Highly Secure Mobile Devices Assisted with Trusted Cloud Computing Environments

Mobile devices have been widespread and become very popular with connectivity to the Internet, and a lot of desktop PC applications are now aggressively ported to them. Unfortunately, mobile devices are often vulnerable to malicious attacks due to their common usage and connectivity to the Internet. Therefore, the demands on the development of mobile security systems increase in accordance with advances in mobile computing. However, it is very hard to run a security program on a mobile device all of the time due the device's limited computational power and battery life. To overcome these problems, we propose a novel mobile security scheme that migrates heavy computations on mobile devices to cloud servers. An efficient data transmission scheme for reducing data traffic between devices and servers over networks is introduced. We have evaluated the proposed scheme with a mobile device in a cloud environment, whereby it achieved a maximum speedup of 13.4 compared to a traditional algorithm.

[1]  Mahmut T. Kandemir,et al.  Studying energy trade offs in offloading computation/compilation in Java-enabled mobile devices , 2004, IEEE Transactions on Parallel and Distributed Systems.

[2]  Herbert Bos,et al.  Paranoid Android: versatile protection for smartphones , 2010, ACSAC '10.

[3]  Dimitris Gritzalis,et al.  Delegate the smartphone user? Security awareness in smartphone platforms , 2013, Comput. Secur..

[4]  Songwu Lu,et al.  SmartSiren: virus detection and alert for smartphones , 2007, MobiSys '07.

[5]  Jason Flinn,et al.  Virtualized in-cloud security services for mobile devices , 2008, MobiVirt '08.

[6]  Pi-Cheng Hsiu,et al.  Dynamic Backlight Scaling Optimization: A Cloud-Based Energy-Saving Service for Mobile Streaming Applications , 2014, IEEE Transactions on Computers.

[7]  Doohwan Oh,et al.  A Distributed Signature Detection Method for Detecting Intrusions in Sensor Systems , 2013, Sensors.

[8]  Kun Yang,et al.  On effective offloading services for resource-constrained mobile devices running heavier mobile Internet applications , 2008, IEEE Communications Magazine.

[9]  Robert S. Boyer,et al.  A fast string searching algorithm , 1977, CACM.

[10]  Doohwan Oh,et al.  Multi-Threading and Suffix Grouping on Massive Multiple Pattern Matching Algorithm , 2012, Comput. J..

[11]  Yung-Hsiang Lu,et al.  Energy efficient content-based image retrieval for mobile systems , 2009, 2009 IEEE International Symposium on Circuits and Systems.

[12]  Won Woo Ro,et al.  Offloading of media transcoding for high-quality multimedia services , 2012, IEEE Transactions on Consumer Electronics.

[13]  Seung Woo Lee,et al.  A Hardware-Based String Matching Using State Transition Compression for Deep Packet Inspection , 2013 .

[14]  Cheng Wang,et al.  Computation offloading to save energy on handheld devices: a partition scheme , 2001, CASES '01.

[15]  James Murty,et al.  Programming Amazon web services - S3, EC2, SQS, FPS, and SimpleDB: outsource your infrastructure , 2008 .

[16]  Zhiyuan Li,et al.  Energy impact of secure computation on a handheld device , 2002, 2002 IEEE International Workshop on Workload Characterization.

[17]  William H. Sanders,et al.  Secloud: A cloud-based comprehensive and lightweight security solution for smartphones , 2013, Comput. Secur..

[18]  Sahin Albayrak,et al.  Monitoring smartphones for anomaly detection , 2008 .

[19]  Yung-Hsiang Lu,et al.  Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.

[20]  Bernd Freisleben,et al.  Malware Detection and Kernel Rootkit Prevention in Cloud Computing Environments , 2011, 2011 19th International Euromicro Conference on Parallel, Distributed and Network-Based Processing.

[21]  David Brumley,et al.  SplitScreen: Enabling efficient, distributed malware detection , 2010, Journal of Communications and Networks.

[22]  Judith Kelner,et al.  Deep packet inspection tools and techniques in commodity platforms: Challenges and trends , 2012, J. Netw. Comput. Appl..

[23]  Steve Hanna,et al.  A survey of mobile malware in the wild , 2011, SPSM '11.

[24]  Daniele Sgandurra,et al.  A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.

[25]  Tae-Hyung Kim,et al.  Energy-efficient Run-time Detection of Malware-infected Executables and Dynamic Libraries on Mobile Devices , 2009, 2009 Software Technologies for Future Dependable Distributed Systems.

[26]  Bharat K. Bhargava,et al.  A Survey of Computation Offloading for Mobile Systems , 2012, Mobile Networks and Applications.

[27]  Sahin Albayrak,et al.  Monitoring Smartphones for Anomaly Detection , 2008, Mob. Networks Appl..

[28]  Tsern-Huei Lee,et al.  Using String Matching for Deep Packet Inspection , 2008, Computer.

[29]  Udi Manber,et al.  A FAST ALGORITHM FOR MULTI-PATTERN SEARCHING , 1999 .

[30]  Viktor K. Prasanna,et al.  A Memory-Efficient and Modular Approach for Large-Scale String Pattern Matching , 2013, IEEE Transactions on Computers.

[31]  Beipeng Mu,et al.  NetSecu: A Collaborative Network Security Platform for In-network Security , 2011, 2011 Third International Conference on Communications and Mobile Computing.

[32]  Liviu Iftode,et al.  Enhancing Mobile Malware Detection with Social Collaboration , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.