Вестник Дагестанского государственного технического университета: Технические науки (Aug 2022)

An algorithm for using a cross-platform mobile application to protect information in cloud storage

  • A. R. Gazizov

DOI
https://doi.org/10.21822/2073-6185-2022-49-2-33-45
Journal volume & issue
Vol. 49, no. 2
pp. 33 – 45

Abstract

Read online

Objective. A high-quality "cloud storage" of data should ensure the confidentiality, integrity and availability of information in the "storage". The use of "cloud storage" for storing information in backups is associated with their possible loss. Ensuring the confidentiality of information in the "cloud storage" implies that by "uploading" data to the "cloud storage", the user must be sure that an attacker will not be able to obtain information from the storage. The aim of the study is to develop an algorithm for using a cross-platform mobile application to protect information in the "cloud storage" of IS.Method. The study is based on the use of a cross-platform approach to creating applications.Result. The analysis of existing approaches and frameworks for the development of crossplatform mobile applications was carried out. It is proposed to create an application based on the Xamarin framework. To ensure the confidentiality of information, it is proposed to encrypt them before uploading data and backup copies of files. Encryption involves hiding the original type of the file from unauthorized use using crypto-algorithms, when the owner of the encryption key is the authorized user. To implement the function of encrypting data and backup copies of files uploaded to the "cloud storage", it is proposed to use the Rijndael symmetric block encryption algorithm, adopted as an encryption standard according to the results of the Advanced Encryption Standard (USA) competition.Conclusion. A cross-platform mobile application can be compiled and run efficiently under iOS and Android operating systems, encrypt files and upload them to the "cloud storage" with the possibility of subsequent decryption.

Keywords