Paving the Way for Security in Cloud-Based Mobile Augmentation Systems

Despite their steadily increasing capabilities, mobile end-user devices such as smart phones often suffer from reduced processing and storage resources. Cloud-based mobile augmentation (CMA) has recently emerged as a potential solution to this problem. CMA combines concepts of cloud computing and surrogate computing in order to offload resource-intensive tasks to external resources. During the past years, different CMA frameworks have been introduced that enable the development and usage of CMA-based applications. Unfortunately, these frameworks have usually not been designed with security in mind but instead mainly focus on efficient offloading and reintegration mechanisms. Hence, reliance on CMA concepts in security-critical fields of application is currently not advisable. To address this problem, this paper surveys currently available CMA frameworks and assesses their suitability and applicability in security-critical fields of application. For this purpose, relevant security requirements are identified and mapped to the surveyed CMA frameworks. Results obtained from this assessment show that none of the surveyed CMA framework is currently able to meet all relevant security requirements. By identifying security limitations of currently available CMA frameworks, this paper represents a first important step towards development of a secure CMA framework and hence paves the way for a use of CMA-based applications in security-critical fields of application.

[1]  Rajkumar Buyya,et al.  Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges , 2013, IEEE Communications Surveys & Tutorials.

[2]  Stephen R. G. Fraser Overview of the .NET Framework , 2003 .

[3]  Mark Ryan,et al.  Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..

[4]  Karim Habak,et al.  COSMOS: computation offloading as a service for mobile devices , 2014, MobiHoc '14.

[5]  Henri E. Bal,et al.  Cuckoo: A Computation Offloading Framework for Smartphones , 2010, MobiCASE.

[6]  Alec Wolman,et al.  MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.

[7]  Dimitrios Gunopulos,et al.  Misco: a MapReduce framework for mobile systems , 2010, PETRA '10.

[8]  Maya Daneva,et al.  Cloud computing security requirements: A systematic review , 2012, 2012 Sixth International Conference on Research Challenges in Information Science (RCIS).

[9]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..

[10]  Milind Kulkarni,et al.  Techniques for Fine-Grained, Multi-site Computation Offloading , 2011, 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.

[11]  Rajkumar Buyya,et al.  A Review on Distributed Application Processing Frameworks in Smart Mobile Devices for Mobile Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.

[12]  Byung-Gon Chun,et al.  CloneCloud: elastic execution between mobile device and cloud , 2011, EuroSys '11.

[13]  Inchul Hwang,et al.  Cloud Offloading Method for Web Applications , 2014, 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.

[14]  Gustavo Alonso,et al.  R-OSGi: Distributed Applications Through Software Modularization , 2007, Middleware.

[15]  Gustavo Alonso,et al.  AlfredO: An Architecture for Flexible Interaction with Electronic Devices , 2008, Middleware.

[16]  Martin Gilje Jaatun,et al.  Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..

[17]  P. M. Hoener Cloud Computing Security Requirements and Solutions: a Systematic Literature Review , 2013 .

[18]  Pan Hui,et al.  ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading , 2012, 2012 Proceedings IEEE INFOCOM.

[19]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.