• Save
Mobile Cloud Computing Challenges and Security
Upcoming SlideShare
Loading in...5
×
 

Mobile Cloud Computing Challenges and Security

on

  • 2,253 views

 

Statistics

Views

Total Views
2,253
Views on SlideShare
2,253
Embed Views
0

Actions

Likes
3
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • ;qjkx
  • ;qjkx
  • ;qjkx
  • ;qjkx

Mobile Cloud Computing Challenges and Security Mobile Cloud Computing Challenges and Security Presentation Transcript

  • Mobile Cloud: Security Issues and Challenges Mrs. Vani, Mr. John & Mr. Manikandan Paper Presentation on
  • Evolution of Cloud Computing Mobile Cloud Computing Features Challenges Security Issues Existing Solutions Possible Solutions Conclusion Refernces CONTENTS
  • Cloud Computing - Evolution  Mainframe Computing - many users shared powerful mainframes using dummy terminals.  PC Computing - stand-alone PCs became powerful enough to meet the majority of users’ needs.  Network Computing - PCs, laptops, and servers were connected together through local networks to share resources and increase performance.
  • Cloud Computing - Evolution  Internet Computing - local networks were connected to other local networks forming a global network such as the Internet to utilize remote applications and resources.  Grid Computing - provided shared computing power and storage through a distributed computing system.  Cloud Computing - further provides shared resources on the Internet in a scalable and simple way.
  • Cloud Computing Common Location-independent Online Utility on Demand Common : implies multi-tenancy, not single or isolated tenancy Utility : implies pay-for-use on Demand : implies infinite, immediate, invisible scalability
  • Cloud Computing  Latest distributed computing model.  Implements the utility computing vision.  On-demand, pay-as-you-go, and utility computing.  A ubiquitous network access.  Objective - To increase the capacity and capabilities of client devices by accessing leased infrastructure and software applications instead of owning them.
  • Cloud Computing - Services A Few Services of Cloud:  SaaS - to use on demand software that is provided by the service provider via a thin client device for consumers  PaaS - applications deployed without the burden and cost of buying and managing the hardware and software for customers  IaaS - outsourcing of responsibility of equipment  MaaS, CaaS, LaaS, XaaS
  • Mobile Cloud Computing A new distributed computing paradigm for mobile applications whereby the storage and the data processing are migrated from the mobiles to resources rich and powerful centralized computing data centers in computational clouds. Aepona, “White paper, Mobile Cloud Computing Solution Brief”, November 2010.
  • Mobile Cloud Computing - Features  In MCC, these are Transferred to cloud  Intensive computing  Data storage  Information processing  Ubiquity and Mobility are two major features in next generation network.
  • Mobile Cloud Computing - Architecture
  • Mobile Cloud Computing -Characteristics  Scalability  Agility  Reliability  Security  Reduced Cost  Reduced Maintenance
  • Mobile Cloud Computing - Challenges  Limitation of bandwidth and communication latency  Signal Disturbance  Security  Limited power, memory, screen, OS  Low computing ability – Processing power  Quality of Service (affected by landforms, weather and buildings)
  • Mobile Cloud Computing - Challenges Limitations in contrast with PCs and Laptops  3 times less in processing capacity  8 times less in memory  5 to 10 times less in storage capacity  10 times less in network bandwidth
  • Mobile Cloud Computing –Security Layers Security Services are in three layers  Backbone layer – security surveillance in cloud physical system  Infrastructure layer – monitors VMs in cloud, storage verification, Evaluation and Audits, …  Application and Platform layer – user management, key management, authentication, authorization, encryption and data integration. Recent survey – 73% of IT executives and CEOs are unwilling to adopt cloud services due to privacy and security
  • Mobile Cloud Computing –Security Issues Security Issues in MCC  Data Ownership  Privacy  Data Security  Other security issues
  • Mobile Cloud Computing –Security Issues Security Issues in MCC  Data Ownership – MCC provides the facility to store personal data and other data (purchases) who owns the data? users need to be aware of different rights on purchases (Audio, Video, …).  Privacy – one of the biggest challenge Some apps store user’s data remotely, which may be sold to others (agencies ...) without the permissions of user. ( like updates about Location).
  • Mobile Cloud Computing –Security Issues  Data Security and Other security issues – Mobiles are famous for malicious code – gives possibility of loss.  Data loss from lost/stolen devices  Info stealing by malicious malware  Data leakage due to poorly written third party app  Unassured network access, unreliable APs  Insecure Market places  Near Field Communication and Proximity based hacking
