Securing offloading process within small cell cloud-based mobile networks

Small cells endowed with specific cloud capabilities provide a new and promising approach to offer attractive services, such as cloud services which are still being exploited for offloading computation from a mobile device or for data storing purposes. Within our research, we focus on a typical application of multiple cloud enabled small cells located within a local area network, typically in company premises. The user offloading request is processed by small cells according to their current availability of resources. However, the user equipment does not need to be directly associated with it. Therefore, the transmitted data need to be secured by a different mechanism that ensures end-to-end security and identity of each communicating party in order to prevent various attacks. For that purpose, we propose a hierarchical structure of certificate authorities which is an asymmetric cryptographic scheme based on modified X.509 digital certificates. Beside the previously stated issues, the proposed scheme also decreases computing time needed for certificate validation as well as validation delay introduced by the online certificate status protocol and limits the necessity of communication with the main certificate authority.

[1]  Burton S. Kaliski,et al.  PKCS #10: Certification Request Syntax Specification Version 1.7 , 2000, RFC.

[2]  Zdenek Becvar,et al.  An architecture for mobile computation offloading on cloud-enabled LTE small cells , 2014, 2014 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).

[3]  Preeti Bhargava,et al.  Cell phone cloning: a perspective on GSM security , 2007, UBIQ.

[4]  David Cooper,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.

[5]  Russ Housley,et al.  Suite B Profile for Transport Layer Security (TLS) , 2009, RFC.

[6]  Sokol Kosta,et al.  Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware system , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[7]  Peter E. Yee Updates to the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2013, RFC.

[8]  Ali H. Sayed,et al.  Bio-Inspired Decentralized Radio Access Based on Swarming Mechanisms Over Adaptive Networks , 2013, IEEE Transactions on Signal Processing.

[9]  Stefano Ruffini,et al.  Synchronization aspects in LTE small cells , 2013, IEEE Communications Magazine.

[10]  Mahadev Satyanarayanan,et al.  A Reference Architecture for Mobile Code Offload in Hostile Environments , 2012, 2012 Joint Working IEEE/IFIP Conference on Software Architecture and European Conference on Software Architecture.