SlideShare a Scribd company logo
1 of 3
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.93-95
ISSN: 2278-2400
93
Challenges and Mechanisms for Securing Data in
Mobile Cloud Computing
T.Amutha1
S.Balaji2
B.Megasri 3
1,3
Research scholar,PG & Research Dept of Computer science, D.B.Jain (Autuonomous), Chennai, India
2
Associate professorPG & Research Dept of Computer science, D.B.Jain (Autuonomous), Chennai, India
Email : amutha345@gmail.com
Abstract-Cloud computing enables users to utilize the services
of computing resources. Now days computing resources in
mobile applications are being delivered with cloud computing.
As there is a growing need for new mobile applications, usage
of cloud computing can not be overlooked. Cloud service
providers offers the services for the data request in a remote
server. Virtualization aspect of cloud computing in mobile
applications felicitates better utilization of resources. The
industry needs to address the foremost security risk in the
underlying technology. The cloud computing environment in
mobile applications aggravated with various security problems.
This paper addresses challenges in securing data in cloud for
mobile Cloud computing and few mechanisms to overcome.
Keywords- Cloud computing , data security, RSA,
cryptography, email security.
I. INTRODUCTION
Cloud computing provides uncountable benefits to mobile
applications of small size to larger size. In order to extend
collaboration and innovation, business of all sizes deploys on
mobile cloud computing. Use of cloud computing for mobile
applications enables business volatility into single domain in
addition to increasing technology effectiveness without
increasing operational cost. With the support of cloud
computing, mobile applications scale up on demand IT
capacity and also has ability for managing large data sets. The
use of cloud computing increasing day, the end users and the
service providers are able to utilize the cloud resources with
less cost and easily without owning all the resource needed.
However, the services of cloud computing is having many
problems associated with it. The most common is security.
Since from last few years, the problems like security,
authentication, privacy preservation, access control etc studied
more by various researches[1]. CLOUD computing” implies
access to isolated computing services suggested by third parties
via a TCP/IP connection to the public internet. It is internet
based development and use of computer technology. Public
cloud, Private cloud and Hybrid cloud, which combine both
public and private clouds are types of cloud computing [2].
A. Public cloud:
Public cloud provides scalable, dynamically provisioned,
virtualized recourse available over the internet form an offsite
third party provider. Think Grid is a company that provides
multi tenant architecture for supplying services such as Hosted
Desktops. Other popular cloud vendors include
Salesforce.com, Amazon EC2 and Flexi Scale.
B. Private cloud:
It is providing hosted services on the private networks. This
type of cloud is used by large companies and allows their
corporate network and data center administrators to effectively
become in house service providers.
C. Hybrid cloud:
It combines resources from both internal external providers
and so it becomes the most popular choice for enterprises. It is
comprise of two or more than two clouds. There are three
service models in cloud computing Software as-a-Service
(SaaS), Platform as a-Service (PaaS) and Infrastructure as-a-
service (IaaS).
II. LITERATURE SUPPORT
The key security issues concerned with cloud computing are
being analyzed in the work of Eystein Mathisen [3]. Farzad
Sabahi [4] discussed about the issues such as reliability and
availability for cloud computing. The requirements and
challenges that are faced by cloud service providers during
cloud engineering are being the part of paper by Popovi and
Hocenski [5]. Akhil Bhel [6] explores the applications to
secure the cloud infrastructure and their drawbacks, Chang-
lung Tsai et al. [7] proposed a mechanism that was not only
focused on find out some solutions, but also focused on
develop some feasible information security techniques or
products for the application and service of cloud computing.
Cloud service users need to be vigilant in understanding the
risks of data breaches in the new environment. S. Subashini et
al. [1] proposed a survey of the different security risks that
pose a threat to the cloud.
III. CHALLENGES BEHIND SECURITY BREACH
CLOUD BASED MOBILE COMPUTING
ENVIRONMENT
A. Trust related
As there is n o means to access the mobile service provider’s
and cloud service provider’s security level, users and
stakeholders have no ability to measure the security level.
B. Loss of data related
The unaddressed issue to manage the loss of cryptographic
management information can bring great damages to data
leakage as well as data loss.