  • Mobile Cloud – Existing Solutions  Anand Surendra – Secure framework to store data in secured fashion to protect user’s privacy.  Jibitesh Mishra – Secure architecture to maintain integrity and security of data.  Itani et. al – an energy efficient framework to assure user’s integrity.  Jon Oberheide – architecture with three components  Host Agent – lightweight process on device  Network Service – analyses what is sent by host  Cache - Global Shared & Local Private cache
  • Mobile Cloud – Existing Solutions  Chetan et. al – wildcat prevention and protection  Cloud access protection – OTP, OpAuTH  Embedded device identity protection – personalized profile on each device.  Marinelli – Hyrax, a MCC platform from Hadoop  Offers sane performance in data sharing  Allows users to utilize data and computing process on networks
  • Mobile Cloud – Possible Solutions Some steps for winning battle of breaches:  Prioritize the objectives and set the risk tolerance  there is no 100% secure.  Harddecisions on different levels of protection.  Protect data with proactive security plan  A plan with threat landscape in mind (hacking cyber crime, media & social scams, etc…)  With policies and technologies.
  • Mobile Cloud – Possible Solutions Some steps for winning battle of breaches:  Prepare the response to inevitable sophisticated attacks  Advanced continual threats need to be encountered.  Unified and tested response plan is needed.  Promote the culture of security awareness  Careless mistakes of individuals (an employee could affect master plan of CEO).  Build data security on culture of organization.
  • Conclusion  To attain more security and increase reliability  Threats need to be addressed & studied  Data security plan needs to be developed.  It is essential to keep in mind in designing a framework for MCC  More cost effective  More energy efficient  Better security  Better performance
  • References 1. PRNewswire.org, http://www.reportlinker.com/, 2012. 2. Preston A. Coz, “Mobile Cloud Computing: Devices, trends, issues & enabling technologies”, 2012. 3. Schneider, “Essential characteristics of Mobile Cloud Computing”, Marquette University, United States, 2012. 4. Professor Kun Yang, Dr. Shumao Ou, Professor Hai Jin, Huazhong and Professor Amiya Nayak, “Mobile Cloud Computing and Networking”, Proceedings of IEEE conference, 2013. 5. M. Rajendra Prasad, Jayadev Gyani and P. R. K. Murti, “Mobile Cloud Computing: Implications and Challenges, Journal of Information Engineering and Applications”, Vol 2, No.7, 2012, Print ISSN 2224-5782, pp 7 - 15. 6. Ronnie D. Caytiles and Sunguk Lee, “Security Considerations for Public Mobile Cloud Computing”, International Journal of Advanced Science and Technology, Vol. 44, July 2012.
  • References 7. Soeung-Kon Victor Ko, Jung- Hoon Le and Sung Woo Kim, “Mobile Cloud Computing Security Considerations”, April 30, 2012. 8. Anand Surendra Shimpi and R. Chander, “Secure Framework in Data Processing for Mobile Cloud Computing”, International Journal of Computer & Communication Technology, ISSN (Print) 0975- 7449, vol. 3, Iss. 3, 2012. 9. Jibitesh Mishra, Sanjit Kumar Dash and Sweta Dash, “Mobile Cloud Computing: A Secure Framework of Cloud Computing for Mobile Application”, Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2012, pp. 347- 356. 10.Itani et al, “Towards secure mobile cloud: A survey”, Proceedings of Analyses paper, 2012. 11.Eugene E. Marinelli, “Hyrax: Cloud Computing on Mobile Devices”, Dissertation of Thesis, Carnegie Mellon University, Pittsburgh, 2009. 12.Xiaojun Yu and Qiaoyan Wen, “Design of Security Solution to Mobile Cloud Storage”,: Knowledge Discovery and Data Mining, AISC, Springer-Verlag Berlin Heidelberg H. Tan (Ed.), 2012, pp. 255–263.
  • References 13.Robert Lemos, “Cloud's Future Security Depends on Mobile”, Proceedings of RSA Conference, February 2012. 14.V. L. Divya, “Mobile Applications with Cloud Computing”, International Journal of Scientific and Research, Vol. 2, Issue 4, April 2012, ISSN 2250- 3153. 15.Han Qi and Abdullah Gani, “Research on Mobile Cloud Computing: Trends, Review and Perspectives”, Proceedings of Analyses paper, University of Malaya, Malaysia, 2012. 16.S. Chetan, Gautam Kumar, K. Dinesh, K. Mathew and M. A. Abhimanyu, “Cloud Computing for Mobile World”, Proceedings of Analyses paper, National Institute of Technology, Calicut, 2010. 17.Jon Oberheide and Evan Cooke, “Virtualized cloud security services for mobile devices”, Proceedings of the Workshop on Virtualization in Mobile Cloud Computing, ACM, New York, USA, 2008, pp 31–35. 18.Cecil Donald, Arockiam and Arul Oli, “”, International Journal of Engineering and Technology, Vol. 3, Issue 1, July 2013.
  • queries
  • Thank You