi Hezaveh, 3Mohsen Khodadadi and 4Amelia Tan
1Faculty of Computer Science and Information Technologi, Universiti Putra Malaysia
2Faculty of Computer Science and Information Technologi, Asia Pacific Universiti
3Faculty of Computer Science and Information Technologi, Universiti Technologi Malaysia
4Department of IT, Pacific Frase Corporation, Technologi Park Malaysia, Malaysia
Research Journal of Applied Sciences, Engineering and Technology 2016 7:533-543
Received: March ‎2, ‎2016 | Accepted: August ‎1, ‎2016 | Published: October 05, 2016
Abstract
The mobile cloud storage application becomes more ubiquities recently for storing data such as image, audio, text files and etc. The most important issue in this regard is security of these tools and using the best method for encrypting the users’ data for keeping them protected. In this study, we examine ten mobile cloud storage applications namely 4Shared, One Drive, Mega, Surdoc, Cubby, ADrive, Safe Sync, Team Drive, Wuala and Just Cloud. In these applications, we analyze the intercepted communications to determine encryption of the captured text and voice communication to bring out the results to find out the best cloud application that follows the encryption methods mostly. Thus, we use a histogram to analysis the text file and use a Wire shark to check whether a plaintext has been found in the cloud storage application or not, after that we analyze the plain text.
Keywords:
Cloud storage applications, data communication, encryption, mobile interception,
References
-
Aminnezhad, A., A. Dehghantanha, M.T. Abdullah and M. Damshenas, 2013. Cloud forensics issues and opportunities. Int. J. Inf. Process. Manag., 4(4): 76-85.
-
Aminnezhad, A., M.T. Abdullah and P.K. Hezave, 2015. An investigation of the secure data communication in medical mobile applications. J. Theor. Appl. Inform. Technol., 73(2): 239-245.
Direct Link
-
Azfar, A., K.K.R. Choo and L. Liu, 2014. A study of ten popular android mobile VoIP applications: Are the communications encrypted? Proceeding of the 47th Hawaii International Conference on System Sciences. Waikoloa, HI, pp: 4858-4867.
-
Boirun, R., 2013. The Importance of File Encryption During Uploading to Cloud Storage. Retrieved from: http://www.drivepop.com/importance-encryption-uploading-transferring-cloud-storage/.
Direct Link
-
Elgamal, T. and K.E.B. Hickman, 1998. Secure socket layer application program apparatus and method. Google Patents US 5825890 A.
-
Freed, M. and E. Gannesan, 2006. Secure sockets layer proxy architecture. Google Patents US 7149892 B2.
-
James, K., 2014. The Most Secured Cloud Storage Providers. Retrieved from: http://www.bestcloudstorage.net/secured-cloud-storage-providers/.
Direct Link
-
McCaffrey, J., 2003. Keep your data secure with the new advanced encryption standard. MSDN Magazine.
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|