C. Data Integrity and confidentiality related
As The nature of cloud environment is based on virtualization
feature, different mobile applications users share the same
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.93-95
ISSN: 2278-2400
94
infrastructure which may lead to threat to dataintergrity and
confidentiality.
D. Data protection Inconsistency related
The decentralized nature of mobile cloud architecture may
avenue threat to protection inconsistency in the manner in
which access restricted by one module may be granted by
smother.
E. CSA observations
“Cloud Security Alliance” (CSA)[9] discovered the
top six security threats to cloud computing a
Account, service and traffic hijacking,Unidentified risk
profile,data leakage,abuse use of cloud computing,Malicious
insiders, API insecure
F. Networking Perspective threats
1) XSS Attacks:-
There are two kinds of XSS attacks. There are Stored XSS and
Reflected XSS. In Stored XSS, the noxious code is stored
permanently in an asset handled by web application. On the
other hand, in Reflected XSS, the noxious code is not stored
permanently. Indeed it is instantly returned back to the client
[10].
2) Sniffer Attacks:-
These kinds of assaults are propelled by applications which can
catch packets streaming in a network. If the information that is
being exchanged through these packets are not encrypted, it
can be perused. A sniffer program, through the network
interface card (NIC) gat information or traffic attached to
different frameworks on the network additionally gets
recorded.
3) SQL Injection Attacks:-
A harmful code is embedded into a standard SQL query.
Therefore attacker gets an illicit access to a database. Attacker
is capable to access or change some sensitive information of
any cloud user or organization.
4) Man-in-the-Middle Attacks:-
In such an assault, an intruder tries to meddle in a continuous
discussion between sender and receiver to infuse false data and
to have knowledge of the critical information exchange
between them.
5) Distributed Denial of Service (DDoS) Attacks:-
DDoS attack makes use of many machines and internet
connections. Attacker uses a group of agents to send DDoS
attack commands repeatedly to the target system. Sudden
traffic can lead to load the website very slowly to their
intended users. Sometimes this traffic is so high that it shuts
down the site completely.
6) Cookies poisoning
In order to access of an intruder to a webpage, it involves
changing or altering the contents of cookie. User identity
related credentials like username and password etc., are
unauthorized user.
G. Threats behind cloud virtualization
Numerous bugs have been discovered in all prominent VMMs
that permit getting least as of g into the host OS. All
virtualization software at least as of now can be abused b
harmful clients to sidestep certain security confinements.
Virtual machine instance isolation guarantees that diverse
instances running on the same physical machines are isolated
from one another. Nonetheless, offering perfect is not possible
by current VMMs.Every client utilizes his identity for
accessing cloud services. A major issue is unauthorized access
to cloud asses and applications. A virulent element can imitate
a real client and make use of cloud services. Numerous such
malevolent elements acquire the cloud assets prompting un-
accessibility of a service for real clients. Likewise it may
happen that the client crosses his limit at time of service
utilization in the cloud environment. This cloud be regarding
access to safe zone in memory.
IV.MECHANISMS TO HANDLE THREATS
a) Best security practices need to be implemented for
installation and configuration on mobile cloud environment.
Unauthorized changes and action needs to be monitored
periodically. Strong authentication and access control needs to
be enforced. Clients can impose service level agreement
(SLA) for patching, regular scan for vulnerability and perform
consistent audits.
b) In order to handle Invective and Wicked Use of mobile
Cloud Computing the registration and validation process must
be full proof. Thorough monitoring of network traffic and
credit card transactions needs to be done. Users can also
analyze public prohibition list for someone’s network block.
c) Monitor security model of interfaces provided by cloud
supplier for better Defending Unprotected Application
Programming Interfaces (APIs). Ensuring robust
authentication and access control can be effective during
encrypted transmission and understanding the dependence
chain related to APIs.
d) Users can make use of strong two factor authentication
technique as per requirements, and utilize proactive checking
to recognize unauthorized activities. An alternate helpful
venture to take is to understand policies of cloud provider and
SLAs.
e) There is a need to defend information loss with the
mechanism. Successful measures are to encrypt and ensures
integrity of information in transmission, analyze protection
strong key generation during design and run time. Other
possible steps to take are to execute strong key generation,
managements, storage, destruction practices, contractually
request suppliers to clean persistent media before it will be
discharged into the pool.
f) A sniffing recognition platform in view of ARP (address
resolution protocol) and RTT (round trip time) can be utilized
to recognize a sniffing framework running on a network. Use
encryption mechanism to protect critical information, add
MAC address of the gateway permanently to the ARP instead
of IPV6 cache, use IPV4 and make use of SSH instead of
Telnet, Secure copy (SCP) instead of FTP.
g) Separate IDS is used for every cloud. Information
exchange id the mode of working for different IDS over
network. In the event when a particular cloud is under assault,
the supportive IDS alert the entire system.
h) Domain Name System Security Extensions (DNSSEC)
diminishes the impact of DNS intimidations. In the situation
when these efforts to establish safety turn out to be deficient
when there is some malicious connection in between sender
and receiver.
i) Different techniques such: actualizing letter cover,
variable textual styles of the letters used to plain a CAPTCHA,
expanding the string length and utilizing a perturbative
foundation can be keep intruder away from CAPTCHA
breaking. CAPTCHA outline standards have been proposed,
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.93-95
ISSN: 2278-2400
95
which will be capable to oppose any assault technique of static
optical character recognition (OCR).
j) Trust between the Service provider and the customer to
be sure whether the management of the Service is trustworthy,
and whether there is any risk o insider attacks. This is a major
issue and has received strong attention by companies [12].
k) The service providers like Gmail, Yahoo Mail etc.,
require the username and password to use their services, but
they are vulnerable to phishing attacks. IAM can be used to
deal with this problem. It is a framework for business process
for managing electronic identities. It supports management of
multiple digital identities with their roles, authentication,
authorization and privileges. Identity management system has
different components like Identity authentication, Directory
service, Password administration, Access management, User
provisioning, Federated identities and Roles managements
[13].
V. CONCLUSION
The potential value of mobile based cloud applications has
opened the door for different security issues. The greater the
bond between the user and the service provider is one of the
approaches to reduce security breach. This paper made a study
towards challenges towards mobile cloud computing and
mechanisms to handle that. IT Security specialists must work
towards to identify practical ways to protect security and
privacy of mobile users.
REFERENCES
[1] Grobaur, B., Walloschek T., Stoker E.,(2011). Understanding Cloud
Computing Inerabilities. Security and Privacy. IEEE, Vol.9,pp 50.
[2] Das Gupta et.al. Cloud computing based projects using distributed
architecture, 201,PHI
[3] Eystein Mathisen. Securit Challenges and Solutions in Cloud
Computing, in:
[4] International Conference on Digital Ecosystems and Technologies,
IEEE DEST 2001, 2011.p.208-212.
[5] Farzad Sabahi. Cloud Computing Security Threats and Responses, in:
IEEE 3rd International Conference on Communication software and
Networks(ICCSN), May 2011.p.245-249.
[6] Kresimir Popovic and Zeljko Hocenski. Cloud computing security
issues and challenges, in: MIPRO, 2010 proceedings of the 33rd
International Convention, 2010.p.344-39.
[7] Akhil Bhel, Emerging Security Challenges in Cloud Computing.
Information and Communication Technologies, in: 2011 World
Congress on, Mumbai, 2011.p.217-222.
[8] Chang-Lung Tsai and Uei-Chin Li, Information Security of Cloud
Computing for Enterprises, Advances on Information Service Sciences.
Vol. 3, No.1, pp. 132-12, Feb 2011.
[9] S. Subashini and V. Kavitha, A survey on security issues in service
delivery models of cloud computing., Journal of Network and computer
Applications, Vol. 3, No .1. Jul, 2010.
[10] “Security Guidance for Critical Areas of Focus in Cloud Computing”,
April 2009, presented by Cloud Security Alliance(CSA).
[11] P.Vogt, F. Nentwich, N. jovanovic, E. Kirda, C.Kruegel, and G.
Vigna.,(2014), cross Site Scripting Prevention with Dynamic Data
Tainting and Static Analysis. In proceedings of the Network and
Distributed System.
[12] Heiser, Jay and Mark Nicolett: Assessing the security risks of cloud
computing Technical Report G00157782, Gartner Research, June 2008.
[13] http:/www.cloudcompetencecenter.com/understanding/taxonoy cloud
computing Security
[14] Nida, Pinki, Harsh Dhiman, 2014. A survey on Identity and Access
Management in Cloud Computing. In Proceeding of International
Journal of Engineering & Technology (IJERT).

