The Reality and Future of the Secure Mobile Cloud Computing (SMCC): Survey

Mobile communication and mobile computing has revolutionized the way subscribers across the globe leverage and use a variety of services on the go. Mobile devices have evolved from mere simple handheld mobile phones that enabled voice calls only a few years back to smartphone devices that enable the user to access applications and value-added services anytime, anyplace. All of these, together with the recent reigniting of cloud computing technology, has spearheaded into the opportunistic and economically viable Mobile Cloud Computing (MCC) as the next innovative technology and ultimately a utility wave such as electricity or water. But this has created huge loopholes in facilitating reliable, scalable, performance oriented, safe, secure and auditable trusted services at affordable prices and profitability. Thus, this research proposal aims to create a fully-fledged Mobile Commerce-based Safe Mobile Cloud Computing (MCSMCC) framework to specifically accommodate Safe MCC (SMCC) with economic pricing models and e-trading schemes. As for the safety measures comprising of security, privacy, trust, identity management, audit and digital forensics among other related measures to suit SMCC, the objectives are to define and specify the necessary processes and protocols for secure e-trading, These objectives are further complimented by further defining and specifying SMCC pricing schemes that will be fair and equitable to users and vendors alike, and encourage critical mass market uptake and usage with confidence. Both of these central objectives will be experimented through simulation and prototyping to test and verify their purpose, effectiveness and efficiency.

[1]  Ajith Abraham,et al.  An auction method for resource allocation in computational grids , 2009 .

[2]  Chuan Wu,et al.  A Resource Auction Based Allocation Mechanism in the Cloud Computing Environment , 2012, 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum.

[3]  Jason H. Christensen,et al.  Using RESTful web-services and cloud computing to create next generation mobile applications , 2009, OOPSLA Companion.

[4]  Paul Krzyzanowski Process Synchronization and Election Algorithms , 2009 .

[5]  José Helano Matos Nogueira Mobile Intelligent Agents to Fight Cyber Intrusions , 2006 .

[6]  Alec Wolman,et al.  MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.

[7]  Liu Wei-feng Research of Mobile Agent-based Security in the E-commerce , 2004 .

[8]  Pan Hui,et al.  ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading , 2012, 2012 Proceedings IEEE INFOCOM.

[9]  Ralf Kakerow,et al.  Low power design methodologies for mobile communication , 2002, Proceedings. IEEE International Conference on Computer Design: VLSI in Computers and Processors.

[10]  Grady N. Drew Using Set for Secure Electronic Commerce , 1998 .

[11]  Byung-Gon Chun,et al.  Augmented Smartphone Applications Through Clone Cloud Execution , 2009, HotOS.

[12]  Chaokun Wang,et al.  Phosphor: A Cloud Based DRM Scheme with Sim Card , 2010, 2010 12th International Asia-Pacific Web Conference.

[13]  Wei Liang-fen A Migration Mechanism of Mobile Agent System Supporting Security and Fault-Tolerance , 2007 .

[14]  Subhajyoti Bandyopadhyay,et al.  Cloud computing - The business perspective , 2011, Decis. Support Syst..

[15]  Muli Ben-Yehuda,et al.  The Reservoir model and architecture for open federated cloud computing , 2009, IBM J. Res. Dev..

[16]  Samaher Al-Janabi,et al.  A Hybrid Image steganography method based on genetic algorithm , 2016, 2016 7th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT).

[17]  Tao Li,et al.  A Framework for Partitioning and Execution of Data Stream Applications in Mobile Cloud Computing , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[18]  Samaher Al-Janabi,et al.  Pragmatic Miner to Risk Analysis for Intrusion Detection (PMRA-ID) , 2017, SCDS.

[19]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[20]  Samaher Al-Janabi,et al.  Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications , 2017 .

[21]  Sherali Zeadally,et al.  Mobile cloud computing: Challenges and future research directions , 2018, J. Netw. Comput. Appl..

[22]  Geoffrey H. Kuenning,et al.  Saving portable computer battery power through remote process execution , 1998, MOCO.

[23]  Yan Guoqing,et al.  Research of Mobile Security Solution for Fourth Party Logistics , 2010, 2010 Sixth International Conference on Semantics, Knowledge and Grids.

[24]  Linda Dailey Paulson Low-Power Chips for High-Powered Handhelds , 2003, Computer.

[25]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[26]  Kaisa Väänänen,et al.  User experience of mobile photo sharing in the cloud , 2010, MUM.

[27]  Samaher Al-Janabi,et al.  Evaluation prediction techniques to achievement an optimal biomedical analysis , 2019 .

[28]  Ben Smyth,et al.  Formal verification of cryptographic protocols with automated reasoning , 2011 .

[29]  Qin Zhou,et al.  A PKI-based mechanism for secure and efficient access to outsourced data , 2010, 2010 International Conference on Networking and Digital Society.

[30]  Mohammad Shojafar,et al.  Mobile Cloud Computing: Challenges and Future Research Directions , 2017, 2017 10th International Conference on Developments in eSystems Engineering (DeSE).

[31]  Seyed Masoud Sadjadi,et al.  Mobile Service Clouds: A Self-Managing Infrastructure for Autonomic Mobile Computing Services , 2006, SelfMan.

[32]  Rajkumar Buyya,et al.  Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[33]  Cjf Cas Cremers Scyther : semantics and verification of security protocols , 2006 .

[34]  L. Youseff,et al.  Toward a Unified Ontology of Cloud Computing , 2008, 2008 Grid Computing Environments Workshop.

[35]  Parthasarathy Ranganathan,et al.  Energy Consumption in Mobile Devices: Why Future Systems Need Requirements-Aware Energy Scale-Down , 2003, PACS.

[36]  Xinwen Zhang,et al.  Towards an Elastic Application Model for Augmenting Computing Capabilities of Mobile Platforms , 2010, MOBILWARE.

[37]  Leon Sterling,et al.  Privacy and forensics investigation process: The ERPINA protocol , 2008, Comput. Stand. Interfaces.

[38]  Isao Ono,et al.  Applying Double-Sided Combinational Auctions to Resource Allocation in Cloud Computing , 2010, 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet.

[39]  Ratan K. Guha,et al.  Understanding the intruder through attacks on cryptographic protocols , 2006, ACM-SE 44.

[40]  Lin Chen Security model of mobile agent in e-commerce , 2005 .

[41]  Samaher Al-Janabi,et al.  A secure NFC mobile payment protocol based on biometrics with formal verification , 2016 .

[42]  David Abramson,et al.  Economic Models for Management of Resources in Grid Computing , 2001, ArXiv.

[43]  N. Ch. S. N. Iyengar,et al.  A Model for Mobile Agent Security in E-Business Applications , 2007 .

[44]  Shahryar Shafique Qureshi,et al.  Mobile cloud computing as future for mobile applications - Implementation methods and challenging issues , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.

[45]  Byung-Gon Chun,et al.  CloneCloud: elastic execution between mobile device and cloud , 2011, EuroSys '11.

[46]  Haiyun Luo,et al.  Energy-optimal mobile application execution: Taming resource-poor mobile devices with cloud clones , 2012, 2012 Proceedings IEEE INFOCOM.

[47]  Hans D. Schotten,et al.  Access Schemes for Mobile Cloud Computing , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[48]  Sung Chan Jun,et al.  An SLA-based cloud computing that facilitates resource allocation in the distributed data centers of a cloud provider , 2012, The Journal of Supercomputing.

[49]  David Abramson,et al.  Economic models for resource management and scheduling in Grid computing , 2002, Concurr. Comput. Pract. Exp..

[50]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[51]  John Zahorjan,et al.  The challenges of mobile computing , 1994, Computer.

[52]  J. W. Davis Power benchmark strategy for systems employing power management , 1993, Proceedings of the 1993 IEEE International Symposium on Electronics and the Environment.

[53]  Samaher AlJanabi,et al.  Smart system to create an optimal higher education environment using IDA and IOTs , 2018, International Journal of Computers and Applications.

[54]  Ibrahim AlShourbaji,et al.  A Study of Cyber Security Awareness in Educational Environment in the Middle East , 2016, J. Inf. Knowl. Manag..

[55]  Samaher Hussein Ali Novel Approach for Generating the Key of Stream Cipher System Using Random Forest Data Mining Algorithm , 2013, 2013 Sixth International Conference on Developments in eSystems Engineering.

[56]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[57]  Dennis G. Shea,et al.  Cloud Service Portal for Mobile Device Management , 2010, 2010 IEEE 7th International Conference on E-Business Engineering.

[58]  Xiaoyan Yang,et al.  On 3G mobile E-commerce platform based on Cloud Computing , 2010, 2010 3rd IEEE International Conference on Ubi-Media Computing.

[59]  John Strassner,et al.  Implementing Next Generation Services Using Policy-Based Management and Autonomic Computing Principles , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.