Skip to main content

Security Frameworks in Mobile Cloud Computing

  • Chapter
  • First Online:
Handbook of Computer Networks and Cyber Security

Abstract

The concept of mobile cloud computing (MCC) combines mobile computing with cloud resources, and therefore, has opened up new directions in the field of mobile computing. Cloud resources can help in overcoming the memory, energy, and other computing resource limitations of mobile devices. Thus, the mobile cloud computing applications can address some of the resource constraint issues by offloading tasks to cloud servers. Despite these advantages, mobile cloud computing is still not widely adopted due to various challenges associated with security in mobile cloud computing framework including issues of privacy, access control, service level agreements, interoperability, charging model, etc. In this chapter, we focus on the challenges associated with security in mobile cloud computing, and key features required in a security framework for MCC. Initially, we describe key architectures pertaining to various applications of mobile cloud computing, and later, we discuss few security frameworks proposed for MCC in terms of handling privacy, security, and attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Aref, W. G., & Samet, H. (1990). Efficient processing of window queries in the pyramid data structure. In Proceedings of the Ninth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, PODS ’90 (pp. 265–272). New York: ACM. https://doi.org/10.1145/298514.298579

    Chapter  Google Scholar 

  2. Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6), 599–616. https://doi.org/10.1016/j.future.2008.12.001

    Article  Google Scholar 

  3. Chen, E., & Itoh, M. (2010). Virtual smartphone over IP. In IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM), 2010 (pp. 1–6). https://doi.org/10.1109/WOWMOM.2010.5534992

  4. Chen, Y., Zhang, Y., & Maharjan, S. (2017). Deep learning for secure mobile edge computing. arXiv preprint arXiv:1709.08025.

    Google Scholar 

  5. Chen, Y. J., & Wang, L. C. (2011). A security framework of group location-based mobile applications in cloud computing. In 40th International Conference on Parallel Processing Workshops (ICPPW), 2011 (pp. 184–190). https://doi.org/10.1109/ICPPW.2011.6

  6. Chen, Y.-J., & Wang, L.-C. (2017). Privacy protection for mobile cloud data: A network coding approach. arXiv preprint arXiv:1701.07075.

    Google Scholar 

  7. Chow, R., Jakobsson, M., Masuoka, R., Molina, J., Niu, Y., Shi, E., et al. (2010). Authentication in the clouds: A framework and its application to mobile users. In Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW ’10 (pp. 1–6). New York: ACM. https://doi.org/10.1145/1866835.1866837

    Google Scholar 

  8. Hao, Z., Tang, Y., Zhang, Y., Novak, E., Carter, N., & Li, Q. (2015). SMOC: A secure mobile cloud computing platform. In IEEE Conference on Computer Communications (INFOCOM). Piscataway: IEEE.

    Google Scholar 

  9. Hoang, D. T., Niyato, D., Wang, P., Wang, S. S., Nguyen, D., & Dutkiewicz, E. (2018). A stochastic programming approach for risk management in mobile cloud computing. In Wireless Communications and Networking Conference (WCNC), 2018. Piscataway: IEEE.

    Google Scholar 

  10. Hsueh, S. C., Lin, J. Y., & Lin, M. Y. (2011). Secure cloud storage for convenient data archive of smart phones. In IEEE 15th International Symposium on Consumer Electronics (ISCE), 2011 (pp. 156–161). https://doi.org/10.1109/ISCE.2011.5973804

  11. Huang, D., Zhang, X., Kang, M., & Luo, J. (2010). MobiCloud: Building secure cloud framework for mobile computing and communication. In Fifth IEEE International Symposium on Service Oriented System Engineering (SOSE), 2010 (pp. 27–34). https://doi.org/10.1109/SOSE.2010.20

  12. Itani, W., Kayssi, A., & Chehab, A. (2010). Energy-efficient incremental integrity for securing storage in mobile cloud computing. In International Conference on Energy Aware Computing (ICEAC), 2010 (pp. 1–2). https://doi.org/10.1109/ICEAC.2010.5702296

  13. Jia, W., Zhu, H., Cao, Z., Wei, L., & Lin, X. (2011). SDSM: A secure data service mechanism in mobile cloud computing. In IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2011 (pp. 1060–1065). https//doi.org/10.1109/INFCOMW.2011.5928784

    Google Scholar 

  14. Khalil, I., Khreishah, A., & Azeem, M. (2014). Consolidated identity management system for secure mobile cloud computing. Computer Networks, 65, 99–110.

    Article  Google Scholar 

  15. Khan, A. N., Mat Kiah, M. L., Khan, S. U., & Madani, S. A. (2013). Towards secure mobile cloud computing: A survey. Future Generation Computer Systems, 29(5), 1278–1299. https://doi.org/10.1016/j.future.2012.08.003

    Article  Google Scholar 

  16. Lee, Y., Wang, L., & Gau, R. (2010). Implementation issues of location-based group scheduling for cloud applications. In IEEE VTS Asia Pacific Wireless Communications Symposium Conference (APWCS 2010).

