Abstract
The low computing power of mobile devices impedes the development of mobile applications with a heavy computing load. Mobile Cloud Computing (MCC) has emerged as the solution to this by connecting mobile devices with the “infinite” computing power of the Cloud. As mobile devices typically communicate over untrusted networks, it becomes necessary to secure the communications to avoid privacy-sensitive data breaches. This paper presents work on implementing MCC applications with secure communications. For that purpose, we built on COMPSs-Mobile, a redesigned implementation of the COMP Superscalar (COMPSs) framework aiming to MCC platorms. COMPSs-Mobile automatically exploits the parallelism inherent in an application and orchestrates its execution on loosely-coupled distributed environment. To avoid a vendor lock-in, this extension leverages on the Generic Security Services Application Program Interface (GSSAPI) (RFC2743) as a generic way to access security services to provide communications with authentication, secrecy and integrity. Besides, GSSAPI allows applications to take profit of more advanced features, such as Federated Identity or Single Sign-On, which the underlying security framework could provide. To validate the practicality of the proposal, we use Kerberos as the security services provider to implement SSO; however, applications do not authenticate themselves and require users to obtain and place the credentials beforehand. To evaluate the performance, we conducted some tests running an application on a smartphone offloading tasks to a private cloud. Our results show that the overhead of securing the communications is acceptable.
Similar content being viewed by others
References
Heterogeneous Secure Multi-level Remote Acceleration Service for Low-Power Integrated Systems and Devices (RAPID). http://rapid-project.eu/
Java Programming Assistant (javassist). http://www.javassist.org
MIT Kerberos Consortium. http://www.kerberos.org/software/index.html
OASIS Web services business process execution language. http://www.oasis-open.org/committees/wsbpel/
Cloud Security Alliance: The treacherous 12 cloud computing top threats in 2016. Security, 1–34. http://www.cloudsecurityalliance.org/topthreats.%5Cn, http://www.cloudsecurityalliance.org (2016)
Globus Toolkit. http://toolkit.globus.org/toolkit/ (2017)
Allen, G., et al.: The grid application toolkit: toward generic and easy application programming interfaces for the grid. Proc. IEEE 93(3), 534–550 (2005)
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D. A., Rabkin, A., Stoica, I., et al.: Above the clouds: a Berkeley view of cloud computing. University of California, Berkeley, Tech. Rep. UCB 7–13 (2009). https://doi.org/10.1145/1721654.1721672. ISBN:UCB/EECS-2009-28
Astalos, J., Cecchini, R., Coghlan, B., Cowles, R., Epting, U., Genovese, T., Gomes, J., Groep, D., Gug, M., Hanushevsky, A., Helm, M., Jensen, J., Kanellopoulos , C., Kelsey, D., Marco, R., Neilson, I., Nicoud, S., O’Callaghan, D., Quesnel, D., Schaeffner, I., Shamardin, L., Skow, D., Sova, M., Wäänänen, A., Wolniewicz, P., Xing, W.: International grid CA interworking, peer review and policy management through the European DataGrid Certification Authority Coordination Group. Lect. Notes Comput. Sci. 3470, 285–295 (2005). http://www.scopus.com/inward/record.url?eid=?2-s2.0-24944434771&partnerID=tZOtx3y1. ISBN:3-540-26918-5
Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Futur. Gener. Comput. Syst. 25(6), 599–616 (2009). ISBN: 3-540-26918-5
Chen, H., Zhu, X., Qiu, D., Liu, L., Du, Z.: Scheduling for workflows with security-sensitive intermediate data by selective tasks duplication in clouds. IEEE Trans. Parallel Distrib. Syst. 28(9), 2674–2688 (2017). https://doi.org/10.1109/TPDS.2017.2678507. ISSN:1045-9219
Chun, B. G., Ihm, S., Maniatis, P., Naik, M., Patti, A.: Clonecloud: elastic execution between mobile device and cloud. In: Proceedings of the Sixth Conference on Computer Systems, EuroSys ’11 pp 301–314. ACM, New York, NY, USA (2011). https://doi.org/10.1145/1966445.1966473
