Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Upcoming SlideShare
Loading in...5
×
 

Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing

on

  • 51 views

Establishing applications on on-demand infrastructures rather of building applica-tions on fixed and rigid infrastructures was provided by cloud computing provides. By merely exploiting into the ...

Establishing applications on on-demand infrastructures rather of building applica-tions on fixed and rigid infrastructures was provided by cloud computing provides. By merely exploiting into the cloud, initiatives can gain fast access to business applications or infrastructure resources with decreased Capital Expenditure (CAPEX). The more and more information is placed into the cloud by someone and initiatives, security issues begins to develop and raised. This paper discusses the different security issues that rise up about how secure the mo-bile cloud computing environment.

Statistics

Views

Total Views
51
Views on SlideShare
49
Embed Views
2

Actions

Likes
0
Downloads
1
Comments
0

1 Embed 2

http://www.slideee.com 2

Accessibility

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing Document Transcript

    • ISSN: XXXX-XXXX Volume X, Issue X, Month Year A Survey on Security Circumstances for Mobile Cloud Computing Poornima K M Dept of Computer Science and Engineering BTL Institute of Technology Bangalore, India poorni091@gmail.com ABSTRACT: Establishing applications on on- demand infrastructures rather of building applica- tions on fixed and rigid infrastructures was provided by cloud computing provides. By merely exploiting into the cloud, initiatives can gain fast access to business applications or infrastructure resources with decreased Capital Expenditure (CAPEX). The more and more information is placed into the cloud by someone and initiatives, security issues begins to develop and raised. This paper discusses the different security issues that rise up about how secure the mo- bile cloud computing environment is. 1. INTRODUCTION Cloud computing means the accessibility of software, processing power and storage on demand. Its key features include legerity, decreased Cost, device in- dependence, dependability (multiple redundant sites), scalability, security and reduced maintenance. It is already a permanent fixture of consumer orientated, services such as email, storage and social media [4]. The chances, allowed by cloud computing becomes available to initiatives of all sizes that enables them to deliver more scalable and resilient services to employees, partners and cus- tomers at lower cost and with higher business legerity [1].Mobile cloud computing concerns to the accessi- bility of cloud computing services in a mobile envi- ronment. It integrates the elements of mobile net- works and cloud computing, thereby providing optimum services for mobile users. In mobile cloud computing, mobile devices no need to a powerful configuration (e.g., CPU speed and memory capacity) since all the data and elaborated computing modules can be processed in the clouds [2, 5].The more and more information that is located in the cloud by indi- viduals and initiatives, the more and more they be- come vulnerable to attacks and threats the Internet has to present. The assure of cloud computing to ac- quire fast access to business applications and boost- ing their infrastructure resources with decreased CAPEX put the business world into a more risky environment. In this paper, we discuss the summary of cloud computing technology together with the challenges and predicts cloud computing does not offer that conventional computing models. The dif- ferent issues that rises with the emergence of mobile cloud computing have been described and discussed, thus drawing and recognizing the security risks the cloud environment has to offer. 2. CLOUD COMPUTING 2.1 Cloud Services Cloud computing service offerings are generally clas- sified into three delivery models: the Infrastructure as a Service (IaaS); the Platform as a Service (PaaS); and the Software as a Service (SaaS) [1, 3, 4, 6]. Software as a Service (SaaS) offers finish and completed applications on demand. A single instance of the software runs on the cloud and services multi- ple end users or client organizations. It is a model of software deployment where an application is hosted as a service provided to customers throughout the Internet. By excreting the need to install and run the application on the customer’s own computer, SaaS facilitates the customer’s loading of software mainte- nance, ongoing operation, and support.
    • International Journal of Innovatory research in Science and Management - IJIRSM ISSN: XXXX-XXXX Volume X, Issue X, Month Year 14 [Fig. 1] Cloud Computing Service Offerings The provider allots the customer only to use its appli- cations. Most widely used examples of SaaS include Gmail, Google Docs, and 144 Platform as a Service (PaaS) extends an operat- ing system and can allow for every phase of software development and testing as well as suites of pro- gramming languages that users can use to develop their own applications. It allows a set of software and development tools hosted on the provider’s servers. Commercial examples include Microsoft Windows Azure and Google App Engine. Infrastructure as a Service (IaaS) provides end users direct access to processing, storage and other computing resources over the network. It pro- vides virtual servers with single IP addresses and blocks of storage on demand Examples of IaaS in- clude Amazon Elastic Compute Cloud (EC2), Joyent, Rackspace, and IBM Computing on Demand. 2.2 CLOUD APPLICATION DEPLOYMENT MODELS Cloud computing architects must take into circum- stance the three cloud application deployment and consumption models: public, private, or hybrid clouds. Public Clouds: Public clouds are owned and han- dled by Providers, and applications from different customers are likely to be combined together on the cloud’s servers, storage systems, and networks. Pub- lic clouds are most often hosted aside from customer precedes, and they provide a way to decrease cus- tomer risk and cost by providing a flexible, even pro- visional extension to endeavor infrastructure. Private Clouds: Private clouds are client dedicat- ed and are established for the exclusive use of one client, providing the utmost control over data, securi- ty, and quality of service. The initiative owns the infrastructure and has control over how applications are deployed on it. Private clouds may be deployed in an initiative datacenter, and they also may be de- ployed at a co-location facility. Hybrid Clouds: Hybrid clouds combined both public and private cloud models. They can help to provide on-demand, externally provisioned scale. The power to augment a private cloud with the resources of a public cloud can be used to assert service levels in the face of quick workload fluctuations. 