    Google Scholar 

  17. Lockwood, J., McKeown, N., Watson, G., Gibb, G., Hartke, P., Naous, J., et al. (2007). NetFPGA–An open platform for gigabit-rate network switching and routing. In IEEE International Conference on Microelectronic Systems Education, 2007. MSE ’07 (pp. 160–161). https://doi.org/10.1109/MSE.2007.69

  18. Lomotey, R. K., & Deters, R. (2013). Middleware-layer for authenticating mobile consumers of amazon s3 data*. In Proceedings of the 2013 IEEE International Conference on Cloud Engineering, IC2E ’13 (pp. 108–113). Washington: IEEE Computer Society. https://doi.org/10.1109/IC2E.2013.10

    Chapter  Google Scholar 

  19. Nguyen, K. K., Hoang, D. T., Niyato, D., Wang, P., & Dutkiewicz, E. (2018). Cyberattack detection in mobile cloud computing: A deep learning approach. In Wireless Communications and Networking Conference (WCNC), Piscataway: IEEE.

    Google Scholar 

  20. Olafare, O., Parhizkar, H., & Vem, S. (2015). A new secure mobile cloud architecture. arXiv preprint arXiv:1504.07563.

    Google Scholar 

  21. Panneerselvam, J., Sotiriadis, S., Bessis, N., & Antonopoulos, N. (2012). Securing authentication and trusted migration of weblets in the cloud with reduced traffic. In Third International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), 2012 (pp. 316–319). https://doi.org/10.1109/EIDWT.2012.20

  22. Park, I.-S., Lee, Y.-D., & Jeong, J. (2013). Improved identity management protocol for secure mobile cloud computing. In 46th Hawaii International Conference on System Sciences (HICSS), 2013. Piscataway: IEEE.

    Google Scholar 

  23. Perez, S. (2010). Mobile cloud computing: $9.5 billion by 2014.

    Google Scholar 

  24. Premnath, S. N., & Zygmunt, J. H. (2014). A practical, secure, and verifiable cloud computing for mobile systems. Procedia Computer Science, 34, 474–483.

    Article  Google Scholar 

  25. Ramavathu, L., Bairam, M., & Manchala, S. (2017). A framework for secure mobile cloud computing. In Proceedings of the First International Conference on Computational Intelligence and Informatics. Singapore: Springer.

    Google Scholar 

  26. Satyanarayanan, M. (2010). Mobile computing: The next decade. In Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond, MCS ’10, pp. 5:1–5:6. New York: ACM. https://doi.org/10.1145/1810931.1810936

  27. Subashini, S., & Kavitha, V. (2011). Review: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1–11. https://doi.org/10.1016/j.jnca.2010.07.006

    Article  Google Scholar 

  28. Wang, S., & Wang, X. (2010). In-device spatial cloaking for mobile user privacy assisted by the cloud. In Eleventh International Conference on Mobile Data Management (MDM) (pp. 381–386). https://doi.org/10.1109/MDM.2010.82

  29. Xiao, S., & Gong, W. (2010). Mobility can help: Protect user identity with dynamic credential. In Eleventh International Conference on Mobile Data Management (MDM) (pp. 378–380). https://doi.org/10.1109/MDM.2010.73

  30. Zhang, X., Schiffman, J., Gibbs, S., Kunjithapatham, A., & Jeong, S. (2009). Securing elastic applications on mobile devices for cloud computing. In Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW ’09 (pp. 127–134). New York: ACM. https://doi.org/10.1145/1655008.1655026

    Chapter  Google Scholar 

  31. Zhao, K., Jin, H., Zou, D., Chen, G., & Dai, W. (2013). Feasibility of deploying biometric encryption in mobile cloud computing. In 8th ChinaGrid Annual Conference (ChinaGrid), 2013 (pp. 28–33). https://doi.org/10.1109/ChinaGrid.2013.10

  32. Zhou, J., Chen, J., Li, L., & Zhang, Z. (2012). The context awareness architecture in mobile cloud computing. In Fifth International Symposium on Computational Intelligence and Design (ISCID) (Vol. 1, pp. 302–305). https://doi.org/10.1109/ISCID.2012.83

  33. Zhou, K., Afifi, M. H., & Ren, J. (2017). ExpSOS: Secure and verifiable outsourcing of exponentiation operations for mobile cloud computing. IEEE Transactions on Information Forensics and Security, 12(11), 2518–2531.

    Article  Google Scholar 

  34. Zhou, Z., & Huang, D. (2012). Efficient and secure data storage operations for mobile cloud computing. In 8th International Conference on Network and Service Management (CNSM) and 2012 Workshop on Systems Virtualization Management (SVM) (pp. 37–45).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sanjay Kumar Madria .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Vemulapalli, C., Madria, S.K., Linderman, M. (2020). Security Frameworks in Mobile Cloud Computing. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-22277-2_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-22276-5

  • Online ISBN: 978-3-030-22277-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy