Affiliation:
1. National Taichung University of Science and Technology
Abstract
In previous work, we have proposed a service mechanism which automatically syncs the file resources among discrete mobile devices. The mechanism includes four modules. The role-based access control module (RBAC) defined an organization policy which constructs some rules for file resources accessing. The user identification module dispatches a user some specific role (s) with relevant permission (s) and constraint (s) to access organization file resources. The en-capsulation/de-capsulation module enforces the JXTA protocol to sync the file resource synchronization over a mobile peer-to-peer network. The knowledge base module stores various organization file resources in the proposed service mechanism. However, the service mechanism faces an important challenge about data security. How to securely sync organization file resources among discrete mobile devices is worth exploring. In this study, we enforces some cryptographic techniques, including advanced encryption standard (AES), Triple data encryption standards (Triple-DES), and data encryption standards (DES), to examine secure synchronization of organization file resources among discrete mobile devices. The experiment results show the proposed mechanism is secure to automatically sync file resources among discrete mobile devices. The contribution of this work is to solve data security issue in syncing organization file resources among discrete mobile devices. We also strengthen an organization mobility to acquire the file resources by a mobile device in anywhere.
Publisher
Trans Tech Publications, Ltd.
Reference14 articles.
1. C.K. Ke, Z.H. Lin: Secure resource synchronization of mobile peer-to-peer techniques: Experiments on the android platform, In Proceeding of the 8th FTRA International Conference on Multimedia and Ubiquitous Engineering (MUE 2014), Zhangjiajie China, (May 2014) 289-294.
2. C.K. Ke, Z.H. Lin: An optimal mobile device for telecare data collection, In Proceeding of the International Conference on Business, Information, and Cultural Creative Industry (ICBIC 2014), Taipei Taiwan, (August 2014).
3. J. Arnedo-Moreno, J. Herrera-Joancomartí: A Survey on Security in JXTA Applications, Journal of Systems and Software, 82(9) (2009) 1513-1525.
4. F.S. Tsai, W.C. Han, J.W. Xu, H.C. Chua: Design and development of a mobile peer-to-peer social net-working application, Expert Systems with Applications 36(8) (2009) 11077-11087.
5. L. Barolli, F. Xhafa: JXTA-overlay: A p2p platform for distributed, collaborative, and ubiquitous computing, IEEE Transactions on Industrial Electronics, 58(6) (2011) 2163-2172.