More Related Content

Similar to Challenges and Mechanisms for Securing Data in Mobile Cloud Computing

SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
acijjournal
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms
IJECEIAES
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 

Similar to Challenges and Mechanisms for Securing Data in Mobile Cloud Computing (20)

Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosSingle Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using Kerberos
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
 
G0314043
G0314043G0314043
G0314043
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
 

More from ijcnes

Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining TechniquesHolistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
ijcnes
 
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic VehiclesSecured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
ijcnes
 

More from ijcnes (20)

A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...
 
Economic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian EconomyEconomic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian Economy
 
An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...
 
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
 
Challenges of E-government in Oman
Challenges of E-government in OmanChallenges of E-government in Oman
Challenges of E-government in Oman
 
Power Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage SystemPower Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage System
 
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining TechniquesHolistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
 
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
 
Feature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image RetrievalFeature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image Retrieval
 
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
 
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
 
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic VehiclesSecured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
 
Virtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor NetworksVirtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor Networks
 
Mitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 FactorizationMitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 Factorization
 
An analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining TechniquesAn analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining Techniques
 
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
 
Priority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNPriority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSN
 
Semantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based SystemSemantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based System
 
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
 

Recently uploaded

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 

Recently uploaded (20)

Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 

Challenges and Mechanisms for Securing Data in Mobile Cloud Computing

  • 1. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.93-95 ISSN: 2278-2400 93 Challenges and Mechanisms for Securing Data in Mobile Cloud Computing T.Amutha1 S.Balaji2 B.Megasri 3 1,3 Research scholar,PG & Research Dept of Computer science, D.B.Jain (Autuonomous), Chennai, India 2 Associate professorPG & Research Dept of Computer science, D.B.Jain (Autuonomous), Chennai, India Email : amutha345@gmail.com Abstract-Cloud computing enables users to utilize the services of computing resources. Now days computing resources in mobile applications are being delivered with cloud computing. As there is a growing need for new mobile applications, usage of cloud computing can not be overlooked. Cloud service providers offers the services for the data request in a remote server. Virtualization aspect of cloud computing in mobile applications felicitates better utilization of resources. The industry needs to address the foremost security risk in the underlying technology. The cloud computing environment in mobile applications aggravated with various security problems. This paper addresses challenges in securing data in cloud for mobile Cloud computing and few mechanisms to overcome. Keywords- Cloud computing , data security, RSA, cryptography, email security. I. INTRODUCTION Cloud computing provides uncountable benefits to mobile applications of small size to larger size. In order to extend collaboration and innovation, business of all sizes deploys on mobile cloud computing. Use of cloud computing for mobile applications enables business volatility into single domain in addition to increasing technology effectiveness without increasing operational cost. With the support of cloud computing, mobile applications scale up on demand IT capacity and also has ability for managing large data sets. The use of cloud computing increasing day, the end users and the service providers are able to utilize the cloud resources with less cost and easily without owning all the resource needed. However, the services of cloud computing is having many problems associated with it. The most common is security. Since from last few years, the problems like security, authentication, privacy preservation, access control etc studied more by various researches[1]. CLOUD computing” implies access to isolated computing services suggested by third parties via a TCP/IP connection to the public internet. It is internet based development and use of computer technology. Public cloud, Private cloud and Hybrid cloud, which combine both public and private clouds are types of cloud computing [2]. A. Public cloud: Public cloud provides scalable, dynamically provisioned, virtualized recourse available over the internet form an offsite third party provider. Think Grid is a company that provides multi tenant architecture for supplying services such as Hosted Desktops. Other popular cloud vendors include Salesforce.com, Amazon EC2 and Flexi Scale. B. Private cloud: It is providing hosted services on the private networks. This type of cloud is used by large companies and allows their corporate network and data center administrators to effectively become in house service providers. C. Hybrid cloud: It combines resources from both internal external providers and so it becomes the most popular choice for enterprises. It is comprise of two or more than two clouds. There are three service models in cloud computing Software as-a-Service (SaaS), Platform as a-Service (PaaS) and Infrastructure as-a- service (IaaS). II. LITERATURE SUPPORT The key security issues concerned with cloud computing are being analyzed in the work of Eystein Mathisen [3]. Farzad Sabahi [4] discussed about the issues such as reliability and availability for cloud computing. The requirements and challenges that are faced by cloud service providers during cloud engineering are being the part of paper by Popovi and Hocenski [5]. Akhil Bhel [6] explores the applications to secure the cloud infrastructure and their drawbacks, Chang- lung Tsai et al. [7] proposed a mechanism that was not only focused on find out some solutions, but also focused on develop some feasible information security techniques or products for the application and service of cloud computing. Cloud service users need to be vigilant in understanding the risks of data breaches in the new environment. S. Subashini et al. [1] proposed a survey of the different security risks that pose a threat to the cloud. III. CHALLENGES BEHIND SECURITY BREACH CLOUD BASED MOBILE COMPUTING ENVIRONMENT A. Trust related As there is n o means to access the mobile service provider’s and cloud service provider’s security level, users and stakeholders have no ability to measure the security level. B. Loss of data related The unaddressed issue to manage the loss of cryptographic management information can bring great damages to data leakage as well as data loss. C. Data Integrity and confidentiality related As The nature of cloud environment is based on virtualization feature, different mobile applications users share the same
  • 2. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.93-95 ISSN: 2278-2400 94 infrastructure which may lead to threat to dataintergrity and confidentiality. D. Data protection Inconsistency related The decentralized nature of mobile cloud architecture may avenue threat to protection inconsistency in the manner in which access restricted by one module may be granted by smother. E. CSA observations “Cloud Security Alliance” (CSA)[9] discovered the top six security threats to cloud computing a Account, service and traffic hijacking,Unidentified risk profile,data leakage,abuse use of cloud computing,Malicious insiders, API insecure F. Networking Perspective threats 1) XSS Attacks:- There are two kinds of XSS attacks. There are Stored XSS and Reflected XSS. In Stored XSS, the noxious code is stored permanently in an asset handled by web application. On the other hand, in Reflected XSS, the noxious code is not stored permanently. Indeed it is instantly returned back to the client [10]. 2) Sniffer Attacks:- These kinds of assaults are propelled by applications which can catch packets streaming in a network. If the information that is being exchanged through these packets are not encrypted, it can be perused. A sniffer program, through the network interface card (NIC) gat information or traffic attached to different frameworks on the network additionally gets recorded. 3) SQL Injection Attacks:- A harmful code is embedded into a standard SQL query. Therefore attacker gets an illicit access to a database. Attacker is capable to access or change some sensitive information of any cloud user or organization. 4) Man-in-the-Middle Attacks:- In such an assault, an intruder tries to meddle in a continuous discussion between sender and receiver to infuse false data and to have knowledge of the critical information exchange between them. 5) Distributed Denial of Service (DDoS) Attacks:- DDoS attack makes use of many machines and internet connections. Attacker uses a group of agents to send DDoS attack commands repeatedly to the target system. Sudden traffic can lead to load the website very slowly to their intended users. Sometimes this traffic is so high that it shuts down the site completely. 6) Cookies poisoning In order to access of an intruder to a webpage, it involves changing or altering the contents of cookie. User identity related credentials like username and password etc., are unauthorized user. G. Threats behind cloud virtualization Numerous bugs have been discovered in all prominent VMMs that permit getting least as of g into the host OS. All virtualization software at least as of now can be abused b harmful clients to sidestep certain security confinements. Virtual machine instance isolation guarantees that diverse instances running on the same physical machines are isolated from one another. Nonetheless, offering perfect is not possible by current VMMs.Every client utilizes his identity for accessing cloud services. A major issue is unauthorized access to cloud asses and applications. A virulent element can imitate a real client and make use of cloud services. Numerous such malevolent elements acquire the cloud assets prompting un- accessibility of a service for real clients. Likewise it may happen that the client crosses his limit at time of service utilization in the cloud environment. This cloud be regarding access to safe zone in memory. IV.MECHANISMS TO HANDLE THREATS a) Best security practices need to be implemented for installation and configuration on mobile cloud environment. Unauthorized changes and action needs to be monitored periodically. Strong authentication and access control needs to be enforced. Clients can impose service level