2.3 Mobile Cloud Computing Mobile cloud computing refers to the utilization of cloud computing in combining with mobile devices. It is a grouping between mobile network and cloud computing, thereby allowing optimum services for mobile users. Cloud computing survives when tasks and data are kept on the internet instead of individual devices, allowing on-demand access. Applications are run on a remote server and then sent to the user [2, 5]. Figure 2 shows an overview of the mobile cloud computing architecture. [Fig. 2] Mobile Cloud Computing Architecture Overview 3. MOBILE CLOUD COM- PUTING SECURITY Assuring mobile cloud computing user’s privacy and integrity of data or applications is one of the key is- sues most cloud providers are given aid. Since mobile cloud computing is a combining of mobile networks and cloud computing, the security concerned issues are then divided into two classes: Mobile network user’s security; and cloud security [8, 9, 10].
    • International Journal of Innovatory research in Engineering and Technology - IJIRET ISSN: XXXX-XXXX Volume X, Issue X, Month Year 15 [Fig. 3] Mobile Cloud Computing Security Architec- ture Overview 3.1 Mobile Network User’s Security Numerous threats and security vulnerabilities such as malicious codes are known to the different mobile devices such as Smart phones, PDAs, cellular phones, laptops, and the like. Some applications to these devices can induce privacy issues for mobile users [10]. There are two main issues referring the subscriber’s security Security for mobile applications: The sim- plest ways to find security threats will be installing and running security software and antivirus programs on mobile devices. But since mobile devices are re- strained with processing and power limitations, pro- tecting them from these threats could be more diffi- cult equated to even computers. Privacy: allowing private information such as showing your current location and user’s important information produces scenarios for privacy issues. For example, the use of location based services (LBS) provided by global positioning system (GPS) devices. Threats for displaying private information could be minimized through selecting and analyzing the initiative needs and need only assigned services to be gained and moved to the cloud. 3.2 Securing Information on the Cloud Individuals and initiative take advantage of the bene- fits for storing large amount of data or applications on a cloud. However, issues in terms of their integri- ty, authentication, and digital rights must be taken care of [10]. Integrity: Every mobile cloud user must assure the integrity of their information stored on the cloud. Every accession they make must me authenticated and verified. Different approaches in maintaining integrity for one’s information that is stored on the cloud is being proposed. For example, every infor- mation stored by each individual or initiative in the cloud is tagged or initialized to them wherein they are the only one to have accession (move, update or de- lete) such information. Every accession they make must be authenticated ensuring that it is their own information and thus confirming its integrity. Authentication:Different authentication mechanisms have been represented and suggested using cloud computing to ensure the data access desirable for mobile environments. Some uses the open standards and even supports the integration of several authenti- cation methods. For example, the use of access or log-in IDs, passwords or PINS, authentication re- quests, etc. Digital rights management: Illegal distribu- tion and piracy of digital contents such as video, im- age, and audio, and e-book, programs becomes more and more popular. Some solutions to protect these contents from illegal access are implemented such as provision of encryption and decryption keys to ap- proach these contents. A coding or decoding platform must be done before any mobile user can have access to such digital contents. 4. CONCLUSION Cloud computing applies a substantial assure as a transformative technology that can change the very nature of computing specifically to business initia- tive. It allow on-demand network access to a shared pool of set up computing resources (e.g., networks, servers, storage, applications, and services) that can be quickly provisioned and issued with minimal management effort or service provider interaction. Mobile cloud computing is one of mobile technology trends in the future since it combines the advantages of both mobile computing and cloud computing, hence providing optimal services for mobile users. This paper have talked about security issues with regard to mobile cloud computing. Assuring mobile cloud computing user’s privacy and integrity of data or applications is one of the key issues most cloud providers are given attending. Since mobile cloud computing is a combining of mobile networks and cloud computing, the security concerned issues are then divided into two classes: mobile network user’s security; and mobile cloud security.
    • International Journal of Innovatory research in Science and Management - IJIRSM ISSN: XXXX-XXXX Volume X, Issue X, Month Year 16 REFERENCES [1] NEC Company, Ltd. and Information and Privacy Commissioner, Ontario, Canada. “Modeling Cloud Computing Architecture Without Compromising Pri- vacy: A Privacy by Design Approach, (2010), http://www.ipc.on.ca/images/Resources/pbd-NEC- cloud.pdf.. [2] http://www.smartdevelopments.org/?p=84 . [3]https://wiki.cloudsecurityalliance.org/guidance/ind ex.php/Cloud_Computing_Architectural_Framework. [4] http://andromida.hubpages.com/hub/cloud- computing-architecture. [5]http://www.readwriteweb.com/archives/why_clou d_computing_is_the_future_of_mobile.php. [6] Sun Microsystems, Inc., “Introduction to Cloud Computing Architecture”, White Paper, 1st Edition, (2009)June. [7] P. Mell and T. Grance, “The NIST Definition of Cloud Computing”, National Institute of Standards and Technology, Information Technology Laborato- ry, Version 15, 10-7-09 (2009). [8] D. Huang, Z. Zhou, L. Xu, T. Xing and Y. Zhong, “Secure Data Processing Framework for Mobile Cloud Computing”, IEEE INFOCOM 2011 Work- shop on Cloud Computing, 978-1-4244-9920- 5/11/$26.00 ©2011IEEE, (2011) pp. 620-624. [9] S. Morrow, “Data Security in the Cloud”, Cloud Computing: Principles and Paradigms, Edited by RajkumarBuyya, James Broberg and Andrzej Goscinski Copyright 2011 John Wiley & Sons, Inc., (2011) pp.