Affiliation:
1. Guangdong Institute of Science and Technology
2. South China University of Technology
Abstract
The mobile storages especially in mobile devices hold a lot of important and private data. The portability and mobility may lead to loss and theft, therefore security problem of mobile storages and mobile data may suffer from troublesome and damage. TCG provides TPM for trust and security management. It is insufficient with mobile storage devices because mobile storage devices are often separated and load with heterogeneity and massive data. The paper analyzes the security management of mobile storages, proposed practical mobile storage and data security management methods and mechanisms, and illustrates mobile storages integration schemes for single storage device and multiple storages devices and cloud storage. The overall mobile storage and data security policies and methods should be performed urgently.
Publisher
Trans Tech Publications, Ltd.
Reference9 articles.
1. NTT DoCoMo, IBM, Intel Corporation. Trusted Mobile Platform Hardware Architecture Description. http: /xml. coverpages. org/TMP-HWADv10. pdf, June 23, (2004).
2. Courtes, L.; Killijian, M. -O.; Powell, D.; Storage Tradeoffs in a Collaborative Backup Service for Mobile Devices. Dependable Computing Conference. EDCC '06. Sixth European, Oct. 2006, Page(s): 129 – 138.
3. http: /www. snia. org/images/tutorial_docs/Security/MichaelWillett_Trusted_Storage_Specifi cation. pdf.
4. http: /www. acsac. org/2006/case/wed-1030-anderson. pdf.
5. Tolvanen, J.; Suihko, T.; Lipasti, J.; Asokan, N.; Remote Storage for Mobile Devices. Communication System Software and Middleware, 2006. Comsware 2006. First International Conference on. 08-12 Jan. 2006, Page(s): 1 – 9.