Privacy-Preserving Offloading of Mobile App to the Public Cloud

To support intensive computations on resource-restricting mobile devices, studies have been made to enable the offloading of a part of a mobile program to the cloud. However, none of the existing approaches considers user privacy when transmitting code and data off the device, resulting in potential privacy breach. In this paper, we present the design and implementation of a system that automatically performs fine-grained privacy-preserving Android app offloading. It utilizes static analysis and bytecode instrumentation techniques to ensure transparent and efficient Android app offloading while preserving user privacy. We evaluate the effectiveness and performance of our system using two Android apps. Preliminary experimental results show that our offloading technique can effectively preserve user privacy while reducing hardware resource consumption at the same time.

[1]  Eli Tilevich,et al.  Energy-Efficient and Fault-Tolerant Distributed Mobile Execution , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.

[2]  Thomas W. Reps,et al.  Precise interprocedural dataflow analysis via graph reachability , 1995, POPL '95.

[3]  Alec Wolman,et al.  MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.

[4]  Xu Chen,et al.  COMET: Code Offload by Migrating Execution Transparently , 2012, OSDI.

[5]  David Brumley,et al.  Privtrans: Automatically Partitioning Programs for Privilege Separation , 2004, USENIX Security Symposium.

[6]  Andrew C. Myers,et al.  Sharing Mobile Code Securely with Information Flow Control , 2012, 2012 IEEE Symposium on Security and Privacy.

[7]  Hongyang Li,et al.  Screenmilker: How to Milk Your Android Screen for Secrets , 2014, NDSS.

[8]  Laurie Hendren,et al.  Soot---a java optimization framework , 1999 .

[9]  H. T. Kung,et al.  Mobile App Acceleration via Fine-Grain Offloading to the Cloud , 2014, HotCloud.

[10]  Eric Chen,et al.  Offloading Android applications to the cloud without customizing Android , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.

[11]  Helen J. Wang,et al.  Permission Re-Delegation: Attacks and Defenses , 2011, USENIX Security Symposium.

[12]  Andrew C. Myers,et al.  Using replication and partitioning to build secure distributed systems , 2003, 2003 Symposium on Security and Privacy, 2003..

[13]  Shivakant Mishra,et al.  Data partitioning: an approach to preserving data privacy in computation offload in pervasive computing systems , 2014, Q2SWinet '14.

[14]  Aditya Akella,et al.  ECOS: Practical Mobile Application Offloading for Enterprises , 2012, Hot-ICE.

[15]  Byung-Gon Chun,et al.  CloneCloud: elastic execution between mobile device and cloud , 2011, EuroSys '11.

[16]  Songqing Chen,et al.  POMAC: Properly Offloading Mobile Applications to Clouds , 2014, HotCloud.