Mobile Cloud Computing and Its Security and Privacy Challenges

Mobile cloud computing has grown out of two hot technology trends, mobility and cloud. The emergence of cloud computing and its extension into the mobile domain creates the potential for a global, interconnected mobile cloud computing environment that will allow the entire mobile ecosystem to enrich their services across multiple networks. We can utilize significant optimization and increased operating power offered by cloud computing to enable seamless and transparent use of cloud resources to extend the capability of resource constrained mobile devices. However, in order to realize mobile cloud computing, we need to develop mechanisms to achieve interoperability among heterogeneous and distributed devices. We need solutions to discover best available resources in the cloud servers based on the user demands and approaches to deliver desired resources and services efficiently and in a timely fashion to the mobile terminals. Furthermore, while mobile cloud computing has tremendous potential to enable the mobile terminals to have access to powerful and reliable computing resources anywhere and anytime, we must consider several issues including privacy and security, and reliability in realizing mobile cloud computing. In this chapter, the authors first explore the architectural components required to realize a mobile cloud computing infrastructure. They then discuss mobile cloud computing features with their unique privacy and security implications. They present unique issues of mobile cloud computing that exacerbate privacy and security challenges. They also discuss various approaches to address these challenges and explore the future work needed to provide a trustworthy mobile cloud computing environment. Hassan Takabi University of Pittsburgh, USA Saman Taghavi Zargar University of Pittsburgh, USA James B. D. Joshi University of Pittsburgh, USA

[1]  Stefan Rommer,et al.  SAE and the Evolved Packet Core: Driving the Mobile Broadband Revolution , 2009 .

[2]  Trent Jaeger,et al.  Outlook: Cloudy with a Chance of Security Challenges and Improvements , 2010, IEEE Security & Privacy.

[3]  Hans D. Schotten,et al.  Access Schemes for Mobile Cloud Computing , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[4]  Mokdong Chung,et al.  Adaptive security management model in the cloud computing environment , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[5]  Hassan Takabi,et al.  Semantic-based policy management for cloud computing environments , 2012, Int. J. Cloud Comput..

[6]  Yifeng Chen,et al.  PARRAY: a unifying array representation for heterogeneous parallelism , 2012, PPoPP '12.

[7]  Nils Gruschka,et al.  Attack Surfaces: A Taxonomy for Attacks on Cloud Services , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[8]  Myong H. Kang,et al.  Security and Architectural Issues for National Security Cloud Computing , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.

[9]  Jemal H. Abawajy,et al.  A Layered Security Approach for Cloud Computing Infrastructure , 2009, 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks.

[10]  Yin Hu,et al.  Analysis and Research about Cloud Computing Security Protect Policy , 2011, 2011 International Conference on Intelligence Science and Information Engineering.

[11]  Yuh-Jong Hu,et al.  Semantics-Enabled Policies for Information Sharing and Protection in the Cloud , 2011, SocInfo.

[12]  Eui-nam Huh,et al.  Personal Cloud Computing Security Framework , 2010, 2010 IEEE Asia-Pacific Services Computing Conference.

[13]  Sakshi Kaushal,et al.  Cloud Computing Security Issues and Challenges: A Survey , 2011, ACC.

[14]  Hassan Takabi,et al.  Toward a Semantic Based Policy Management Framework for Interoperable Cloud Environments , 2012 .

[15]  Maria Andréia F. Rodrigues,et al.  Interactive Rendering of Indoor and Urban Environments on Handheld Devices by Combining Visibility Algorithms with Spatial Data Structures , 2011, Int. J. Handheld Comput. Res..

[16]  Minlan Yu,et al.  CloudPolice: taking access control out of the network , 2010, Hotnets-IX.

[17]  T. K. Lakshman,et al.  Enhancing enterprise field productivity via cross platform mobile cloud apps , 2011, MCS '11.

[18]  Ali Acilar Factors Affecting Mobile Phone Use Among Undergraduate Students in Turkey: An Exploratory Analysis , 2013 .

[19]  Gustavo Alonso,et al.  Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications , 2009, Middleware.

[20]  Dongwan Shin,et al.  Permission Management System: Permission as a Service in Cloud Computing , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.

[21]  Stefania Sesia,et al.  LTE - The UMTS Long Term Evolution, Second Edition , 2011 .

