Security Parameters | Secure cloud storage approach prototype for mobile devices user data Validation | |
| Security parameter Factfile | Output Description |
Automatic File Self-Destruction capabilities | Yes | The developed prototype was successfully able to self-destruct files after viewing and logout |
Data Storage Location | Cloud | The user data was stored in the cloud and no shadow copy was left on the mobile device internal memory |
Encryption Method Employed | AES 256, PBKDF, Salt function | The Prototype Successfully applied AES 256 as the main encryption method and the additional security/encryption steps listed |
Strength of Encryption | Very High | Based on the encryption steps employed, it made the prototype strength of encryption very high. This is because the used encryption methods are proven to be very difficult to crack by attackers. |
Login Authentication required | Yes | The tools requires user login details and successfully authenticates them before login can take place |
Data recovery in the event of mobile device loss | Yes | Data is successfully stored in the cloud and can be accessed using a different device with the correct credentials |
Access control based on data confidentiality level required | Yes | User is required to create a decryption/encryption key which they are prompted to enter when viewing the uploaded content |