Chun, B. G., Maniatis, P.: Augmented smartphone applications through clone cloud execution. In: Proceedings of the 12th Conference on Hot Topics in Operating Systems, HotOS’09, pp 8–8. USENIX Association, Berkeley, CA, USA (2009). http://dl.acm.org/citation.cfm?id=?1855568.1855576
Cuervo, E., Balasubramanian, A., Cho, D.K., Wolman, A., Saroiu, S., Chandra, R., Bahl, P.: Maui: making smartphones last longer with code offload. In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services, Mobisys ’10, pp 49–62. ACM, New York, NY, USA (2010). https://doi.org/10.1145/1814433.1814441
Dean, J., Ghemawat, S.: Mapreduce: simplified data processing on large clusters. In: Proceedings of the 6th Conference on Symposium on Opearting Systems Design and Implementation - vol. 6, OSDI’04, pp 10–10. USENIX Association, Berkeley, CA, USA (2004). http://dl.acm.org/citation.cfm?id=?1251254.1251264
Dhinesh Babu, L. D., Venkata Krishna, P.: Honey bee behavior inspired load balancing of tasks in cloud computing environments. Applied Soft Computing Journal 13(5), 2292–2303 (2013). https://doi.org/10.1016/j.asoc.2013.01.025
Fernando, N., Loke, S. W., Rahayu, W.: Mobile cloud computing: a survey. Futur. Gener. Comput. Syst. 29(1), 84–106 (2013)
Galante, G., Erpen De Bona, L. C., Mury, A. R., Schulze, B., da Rosa Righi, R.: An analysis of public clouds elasticity in the execution of scientific applications: a survey. Journal of Grid Computing 14(2), 193–216 (2016). https://doi.org/10.1007/s10723-016-9361-3
Gupta, M. K.: Akka Essentials. Packt publishing (2012)
Hardt, M., Kannelopoulos, C.E.: Djra1.2 blueprint architectures. https://aarc-project.eu/documents/deliverables/ (2017)
Howlett, J., Hartman, S., Tschofenig, H., Schaad, J.: Application bridging for federated access beyond web (ABFAB) architecture, no. 7831. RFC Editor. ISSN:2070-1721 (2016)
Humphrey, M., Thompson, M.: Security implications of typical grid computing usage scenarios. https://www.ogf.org/documents/GFD.12.pdf (2000)
Isard, M., Budiu, M., Yu, Y., Birrell, A., Fetterly, D.: Dryad: distributed data-parallel programs from sequential building blocks. SIGOPS Oper. Syst. Rev. 41(3), 59–72 (2007). https://doi.org/10.1145/1272998.1273005
Kemp, R., Palmer, N., Kielmann, T., Bal, H.: Cuckoo: a computation offloading framework for smartphones. In: Gris M., Yang G. (eds) MobiCASE. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 76. Springer, pp 59–79. ISBN:978-3-642-29335-1. http://dblp.uni-trier.de/db/conf/mobicase/mobicase2010.html#KempPKB10 (2010)
Khan, A. N., Kiah, M. M., Khan, S. U., Madani, S. A.: Towards secure mobile cloud computing: a survey. Futur. Gener. Comput. Syst. 29(5), 1278–1299 (2013)
Kosta, S., Aucinas, A., Hui, P., Mortier, R., Zhang, X.: Unleashing the power of mobile cloud computing using thinkair. (2011). arXiv:1105.3232. http://dblp.uni-trier.de/db/journals/corr/corr1105.html#abs-1105-3232
Kosta, S., Aucinas, A., Hui, P., Mortier, R., Zhang, X.: Thinkair: dynamic resource allocation and parallel execution in the cloud for mobile code offloading. In: INFOCOM, 2012 Proceedings IEEE, pp 945–953. IEEE (2012)
Lineback, R.: Cellphone ic sales will top total personal computing in 2017. http://www.icinsights.com/data/articles/documents/987.pdf
Linn, J.: Generic security service application programming interface, version 2, update 1, no. 2743. RFC Editor. ISSN:2070-1721 (2000)
Lordan, F., Badia, R.M.: COMPSS-Mobile: parallel programming for mobile cloud computing. Journal of Grid Computing, (2017). https://doi.org/10.1007/s10723-017-9409-z. (to appear)
Lordan, F., Tejedor, E., Ejarque, J., Rafanell, R., Álvarez, J., Marozzo, F., Lezzi, D., Sirvent, R., Talia, D., Badia, R. M.: Servicess: an interoperable programming framework for the cloud. Journal of Grid Computing 12(1), 67–91 (2014). https://doi.org/10.1007/s10723-013-9272-5
Missier, P., Soiland-Reyes, S., Owen, S., Tan, W., Nenadic, A., Dunlop, I., Williams, A., Oinn, T., Goble, C.: Taverna, reloaded. In: Gertz, M., Hey, T., Ludaescher, B. (eds.) SSDBM 2010. Heidelberg, Germany (2010). http://www.taverna.org.uk/pages/wp-content/uploads/2010/04/T2Architecture.pdf
Montesi, F., Guidi, C., Lucchi, R., Zavattaro, G.: Jolie: a java orchestration language interpreter engine. Electron. Notes Theor. Comput. Sci. 181, 19–33 (2007)
Pashalidis, A., Mitchell, C.: A taxonomy of single sign-on systems. In: Information Security and Privacy, pp 219–219. Springer (2003)
Rescorla, E.: HTTP Over TLS. RFC 2818 (Informational). http://www.ietf.org/rfc/rfc2818.txt. Updated by RFCs 5785, 7230 (2000)
Rivest, R. L., Adleman, L., Dertouzos, M. L.: On data banks and privacy homomorphisms. Foundations of secure computation 4(11), 169–180 (1978)
Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N.: The case for vm-based cloudlets in mobile computing. IEEE Pervasive Comput. 8(4), 14–23 (2009). https://doi.org/10.1109/MPRV.2009.82
Singh, S., Chana, I.: A survey on resource scheduling in cloud computing: issues and challenges (2016). https://doi.org/10.1007/s10723-015-9359-2
Solagna, P., Kannelopoulos, C., Liampotis, N., Hardt, M., Sallé, M., Paetow, S., Malavolti, M., Van Dijk, N., Jensen, J., Liabotis, I., Jankowski, M., Memon, S., Prochazka, M., Oshrin, B., Monticini, B., Short, H., Stevanovich, U.: Existing AAI and available technologies for federated access AARC project. https://aarc-project.eu/wp-content/uploads/2016/01/MJRA1.1-Existing-AAI-and-available-technologies.pdf (2015)
Tilevich, E., Smaragdakis, Y.: J-orchestra: Automatic java application partitioning. Ecoop 178–204 (2002). https://doi.org/10.1145/1555392.1555394. http://link.springer.com/chapter/10.1007/3-540-47993-7_8%5Cn, http://dl.acm.org/citation.cfm?id=680022
Tuecke, S., Welch, V., Engert, D., Pearlman, L., Thompson, M.: Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile RFC 3820 (Proposed Standard). http://www.ietf.org/rfc/rfc3820.txt (2004)
Vecchiola, C., Chu, X., Buyya, R.: Aneka: a software platform for.net-based cloud computing. (2009) arXiv:0907.4622
Virding, R., Wikström, C., Williams, M.: Concurrent Programming in ERLANG, 2nd edn. Prentice Hall International (UK) Ltd., Hertfordshire, UK (1996)
Wilde, M., Hategan, M., Wozniak, J. M., Clifford, B., Katz, D. S., Foster, I.: Swift: a language for distributed parallel scripting. Parallel Comput. 37(9), 633–652 (2011). https://doi.org/10.1016/j.parco.2011.05.005
Williams, N., Johansson, L., Hartman, S., Josefsson, S.: Generic security service application programming interface (GSS-API) naming extensions, no. 6680. RFC Editor. ISSN:2070-1271 (2012)
Xie, T., Qin, X.: Security-aware resource allocation for real-time parallel jobs on homogeneous and heterogeneous clusters. IEEE Trans. Parallel Distrib. Syst. 682–697 (2008). https://doi.org/10.1109/TPDS.2007.70776
Zhan, Z.H., Liu, X.F., Gong, Y.J., Zhang, J., Chung, H.S.H., Li, Y.: Cloud computing resource scheduling and a survey of its evolutionary approaches. ACM Comput. Surv. 47(4), 1–33 (2015). https://doi.org/10.1145/2788397. http://dl.acm.org/citation.cfm?doid=?2775083.2788397
Zhu, L., Leach, P., Jaganathan, K., Ingersoll W.: The simple and protected generic security service application program interface (GSSAPI) negotiation mechanism, no. 4178. RFC Editor. ISSN:2070-1721 (2005)
Acknowledgements
This work has been supported by the Spanish Government (contracts TIN2012-34557, TIN2015-65316-P and grants BES-2013-067167, EEBB-I-15-09808 of the Research Training Program and SEV-2011-00067 of Severo Ochoa Program), by Generalitat de Catalunya (contract 2014-SGR-1051) and by the European Commission (ASCETiC project, FP7-ICT-2013.1.2 contract 610874). The second author was partially supported by the European Commission’s Horizon2020 program under grant agreement 653965 (AARC).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lordan, F., Jensen, J. & Badia, R.M. Towards Mobile Cloud Computing with Single Sign-on Access. J Grid Computing 16, 627–646 (2018). https://doi.org/10.1007/s10723-017-9413-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10723-017-9413-3