[22]  N. Raghavendra Rao,et al.  Establishing Synergy between Cloud Computing and Colloborative Technology in Medical Informatics , 2015 .

[23]  Hassan Takabi,et al.  DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).

[24]  Arati Baliga,et al.  VPMN: virtual private mobile network towards mobility-as-a-service , 2011, MCS '11.

[25]  Yu Guo,et al.  Multi-Tenancy Based Access Control in Cloud , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.

[26]  S. Srinivasan,et al.  Meeting Compliance Requirements While Using Cloud Services , 2019, Cloud Security.

[27]  Dongman Lee,et al.  A virtual cloud computing provider for mobile devices , 2010, MCS '10.

[28]  Krishna P. Gummadi,et al.  Towards Trusted Cloud Computing , 2009, HotCloud.

[29]  Zaigham Mahmood Cloud Computing Technologies for Connected Government , 2015 .

[30]  Mukesh Singhal,et al.  Information flow control in cloud computing , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).

[31]  Gail-Joon Ahn,et al.  Privacy-Enhanced User-Centric Identity Management , 2009, 2009 IEEE International Conference on Communications.

[32]  S. Srinivasan Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments , 2014 .

[33]  Winfried Lamersdorf,et al.  Towards mobile process as a service , 2010, SAC '10.

[34]  Wayne A. Jansen,et al.  Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.

[35]  Ravi S. Sandhu,et al.  Towards a discipline of mission-aware cloud computing , 2010, CCSW '10.

[36]  Byung-Gon Chun,et al.  CloneCloud: elastic execution between mobile device and cloud , 2011, EuroSys '11.

[37]  Susmit Bagchi,et al.  Emerging Research in Cloud Distributed Computing Systems , 2015 .

[38]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[39]  Kamel Rouibah,et al.  Effect of Personal Innovativeness, Attachment Motivation and Social Norms on the Acceptance of Camera Mobile Phones: An Empirical Study in an Arab Country , 2011, Int. J. Handheld Comput. Res..

[40]  P. V. G. D. Prasad Reddy,et al.  A Threat Free Architecture for Privacy Assurance in Cloud Computing , 2011, 2011 IEEE World Congress on Services.

[41]  Matthias Jarke,et al.  Mobile Access to MPEG-7 Based Multimedia Services , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.

[42]  Hassan Takabi,et al.  An architecture for specification and enforcement of temporal access control constraints using OWL , 2009, SWS '09.

[43]  Ayman I. Kayssi,et al.  Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[44]  Gail-Joon Ahn,et al.  Role-based privilege and trust management , 2005, Comput. Syst. Sci. Eng..

[45]  Shubhashis Sengupta,et al.  Cloud Computing Security--Trends and Research Directions , 2011, 2011 IEEE World Congress on Services.

[46]  Elisa Bertino,et al.  Privacy-preserving Digital Identity Management for Cloud Computing , 2009, IEEE Data Eng. Bull..

[47]  Daniele Catteddu and Giles Hogben Cloud Computing. Benefits, risks and recommendations for information security , 2009 .

[48]  In Lee Strategy, Adoption, and Competitive Advantage of Mobile Services in the Global Economy , 2012 .

[49]  Takayuki Sasaki,et al.  Content oriented virtual domains for secure information sharing across organizations , 2010, CCSW '10.

[50]  Jörg Schwenk,et al.  Towards an Anonymous Access Control and Accountability Scheme for Cloud Computing , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[51]  Jörg Schwenk,et al.  Security Prospects through Cloud Computing by Adopting Multiple Clouds , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[52]  James Bret Michael,et al.  Cloud to cloud interoperability , 2011, 2011 6th International Conference on System of Systems Engineering.

[53]  Abhishek Vaish,et al.  3 dimensional security in cloud computing , 2011, 2011 3rd International Conference on Computer Research and Development.

[54]  Angelos D. Keromytis,et al.  Dynamic Trust Management , 2009, Computer.

[55]  Siani Pearson,et al.  Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[56]  Eugene Marinelli,et al.  Hyrax: Cloud Computing on Mobile Devices using MapReduce , 2009 .

[57]  Kaisa Väänänen,et al.  User experience of mobile photo sharing in the cloud , 2010, MUM.

[58]  Jie Wu,et al.  Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.

[59]  Jie Liu,et al.  Pocket cloudlets , 2011, ASPLOS XVI.

