Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


A Study of Ten Popular Android Mobile Cloud Storage Applications

1Asou Aminnezhad, 2Pooya Khanmohamadi Hezaveh, 3Mohsen Khodadadi and 4Amelia Tan
1Faculty of Computer Science and Information Technologi, Universiti Putra Malaysia
2Faculty of Computer Science and Information Technologi, Asia Pacific Universiti
3Faculty of Computer Science and Information Technologi, Universiti Technologi Malaysia
4Department of IT, Pacific Frase Corporation, Technologi Park Malaysia, Malaysia
Research Journal of Applied Sciences, Engineering and Technology  2016  7:533-543
http://dx.doi.org/10.19026/rjaset.13.3013  |  © The Author(s) 2016
Received: March ‎2, ‎2016  |  Accepted: August ‎1, ‎2016  |  Published: October 05, 2016

Abstract

The mobile cloud storage application becomes more ubiquities recently for storing data such as image, audio, text files and etc. The most important issue in this regard is security of these tools and using the best method for encrypting the users’ data for keeping them protected. In this study, we examine ten mobile cloud storage applications namely 4Shared, One Drive, Mega, Surdoc, Cubby, ADrive, Safe Sync, Team Drive, Wuala and Just Cloud. In these applications, we analyze the intercepted communications to determine encryption of the captured text and voice communication to bring out the results to find out the best cloud application that follows the encryption methods mostly. Thus, we use a histogram to analysis the text file and use a Wire shark to check whether a plaintext has been found in the cloud storage application or not, after that we analyze the plain text.

Keywords:

Cloud storage applications, data communication, encryption, mobile interception,


References

  1. Aminnezhad, A., A. Dehghantanha, M.T. Abdullah and M. Damshenas, 2013. Cloud forensics issues and opportunities. Int. J. Inf. Process. Manag., 4(4): 76-85.
  2. Aminnezhad, A., M.T. Abdullah and P.K. Hezave, 2015. An investigation of the secure data communication in medical mobile applications. J. Theor. Appl. Inform. Technol., 73(2): 239-245.
    Direct Link
  3. Azfar, A., K.K.R. Choo and L. Liu, 2014. A study of ten popular android mobile VoIP applications: Are the communications encrypted? Proceeding of the 47th Hawaii International Conference on System Sciences. Waikoloa, HI, pp: 4858-4867.
  4. Boirun, R., 2013. The Importance of File Encryption During Uploading to Cloud Storage. Retrieved from: http://www.drivepop.com/importance-encryption-uploading-transferring-cloud-storage/.
    Direct Link
  5. Elgamal, T. and K.E.B. Hickman, 1998. Secure socket layer application program apparatus and method. Google Patents US 5825890 A.
  6. Freed, M. and E. Gannesan, 2006. Secure sockets layer proxy architecture. Google Patents US 7149892 B2.
  7. James, K., 2014. The Most Secured Cloud Storage Providers. Retrieved from: http://www.bestcloudstorage.net/secured-cloud-storage-providers/.
    Direct Link
  8. McCaffrey, J., 2003. Keep your data secure with the new advanced encryption standard. MSDN Magazine.

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved