A security scheme for mobile cloud using multi-agents system

With The advent of technologies such as 4G 5G, Smartphone and cloud computing, a new technology has emerged it is the mobile cloud computing. It's a concept that exploits the benefits of cloud computing in order to overcome some problems related to mobile systems such as computing capability, searching, and multimedia processing. However, the second architecture of mobile cloud computing composed of a cluster of mobile devices suffers from some security problems such as user's privacy when different node communicate with each other. Therefore, and in order to overcome this problem we propose to secure this architecture by integrating a multi-agents system which provides the required intelligence level so as to overcome privacy, availability issues and to support the computing performance.

[1]  Abderrahim Abdellaoui,et al.  Out-of-band Authentication Using Image-Based One Time Password in the Cloud Environment , 2015 .

[2]  Abderrahim Abdellaoui,et al.  A Novel Strong Password Generator for Improving Cloud Authentication , 2016 .

[3]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[4]  Debasish Jana,et al.  Management of security and privacy issues of application development in mobile cloud environment: A survey , 2014, International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014).

[5]  Xiaodong Lin,et al.  SDSM: A secure data service mechanism in mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[6]  Ming-Yen Lin,et al.  Secure cloud storage for convenient data archive of smart phones , 2011, 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE).

[7]  Jiafu Wan,et al.  Security and privacy in mobile cloud computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[8]  Abderrahim Abdellaoui,et al.  An Efficient Framework for Enhancing User Authentication in Cloud Storage Using Digital Watermark , 2015 .

[9]  Payal Patel,et al.  Security in CloneCloud for Mobile Cloud Computing , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.

[10]  Wenye Wang,et al.  The unheralded power of cloudlet computing in the vicinity of mobile devices , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[11]  RahayuWenny,et al.  Mobile cloud computing , 2013 .

[12]  Rajashri Khanai,et al.  Addressing mobile Cloud Computing security issues: A survey , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).

[13]  Jacques Ferber,et al.  Les Systèmes multi-agents: vers une intelligence collective , 1995 .

[14]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[15]  Salvatore Venticinque,et al.  Cloud Agency: A Mobile Agent Based Cloud System , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.

[16]  Jie Xu,et al.  Multi-tenancy in Cloud Computing , 2014, 2014 IEEE 8th International Symposium on Service Oriented System Engineering.

[17]  Xiaoming Hu,et al.  Fully Secure Identity Based Proxy Re-Encryption Schemes in the Standard Model , 2008, 2008 International Conference on Computer Science and Information Technology.