Security and privacy attacks during data communication in Software Defined Mobile Clouds

Abstract There has been an enormous growth in networking and data communication between the wireless devices. Cloud computation has taken a giant leap into the mobile domain to cater to the on-going communication demands. The latest programming techniques have also paved the way for incorporating Software Defined Networking techniques in Mobile Cloud environment. The growth of networking infrastructure with many such technological innovations, has led to the parallel increase in security and privacy of data at different levels of communication. The communication links and interfaces have become targeted platform for various security attacks causing denial of services. This survey comprehends an in-depth analysis of the possible data privacy attacks and threats in the proposed Software Defined Mobile Cloud. The possibilities of the attacks which are enlisted focus on various ways of spoofing and flooding of data packets, mis-interpretation and aggregation of the flow rules for communication, packet dropping and traffic flow enrouting at different cross-layered architectural levels built over the heterogeneous networks. An overview of the mechanisms to encounter the various vulnerabilities in the suggested framework is recommended. This article further identifies research directions and challenges to incorporate the possible techniques and preventive solutions, to overcome the malicious attacks in the software defined mobile cloud.

[1]  Nick Feamster,et al.  Improving network management with software defined networking , 2013, IEEE Commun. Mag..

[2]  Jose M. Alcaraz Calero,et al.  Towards a SDN-based architecture for analyzing network traffic in cloud computing infrastructures , 2015, 2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM).

[3]  Thierry Turletti,et al.  A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks , 2014, IEEE Communications Surveys & Tutorials.

[4]  Mohsen Guizani,et al.  Software-defined networking security: pros and cons , 2015, IEEE Communications Magazine.

[5]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[6]  Xianbin Wang,et al.  Authentication handover and privacy protection in 5G hetnets using software-defined networking , 2015, IEEE Communications Magazine.

[7]  Sakir Sezer,et al.  Queen ' s University Belfast-Research Portal Are We Ready for SDN ? Implementation Challenges for Software-Defined Networks , 2016 .

[8]  Athanasios V. Vasilakos,et al.  Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.

[9]  Fernando M. V. Ramos,et al.  Software-Defined Networking: A Comprehensive Survey , 2014, Proceedings of the IEEE.

[10]  AlsmadiIzzat,et al.  Security of Software Defined Networks , 2015 .

[11]  Rajkumar Buyya,et al.  Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges , 2013, IEEE Communications Surveys & Tutorials.

[12]  Mianxiong Dong,et al.  Rule caching in SDN-enabled mobile access networks , 2015, IEEE Network.

[13]  Wenjuan Li,et al.  A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures , 2016, J. Netw. Comput. Appl..

[14]  Zhifeng Xiao,et al.  Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.

[15]  Sakir Sezer,et al.  A Survey of Security in Software Defined Networks , 2016, IEEE Communications Surveys & Tutorials.

[16]  Mazliza Othman,et al.  A Survey of Mobile Cloud Computing Application Models , 2014, IEEE Communications Surveys & Tutorials.

[17]  Zonghua Zhang,et al.  Enabling security functions with SDN: A feasibility study , 2015, Comput. Networks.

[18]  Audun Jøsang,et al.  Identity management and trusted interaction in internet and mobile computing , 2014, IET Inf. Secur..

[19]  Jiafu Wan,et al.  Security and privacy in mobile cloud computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[20]  Zoltan Gal,et al.  Enabling software defined networking experiments in networked critical infrastructures , 2014 .

[21]  F. Richard Yu,et al.  Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.

[22]  Fabio Panzieri,et al.  Mobile computing in digital ecosystems: Design issues and challenges , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[23]  Guido Maier,et al.  Can open flow make transport networks smarter and dynamic? An overview on transport SDN , 2014, 2014 International Conference on Smart Communications in Network Technologies (SaCoNeT).

[24]  M. Sasikumar,et al.  Trust Model for Measuring Security Strength of Cloud Computing Service , 2015 .

[25]  Markus Schüring Mobile cloud computing - open issues and solutions , 2011 .

[26]  Ing-Ray Chen,et al.  A Survey of Mobile Cloud Computing Applications: Perspectives and Challenges , 2015, Wirel. Pers. Commun..

[27]  Nick Feamster,et al.  The road to SDN: an intellectual history of programmable networks , 2014, CCRV.

[28]  Dianxiang Xu,et al.  Security of Software Defined Networks: A survey , 2015, Comput. Secur..

[29]  Liang Gong,et al.  An intelligent SDN framework for 5G heterogeneous networks , 2015, IEEE Communications Magazine.

[30]  Rajkumar Buyya,et al.  Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges , 2014, IEEE Communications Surveys & Tutorials.

[31]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[32]  Patrick D. McDaniel,et al.  A Survey of BGP Security Issues and Solutions , 2010, Proceedings of the IEEE.

[33]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[34]  Yao Zheng,et al.  DDoS attack protection in the era of cloud computing and Software-Defined Networking , 2015, Comput. Networks.

[35]  Song Guo,et al.  Byzantine-Resilient Secure Software-Defined Networks with Multiple Controllers in Cloud , 2014, IEEE Transactions on Cloud Computing.

[36]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[37]  Gunnar Peterson,et al.  10 Quick, Dirty, and Cheap Things to Improve Enterprise Security , 2010, IEEE Security & Privacy.

[38]  Olivier Festor,et al.  Network security through software defined networking: a survey , 2014, IPTComm.

[39]  Wolfgang Kellerer,et al.  Interfaces, attributes, and use cases: A compass for SDN , 2014, IEEE Communications Magazine.

[40]  Ahmad-Reza Sadeghi,et al.  Mobile Trusted Computing , 2014, Proceedings of the IEEE.

[41]  G. Pujolle,et al.  Openflow and on demand networks , 2012, 2012 Third International Conference on The Network of the Future (NOF).

[42]  Rosli Salleh,et al.  Mobile Botnet Attacks: A Thematic Taxonomy , 2014, WorldCIST.

[43]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[44]  Xiangyang Li,et al.  An SDN-supported collaborative approach for DDoS flooding detection and containment , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[45]  Min Chen,et al.  Security protection between users and the mobile media cloud , 2014, IEEE Communications Magazine.