0% found this document useful (0 votes)
75 views16 pages

Authors:-Muhammad Baqer Mollaha, Md. Abul Kalam Azada, Athanasios Vasilakos

1) Mobile cloud computing (MCC) integrates mobile computing with cloud computing to overcome limitations of mobile devices by storing data and processing tasks in the cloud. 2) Security and privacy challenges in MCC include data security if stored in the cloud, offloading security over wireless networks, virtualization security, and privacy of user data processed on remote cloud servers. 3) Current solutions proposed include distributed multi-cloud storage and encryption for data security, data partitioning for offloading security, secure virtual machine allocation and migration, and probabilistic encryption with keyword searching for privacy.

Uploaded by

yashmit mavi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views16 pages

Authors:-Muhammad Baqer Mollaha, Md. Abul Kalam Azada, Athanasios Vasilakos

1) Mobile cloud computing (MCC) integrates mobile computing with cloud computing to overcome limitations of mobile devices by storing data and processing tasks in the cloud. 2) Security and privacy challenges in MCC include data security if stored in the cloud, offloading security over wireless networks, virtualization security, and privacy of user data processed on remote cloud servers. 3) Current solutions proposed include distributed multi-cloud storage and encryption for data security, data partitioning for offloading security, secure virtual machine allocation and migration, and probabilistic encryption with keyword searching for privacy.

Uploaded by

yashmit mavi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

SECURITY AND

PRIVACY
CHALLENGES IN
MOBILE CLOUD
COMPUTING
AUTHORS:- MUHAMMAD BAQER MOLLAHA, MD. ABUL  KALAM  AZADA,
ATHANASIOS VASILAKOS                                   
         
               NAME – YASHMIT MAVI
                         ROLL NO – BTECH/10121/18
                             BRANCH – COMPUTER SCIENCE ‘A’
     SEMESTER – 5TH
ABSTRACT
• The rapid growth of mobile computing is seriously challenged
by the resource constrained mobile devices. However, the
growth of mobile computing can be enhanced by integrating
mobile computing into cloud computing, and hence a new
paradigm of computing called mobile cloud computing
emerges.
• In here, the data is stored in cloud infrastructure and the
actual execution is shifted to cloud environment so that a
mobile user is set free from resource constrained issue of
existing mobile devices.
• Moreover, to avail the cloud services, the communications
between mobile devices and clouds are held through wireless
medium. Thus, some new classes of security and privacy
challenges are introduced.
INTRODUCTION
The mobile computing is the fast-growing business solution in the field of
Information and Communications Technology (ICT). The number of
mobile users is escalating due to constantly improving user friendly
hardware and software of mobile devices.
The mobile cloud computing (MCC) is introduced as services of
cloud computing, which is offered in either mobile phone environment or
mobile embedded system environment. Mobile computing is integrating
with cloud computing because of the essential characteristics of cloud
model such as on-demand self-service, broad network access, resource
pooling, rapid elasticity, and measured services.
The authors show that at least six following features are essential for
MCC such as breaking through hardware limitations, having suitable data
access, intelligent load balancing, efficient task processing, cost effective
on demand service and removing the regional boundary.
• MCC stands for Mobile Cloud
Computing which is defined as a
combination of mobile computing,
WHAT IS cloud computing, and wireless network
that come up together purpose such as
MOBILE rich computational resources to mobile
users, network operators, as well as to
CLOUD cloud computing providers.

COMPUTIN • Mobile Cloud Computing is meant to


make it possible for rich mobile
G? applications to be executed on a
different number of mobile devices.
• In this technology, data processing,
and data storage happen outside of
mobile devices.
Extended battery life.

Improvement in data storage capacity and


processing power.

ADVANTAG Improved synchronization of data due to

ES OF MCC “store in one place, accessible from


anywhere ” platform theme.

Improved reliability and scalability.

Ease of integration.
SECURITY AND
PRIVACY
CHALLENGES
WITHIN MCC
1) Data security challenge:
• The major data security
challenge is introduced as the
consequence of mobile users’
data is stored and processed at
clouds that are located at
service providers’ ends.
• The data related challenges
include data loss, data breach,
data recovery, data locality and
data privacy. The data loss and
data breach break two security
requirements such as integrity
and confidentiality. 
• In data breach situation, users’ data is stolen, copied or used by any
other unauthorized users. These two can be occurred by malicious
insider or from outside through malicious applications.

2) Offloading security challenges:


• During offloading process, there requires to access to cloud through
wireless networks.
• Since the mobile users do not have any access and control over their
offloading processes, hence, there is a risk of unauthorized access to
offloaded content.
• And due to the offloading content executions are done within the cloud
or edge servers instead of mobile device, there is also possibility to
violate the integrity and confidentiality of offloaded contents.
• The integrity challenge arises due to after execution of offloaded
content, if the result is not correct or altered, the mobile devices can
not verify easily the correctness of the results.
3) Virtualization security challenges:
• In MCC, the cloud service providers offer cloud services using
virtualization techniques to the mobile users.
• In cloud end, an image of virtual machine (VM) of the mobile device
is pre-installed and the tasks of the mobile device are offloaded to
the VM for processing. This VM is also called thin VM or phone
clone.
• However, virtualization techniques when applied to MCC, generates
several security challenges such as security challenges within the
VMs, unauthorized access, VM to VM attack, communication
security within the virtualized environment, security challenges within
the Hypervisors and confidentiality of data.
4) Privacy challenges:
• Privacy is one of the major challenges
as the mobile users’ confidential data or
applications are processed and shifted
from mobile devices to the
heterogeneous distributed cloud servers
while availing different cloud services.
• These servers are located at different
places that are owned and maintained
by the service providers only. Here, the
users can not physically be worth the
storage of their data and thus, data
privacy and protection related
challenges are in the hands of service
providers, and the users are not
accountable for privacy lost.
• Several mobile applications are
available which may be unsafe due to
having hideous functions, collecting
unconsciously users’ personal
information such as hobbies, locations,
and may spread illegally.
CURRENT SECURITY
SOLUTIONS
1) Data security solutions:
Multi-cloud storage technique:
• To ensure data security in MCC, the authors
propose a framework which is based on
distributed multi-cloud storage, data encryption
and data compression techniques.
• In this framework, firstly, the data is divided
into different segments at mobile device end
according to user preference, and then, the
segments are encrypted and compressed.
• Finally, it keeps storage on distributed multi-
cloud.
• However, user can store one segment on its
own storage to improve security purpose.
• Multi-cloud technique is used in these
approach so that if somehow one cloud is
compromised, the others remain safe and the
unauthorized users cannot read or modify the
full stored data.
2) Security solutions for offloading:
• The authors proposed a data partitioning concept to prevent
mobile user's data exposure while offloading to remote and
trusted or un-trusted entity.
• There are three steps in this concept.
• Firstly, the data is divided into non-sensitive and sensitive part
based on user's preference.
• Then, the non-sensitive part is offloaded to the remote entity and
the sensitive part is executed on the mobile device or trusted
remote entity. 
• Finally, the processed results are come back to the mobile device
to make combination into final result.
•  Here, the data partitioning concept is used to obtain the benefits
of offloading while preserving privacy of user's sensitive data.
3) Security solutions for
Virtualization:
• Authors proposed a method named
as SWAP, which is a security aware
provisioning and migration scheme,
for phone clones.
• The phone clone is a thin VM on
cloud where mobile device is clonned
that supports to offload the
computational intensive data and
application for processing.
• The SWAP includes two techniques
such as secure phone clone
allocation to reduce the threats of
data leakage from VM, and migration
of phone clone if the threat becomes
high.
4) Security solutions for Privacy:
• In this, the authors propose an approach that preserves
privacy of mobile device's outsourced data in cloud.
• Probabilistic public key encryption technique and ranked
keyword searching algorithm are utilized here.
• Firstly, the mobile user makes an index for file collection, and
before sending for storing in the cloud, it encrypts both the data
and index.
• Then, to access the stored data in the cloud, the user produces
trapdoor for keywords and sends to the cloud.
• When the cloud receives the trapdoor, the cloud starts to
search for a list of matched data entries and its corresponding
encrypted relevance scores.
• Next, after collecting, the matched data is sent back to the user
in ranked sequences which are based on the relevance scores.
• Finally, the user can retrieve the original data back by
decryption operation.
CONCLUSION
The mobile world is evolving through significant transition
from voice applications to data applications. In such a
data centric world, the role of cloud computing becomes
more important for content sharing and accessing data.
With the new opportunities, cloud computing has brought
new challenges for the mobile environment. Luckily,
there are multiple ways of solving these obstacles to use
cloud computing from the mobile devices.
From these perspective, MCC has a very big potential to
jump in the mobile business and become one of the
mobile technology trends in the future, as it combines
the advantages of both mobile computing and cloud
computing.
REFERENCES
• [Online: 2016] Locations of Google’s Data Centers:
〈http://www.google.com/about/datacenters/inside/locations/index.html〉.
• [Online: 2016] Locations of Google’s Data Centers:
〈http://www.royal.pingdom.com/2008/04/11/map-of-all-google-data-center-
locations/〉.
• Ab Rahman, N.H., Cahyani, N.D.W., Choo, K.K.R., 2016. Cloud incident handling
and forensic‐by‐design: cloud storage as a case study. Concurr. Comput.: Pract.
Exp..
• Abdalla, A.-k.A., Pathan, A.-S.K., 2014. On protecting data storage in mobile cloud
computing paradigm. IETE Tech. Rev. 31, 82–91.
• Ahmed, E., Gani, A., Khan, M.K., Buyya, R., Khan, S.U., 2015. Seamless
application execution in mobile cloud computing: motivation, taxonomy, and open
challenges. J.Netw. Comput. Appl. 52, 154–172.
• Alam, S., Sogukpinar, I., Traore, I., Coady, Y., 2014. In-Cloud Malware Analysis and
Detection: State of the Art. In: Proceedings of the 7th International Conference on
Security of Information and Networks, p. 473.
• Ali, M., Khan, S.U., Vasilakos, A.V., 2015a. Security in cloud computing:
opportunities and challenges. Inf. Sci. 305, 357–383.
THANK YOU

You might also like