Security Issues of Mobile Application Using Cloud Computing

Security issues of the mobile application using cloud computation services are discussed in this paper. Communication between smart phone as a client on the one side and cloud server on the other is described. Security analyse for proposed solution of the health monitoring application is introduced as well. Data about health of the person are one of the most confidential thus need to be secured against different types of threats. Proposed solution is based on the smartphone as a client gathering data and the cloud servers as a computational platform for data storage and analysing. The sensors embedded in the smart phone measure data about monitored person then are partly processed and sent to the server by the internet connection for the deeper analysis.

[1]  Mário M. Freire,et al.  Security issues in cloud environments: a survey , 2014, International Journal of Information Security.

[2]  Dongho Won,et al.  Security Issues and Threats According to the Attribute of Cloud Computing , 2012 .

[3]  Úlfar Erlingsson,et al.  Engineering Secure Software and Systems , 2011, Lecture Notes in Computer Science.

[4]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[5]  Haralambos Mouratidis,et al.  A framework to support selection of cloud providers based on security and privacy requirements , 2013, J. Syst. Softw..

[6]  Monica Borda,et al.  Secure Mobile-Cloud Framework - Implementation on the Mobile Device , 2013 .

[7]  Tereza Otcenásková,et al.  A proposal for a computer-based framework of support for public health in the management of biological incidents: the Czech Republic experience , 2012, Perspectives in public health.

[8]  Jia Weihua,et al.  Research on the Security Issues of Cloud Computing , 2013 .

[9]  Mukesh Singhal,et al.  Collaboration in multicloud computing environments: Framework and security issues , 2013, Computer.

[10]  Jonathan Wood,et al.  Authentication, Authorization and Accounting (AAA) Transport Profile , 2003, RFC.

[11]  Zhenyu Du,et al.  Intelligence Computation and Evolutionary Computation , 2013 .

[12]  Muttukrishnan Rajarajan,et al.  A survey on security issues and solutions at different layers of Cloud computing , 2013, The Journal of Supercomputing.

[13]  G. Padmavathi,et al.  Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism , 2012 .

[14]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[15]  Federico Mancini,et al.  Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings , 2012, ESSoS.

[16]  Tai-hoon Kim,et al.  Computer Applications for Security, Control and System Engineering , 2012, Communications in Computer and Information Science.

[17]  Minho Kim,et al.  A Mobile Device-Based Virtualization Technique for M2M Communication in Cloud Computing Security , 2012 .