Offline Mode for Corporate Mobile Client Security Architecture

Preventing data leakage on the mobile client is a crucial security problem. Therefore, additional control and protection should be taken for the confidential data on the mobile clients that leave the boundaries of the organization. This paper presents a novel approach to the security of the corporate mobile clients, in particular when they operate in the offline mode. The presented approach includes the essential conceptualization and the definition of the core methodology to solve the problem of offline mobile security, i.e. the protection of the confidential data in use when the mobile client is not connected to the corporate cloud. The protection of the sensitive data is provided by the combination of cryptographic means and analytics methods to detect malicious user behavior. The proposed security architecture supports the basic mobile client protection principles: minimized traffic load and reduced communication with the cloud; usage of light-weighted operations and an optimized combination of the security methods.

[1]  Tatyana Galibus,et al.  Generalized Mignotte's Sequences Over Polynomial Rings , 2007, ICS@SYNASC.

[2]  Mazliza Othman,et al.  A Survey of Mobile Cloud Computing Application Models , 2014, IEEE Communications Surveys & Tutorials.

[3]  Serge Vaudenay,et al.  Primeless Factoring-Based Cryptography - -Solving the Complexity Bottleneck of Public-Key Generation- , 2013, ACNS.

[4]  Kennis Chan,et al.  Network Security and Communication Engineering : Proceedings of the 2014 International Conference on Network Security and Communication Engineering (NSCE 2014), Hong Kong, December 25-26, 2014 , 2015 .

[5]  Shahaboddin Shamshirband,et al.  A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach , 2015, Journal of Grid Computing.

[6]  Steven M. Bellovin,et al.  Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[7]  Rajashri Khanai,et al.  Addressing mobile Cloud Computing security issues: A survey , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).

[8]  Elaine B. Barker,et al.  Report on the Development of the Advanced Encryption Standard (AES) , 2001, Journal of research of the National Institute of Standards and Technology.

[9]  Shahaboddin Shamshirband,et al.  BSS: block-based sharing scheme for secure data storage services in mobile cloud environment , 2014, The Journal of Supercomputing.

[10]  Ali A. Ghorbani,et al.  Network Anomaly Detection Based on Wavelet Analysis , 2009, EURASIP J. Adv. Signal Process..

[11]  Nikolay Shenets,et al.  Some Structural and Security Properties of the Modular Secret Sharing , 2008, 2008 10th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing.

[12]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[13]  Florian Roemer,et al.  Comparison of model order selection techniques for high-resolution parameter estimation algorithms , 2009 .

[14]  João Costa,et al.  Greatest Eigenvalue Time Vector Approach for Blind Detection of Malicious Traffic , 2013 .

[15]  Xiaohua Tian,et al.  AMCloud: Toward a Secure Autonomic Mobile Ad Hoc Cloud Computing System , 2017, IEEE Wireless Communications.

[16]  René Mayrhofer An architecture for secure mobile devices , 2015, Secur. Commun. Networks.

[17]  Jian Yang,et al.  Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing , 2011, J. Networks.

[18]  Guan-Ming Su,et al.  Auction-Based Resource Allocation for Cooperative Video Transmission Protocols over Wireless Networks , 2009, EURASIP J. Adv. Signal Process..

[19]  Yong Tang,et al.  Trusted Data Sharing over Untrusted Cloud Storage Providers , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[20]  Samee Ullah Khan,et al.  Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .

[21]  Yutao Liu,et al.  TinMan: eliminating confidential mobile data exposure with security oriented offloading , 2015, EuroSys.

[22]  Chin-Tser Huang,et al.  Signal Processing Applications in Network Intrusion Detection Systems , 2009, EURASIP Journal on Advances in Signal Processing.

[23]  T. V. Lakshman,et al.  Design and Architecture of a Software Defined Proximity Cloud , 2015 .

[24]  Mohammad Heydari,et al.  An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client–Client Networks , 2016, Wirel. Pers. Commun..

[25]  Wei Ren,et al.  Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing , 2011 .

[26]  Tatiana Galibus,et al.  Cloud storage security , 2015 .

[27]  Ali Chehab,et al.  Energy-efficient incremental integrity for securing storage in mobile cloud computing , 2010, 2010 International Conference on Energy Aware Computing.