Controlled privacy in mobile cloud

Mobile devices face restrictions due to limitation of resources like life of battery, capacity of memory, power of processor and communication bandwidth specially during mobility and handover. Mobile based cloud computing is getting greater plea amid mobile users to lessen limitations of resource in mobile devices. The extensive espousal of programmable smart mobile handsets and communicating or exchanging data to Internet remaining in public domain leads to newer privacy and security challenges across enterprises. Smartphones and Tablets are not only storing users' private data but also the private data of the involvers - be it friends, family members, customers, vendors or any other individual. Denial of services, data leakage, account confiscation, exposure to insecure application program interface, isolation of virtual machine, mischievous attacks from insider, losing the key used in encryption give rise to several added threats related to privacy and security. We have attempted to compute a number of threats pertaining to privacy and security and commend best practices and endorsements to counter and prevent occurrence.

[1]  Lorrie Faith Cranor,et al.  Improving App Privacy: Nudging App Developers to Protect User Privacy , 2014, IEEE Security & Privacy.

[2]  Daniel Slamanig,et al.  Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients , 2012, Privacy Enhancing Technologies.

[3]  Mahadev Satyanarayanan,et al.  Cloudlets: at the leading edge of cloud-mobile convergence , 2013, QoSA '13.

[4]  Ling Liu Privacy and location anonymization in location-based services , 2009, SIGSPACIAL.

[5]  Dijiang Huang,et al.  Enabling secure location-based services in mobile cloud computing , 2013, MCC '13.

[6]  Sanjit Kumar Dash,et al.  Privacy preserving K-Medoids clustering: an approach towards securing data in Mobile cloud architecture , 2012, CCSEIT '12.

[7]  D. Popa,et al.  A security framework for mobile cloud applications , 2013, 2013 11th RoEduNet International Conference.

[8]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[9]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[10]  Chi-Yin Chow,et al.  Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments , 2011, GeoInformatica.

[11]  Jeffrey M. Voas,et al.  BYOD: Security and Privacy Considerations , 2012, IT Professional.

[12]  Jeffrey K. MacKie-Mason Can We Afford Privacy from Surveillance? , 2014, IEEE Security & Privacy.

[13]  Weisong Shi,et al.  Location privacy in emerging network-based applications , 2012 .

[14]  Pascal Felber,et al.  Thrifty privacy: efficient support for privacy-preserving publish/subscribe , 2012, DEBS.

[15]  Li Zhang,et al.  Collaborative privacy management: mobile privacy beyond your own devices , 2014, SPME@MobiCom.

[16]  Thomas Coughlin,et al.  Security analysis of authentication protocols for next-generation mobile and CE cloud services , 2011, 2011 IEEE International Conference on Consumer Electronics -Berlin (ICCE-Berlin).

[17]  Debasish Jana,et al.  Management of identity and credentials in mobile cloud environment , 2013, 2013 International Conference on Advanced Computer Science and Information Systems (ICACSIS).

[18]  Elaine Shi,et al.  Cloud Data Protection for the Masses , 2012, Computer.

[19]  Chi-Sheng Shih,et al.  Executing mobile applications on the cloud: Framework and issues , 2012, Comput. Math. Appl..

[20]  Paramvir Bahl,et al.  Advancing the state of mobile cloud computing , 2012, MCS '12.

[21]  Benjamin Livshits,et al.  MoRePriv: mobile OS support for application personalization and privacy , 2014, ACSAC.

[22]  Debasish Jana,et al.  Efficient management of security and privacy issues in mobile cloud environment , 2013, 2013 Annual IEEE India Conference (INDICON).

[23]  Li-Chun Wang,et al.  A Security Framework of Group Location-Based Mobile Applications in Cloud Computing , 2011, 2011 40th International Conference on Parallel Processing Workshops.

[24]  A C Carrington The professional. , 1995, The British journal of theatre nursing : NATNews : the official journal of the National Association of Theatre Nurses.

[25]  Samee Ullah Khan,et al.  Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .

[26]  Carsten Kleiner,et al.  Using Mobile Devices with BYOD , 2013, Int. J. Web Portals.

[27]  Ramesh Govindan,et al.  Cloud-enabled privacy-preserving collaborative learning for mobile sensing , 2012, SenSys '12.

[28]  Zhibin Zhou,et al.  Efficient and secure data storage operations for mobile cloud computing , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).