Cloud Storage has become a major part of the smartphone industry. Every single smartphone user is using one cloud or the other to store their data to free up space on their smartphones that come with limited storage. Almost all the major smartphone companies are introducing their own cloud service. The users tend to store data on the cloud storage available for their device. It has become difficult for the users to migrate their data from one cloud to another when they change their phone without wasting their time and resources. Currently the users tend to download data from the first cloud to their device, transfer the data to the new device and then upload the data to the second cloud, which is tedious and time consuming. In order to solve this problem, we plan to introduce an easy and time saving method that helps in transferring the data between different cloud storages and build an authentication and session key agreements for mutual trust which is based on algorithm called elliptic curve cryptography without certification for peer-peer cloud servers. This method assists in developing trust between the 2 cloud storages and build a foundation for data migration from different cloud service providers.

1.
C. I. network information center
, “
The 44th china statistical report on internet development
,” http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/ 201908/P020190830356787490958.pdf,
2019
.
2.
B.
Li
,
J.
Li
, and
L.
Liu
, “
Cloudmon: a resource-efficient iaas cloud monitoring system based on networked intrusion detection system virtual appliances
,”
Concurrency and Computation: Practice and Experience
, vol.
27
, no.
8
, pp.
1861
1885
,
2015
.
3.
J.
Cui
,
H.
Zhou
,
H.
Zhong
, and
Y.
Xu
, “
Akser: attribute-based keyword search with efficient revocation in cloud computing
,”
Information Sciences
, vol.
423
, pp.
343
352
,
2018
.
4.
J.
Cui
,
H.
Zhong
,
W.
Luo
, and
J.
Zhang
, “
Area-based mobile multicast group key management scheme for secure mobile cooperative sensing
,”
Science China Information Sciences
, vol.
60
, no.
9
, p.
098104
,
2017
.
5.
J.
Cui
,
H.
Zhou
,
Y.
Xu
, and
H.
Zhong
, “Ooabks: Online/offline attributebased encryption for keyword search in mobile cloud,”
Information Sciences
, vol.
489
, pp.
63
77
,
2019
.
6.
D.
Petcu
, “Portability and interoperability between clouds: challenges and case study,”
in European Conference on a ServiceBased Internet
.
Springer
,
2011
, pp.
62
74
.
7.
T.
Binz
,
F.
Leymann
, and
D.
Schumm
, “
Cmotion: A framework for migration of applications into and between clouds
,”
in 2011 IEEE International Conference on Service-Oriented Computing and Applications (SOCA
). IEEE,
2011
, pp.
1
4
.
8.
M. N.
Shirazi
,
H. C.
Kuan
, and
H.
Dolatabadi
, “
Design patterns to enable data portability between clouds’ databases
,”
in 2012 12th International Conference on Computational Science and Its Applications
. IEEE,
2012
, pp.
117
120
.
9.
X.
Liang
,
Z.
Cao
,
H.
Lin
, and
J.
Shao
, “
Attribute based proxy reencryption with delegating capabilities
,”
in Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
,
2009
, pp.
276
286
.
10.
K.
Liang
,
M. H.
Au
,
J. K.
Liu
,
W.
Susilo
,
D. S.
Wong
,
G.
Yang
,
Y.
Yu
, and
A.
Yang
, “
A secure and efficient ciphertext-policy attribute based proxy re-encryption for cloud data sharing
,”
Future Generation Computer Systems
, vol.
52
, pp.
95
108
,
2015
.
11.
P.
Xu
,
T.
Jiao
,
Q.
Wu
,
W.
Wang
, and
H.
Jin
, “
Conditional identity-based broadcast proxy re-encryption and its application to cloud email
,”
IEEE Transactions on Computers
, vol.
65
, no.
1
, pp.
66
79
,
2015
.
12.
M.
Sun
,
C.
Ge
,
L.
Fang
, and
J.
Wang
, “
A proxy broadcast re-encryption for cloud data sharing
,”
Multimedia Tools and Applications
, vol.
77
, no.
9
, pp.
10
455–10 469,
2018
.
13.
G.
Chunpeng
,
Z.
Liu
,
J.
Xia
, and
F.
Liming
, “
Revocable identity-based broadcast proxy re-encryption for data sharing in clouds
,”
IEEE Transactions on Dependable and Secure Computing
,
2019
.
14.
X.
Liu
,
Y.
Zhang
,
B.
Wang
, and
J.
Yan
, “
Mona: Secure multi-owner data sharing for dynamic groups in the cloud
,”
IEEE transactions on parallel and distributed systems
, vol.
24
, no.
6
, pp.
1182
1191
,
2012
.
15.
J.
Yuan
and
S.
Yu
, “
Efficient public integrity checking for cloud data sharing with multi-user modification
,”
in IEEE INFOCOM 2014-IEEE Conference on Computer Communications
. IEEE,
2014
, pp.
2121
2129
.
16.
M.
Ali
,
R.
Dhamotharan
,
E.
Khan
,
S. U.
Khan
,
A. V.
Vasilakos
,
K.
Li
, and
A. Y.
Zomaya
, “
Sedasc: secure data sharing in clouds
,”
IEEE Systems Journal
, vol.
11
, no.
2
, pp.
395
404
,
2015
.
17.
J.
Li
,
Y.
Zhang
,
X.
Chen
, and
Y.
Xiang
, “
Secure attribute-based data sharing for resource-limited users in cloud computing
,”
Computers Security
, vol.
72
, pp.
1
12
,
2018
.
This content is only available via PDF.
You do not currently have access to this content.