agreement (SLA) for patching, regular scan for vulnerability and perform consistent audits. b) In order to handle Invective and Wicked Use of mobile Cloud Computing the registration and validation process must be full proof. Thorough monitoring of network traffic and credit card transactions needs to be done. Users can also analyze public prohibition list for someone’s network block. c) Monitor security model of interfaces provided by cloud supplier for better Defending Unprotected Application Programming Interfaces (APIs). Ensuring robust authentication and access control can be effective during encrypted transmission and understanding the dependence chain related to APIs. d) Users can make use of strong two factor authentication technique as per requirements, and utilize proactive checking to recognize unauthorized activities. An alternate helpful venture to take is to understand policies of cloud provider and SLAs. e) There is a need to defend information loss with the mechanism. Successful measures are to encrypt and ensures integrity of information in transmission, analyze protection strong key generation during design and run time. Other possible steps to take are to execute strong key generation, managements, storage, destruction practices, contractually request suppliers to clean persistent media before it will be discharged into the pool. f) A sniffing recognition platform in view of ARP (address resolution protocol) and RTT (round trip time) can be utilized to recognize a sniffing framework running on a network. Use encryption mechanism to protect critical information, add MAC address of the gateway permanently to the ARP instead of IPV6 cache, use IPV4 and make use of SSH instead of Telnet, Secure copy (SCP) instead of FTP. g) Separate IDS is used for every cloud. Information exchange id the mode of working for different IDS over network. In the event when a particular cloud is under assault, the supportive IDS alert the entire system. h) Domain Name System Security Extensions (DNSSEC) diminishes the impact of DNS intimidations. In the situation when these efforts to establish safety turn out to be deficient when there is some malicious connection in between sender and receiver. i) Different techniques such: actualizing letter cover, variable textual styles of the letters used to plain a CAPTCHA, expanding the string length and utilizing a perturbative foundation can be keep intruder away from CAPTCHA breaking. CAPTCHA outline standards have been proposed,
  • 3. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.93-95 ISSN: 2278-2400 95 which will be capable to oppose any assault technique of static optical character recognition (OCR). j) Trust between the Service provider and the customer to be sure whether the management of the Service is trustworthy, and whether there is any risk o insider attacks. This is a major issue and has received strong attention by companies [12]. k) The service providers like Gmail, Yahoo Mail etc., require the username and password to use their services, but they are vulnerable to phishing attacks. IAM can be used to deal with this problem. It is a framework for business process for managing electronic identities. It supports management of multiple digital identities with their roles, authentication, authorization and privileges. Identity management system has different components like Identity authentication, Directory service, Password administration, Access management, User provisioning, Federated identities and Roles managements [13]. V. CONCLUSION The potential value of mobile based cloud applications has opened the door for different security issues. The greater the bond between the user and the service provider is one of the approaches to reduce security breach. This paper made a study towards challenges towards mobile cloud computing and mechanisms to handle that. IT Security specialists must work towards to identify practical ways to protect security and privacy of mobile users. REFERENCES [1] Grobaur, B., Walloschek T., Stoker E.,(2011). Understanding Cloud Computing Inerabilities. Security and Privacy. IEEE, Vol.9,pp 50. [2] Das Gupta et.al. Cloud computing based projects using distributed architecture, 201,PHI [3] Eystein Mathisen. Securit Challenges and Solutions in Cloud Computing, in: [4] International Conference on Digital Ecosystems and Technologies, IEEE DEST 2001, 2011.p.208-212. [5] Farzad Sabahi. Cloud Computing Security Threats and Responses, in: IEEE 3rd International Conference on Communication software and Networks(ICCSN), May 2011.p.245-249. [6] Kresimir Popovic and Zeljko Hocenski. Cloud computing security issues and challenges, in: MIPRO, 2010 proceedings of the 33rd International Convention, 2010.p.344-39. [7] Akhil Bhel, Emerging Security Challenges in Cloud Computing. Information and Communication Technologies, in: 2011 World Congress on, Mumbai, 2011.p.217-222. [8] Chang-Lung Tsai and Uei-Chin Li, Information Security of Cloud Computing for Enterprises, Advances on Information Service Sciences. Vol. 3, No.1, pp. 132-12, Feb 2011. [9] S. Subashini and V. Kavitha, A survey on security issues in service delivery models of cloud computing., Journal of Network and computer Applications, Vol. 3, No .1. Jul, 2010. [10] “Security Guidance for Critical Areas of Focus in Cloud Computing”, April 2009, presented by Cloud Security Alliance(CSA). [11] P.Vogt, F. Nentwich, N. jovanovic, E. Kirda, C.Kruegel, and G. Vigna.,(2014), cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In proceedings of the Network and Distributed System. [12] Heiser, Jay and Mark Nicolett: Assessing the security risks of cloud computing Technical Report G00157782, Gartner Research, June 2008. [13] http:/www.cloudcompetencecenter.com/understanding/taxonoy cloud computing Security [14] Nida, Pinki, Harsh Dhiman, 2014. A survey on Identity and Access Management in Cloud Computing. In Proceeding of International Journal of Engineering & Technology (IJERT).