[60]  Tao Feng,et al.  Jupiter: transparent augmentation of smartphone capabilities through cloud computing , 2011, MobiHeld '11.

[61]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[62]  Sangeeta N. Dhamdhere,et al.  Cloud Computing and Virtualization Technologies in Libraries , 2013 .

[63]  Daniele Catteddu,et al.  Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .

[64]  Wei-Tek Tsai,et al.  Role-Based Access-Control Using Reference Ontology in Clouds , 2011, 2011 Tenth International Symposium on Autonomous Decentralized Systems.

[65]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[66]  Hassan Takabi,et al.  StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy , 2010, SACMAT '10.

[67]  Gabriel Antoniu,et al.  Managing Data Access on Clouds: A Generic Framework for Enforcing Security Policies , 2011, 2011 IEEE International Conference on Advanced Information Networking and Applications.

[68]  Martin Gilje Jaatun,et al.  Deployment models: Towards eliminating security concerns from cloud computing , 2010, 2010 International Conference on High Performance Computing & Simulation.

[69]  Xiaodong Lin,et al.  SDSM: A secure data service mechanism in mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[70]  Cynthia E. Irvine,et al.  A cloud-oriented cross-domain security architecture , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[71]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[72]  Alec Wolman,et al.  MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.

[73]  Xuejie Zhang,et al.  Realization of open cloud computing federation based on mobile agent , 2009, 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems.

[74]  Ravi Pendse,et al.  Security in multi-tenancy cloud , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.

[75]  R. Pavithra,et al.  Secure Role based Data Access Control in Cloud Computing , 2011 .

[76]  Yong Tang,et al.  Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[77]  James B. D. Joshi,et al.  A collaborative approach to facilitate intrusion detection and response against DDoS attacks. , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).

[78]  Doan B. Hoang,et al.  Mobile Cloud for Assistive Healthcare (MoCAsH) , 2010, 2010 IEEE Asia-Pacific Services Computing Conference.

[79]  Daniele Sgandurra,et al.  Cloud Security Is Not (Just) Virtualization Security , 2009 .

[80]  Elisa Bertino,et al.  Access-control language for multidomain environments , 2004, IEEE Internet Computing.

[81]  Xiaofeng Liao,et al.  Cloud computing privacy & security global issues, challenges, & mechanisms , 2011, 2011 6th International ICST Conference on Communications and Networking in China (CHINACOM).

[82]  Farzad Sabahi,et al.  Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[83]  Gail-Joon Ahn,et al.  Security and Privacy in Cloud Computing: Towards a Comprehensive Framework , 2013 .

[84]  Prashant Srivastava,et al.  An architecture based on proactive model for security in cloud computing , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[85]  Shadi Aljawarneh,et al.  Advanced Research on Cloud Computing Design and Applications , 2015 .

[86]  Benny Rochwerger,et al.  Inter-cloud mobility of virtual machines , 2011, SYSTOR '11.

[87]  Jason H. Christensen,et al.  Using RESTful web-services and cloud computing to create next generation mobile applications , 2009, OOPSLA Companion.

[88]  Saad Bani-Mohammad,et al.  Submesh Allocation in 3D Mesh Multicomputers Using Free Lists: A Corner-Boundary Approach with Complete Recognition Capability , 2015 .

[89]  Xue Jing,et al.  A Brief Survey on the Security Model of Cloud Computing , 2010, 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science.

[90]  Mario Golling,et al.  Security Management Areas in the Inter-cloud , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[91]  Shih-Hao Hung,et al.  Developing Collaborative Applications with Mobile Cloud - A Case Study of Speech Recognition , 2011, J. Internet Serv. Inf. Secur..

[92]  Milan Petkovic,et al.  A Home Healthcare System in the Cloud--Addressing Security and Privacy Challenges , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[93]  Vassilka Tchifilionova,et al.  Security and Privacy Implications of Cloud Computing - Lost in the Cloud , 2010, iNetSec.

[94]  Ahmed Shawish,et al.  Cloud-Based Healthcare Systems: Emerging Technologies and Open Research Issues , 2016 .

[95]  Gail-Joon Ahn,et al.  SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.

[96]  Ming Gu,et al.  Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing , 2011, ISPEC.

[97]  A. B. M. Shawkat Ali,et al.  Above the Trust and Security in Cloud Computing: A Notion Towards Innovation , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[98]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .