SlideShare a Scribd company logo
1 of 16
Download to read offline
Internet
Computing
Laboratory
Security and Privacy Issues with Mobile
Cloud Computing Applications
Category : Mobile Cloud Computing, Mobile Cloud Security, Security and Privacy Issues
1
Present by
MERLEC M.
2016.06.08
Internet
Computing
Laboratory
Outline
2
Introduction
Security and privacy issues in MCC
Potential solution approaches
Related work: Proposed approaches & existing
solutions
Conclusion and open issues
Internet
Computing
Laboratory
Introduction
3
⦿ Why we need Mobile Cloud Computing (MCC)?
 To extend the capabilities of mobile devices
 Processing power, Data storage capacity, etc.
 Enable users to execute computational and data-intensive applications on MDs,
 Computation offloading
 Extend battery life,
 Improve reliability, etc.
Cloud computing taxonomy
⦿ Recently several approaches have been proposed to integrate mobile devices
with cloud computing systems.
Cloud Computing
Static Cloud Computing
(Data Center) Mobile Cloud Computing
Infrastructure-based
Mobile Cloud
Infrastructure-less (ad hoc)
Mobile Cloud
Internet
Computing
Laboratory
Motivation and Objective
4
⦿ MCC is based on anytime, anywhere computing paradigm,
 Integrates mobile computing with cloud computing infrastructures.
 Through mobile wireless communication network systems such as cellular network.
⦿ Recently, MCC has attracted significant attention of industries and academia
 Promises to meet the need for richer mobile applications and services
⦿ However, due to the integration of several technologies
 Privacy and Security are big concerns in mobile cloud computing.
⦿ we aimed to investigate on the security and privacy issues related to MCC
 By analyzing these issues from three main perspectives:
 Mobile Device Terminals, Mobile Communication Network and Cloud Infrastructure
Internet
Computing
Laboratory
Mobile Cloud Computing Model Architecture
5
Infrastructure-based Mobile Cloud Computing Model Architecture [2]
MD Software
architecture
(3G, LTE, etc.)
Internet
Computing
Laboratory
Security and privacy issues in MCC
6
Security issues Threats examples
Mobile
Device
terminal
Malware threats
Phishing, Spyware, Surveillance attacks, Botnets,
etc.
Software vulnerabilities
(OS, application software)
-System or input validation errors,
-Buffer overflows, SQL injection,
-Code injection, E-mail injection, etc.
Others (lack of security awareness,
mis-operation)
Users’ data leakage and privacy violation
Mobile
Network
Information leakage or
Malicious attack
 Connectivity heterogeneity
- Wi-Fi, 3G, LTE, Bluetooth, etc.
 Internet
Cloud
Platform
Platform reliability & availability  DOS attacks, side-channel attacks, ...
 Shared technology  shared dangers
Data and privacy protection
 Data breaches :
- System vulnerabilities
(Phishing, fraud, and software vulnerabilities)
- Hacked interfaces and APIs
- Compromised credentials and broken authentication
- (Permanent) data loss
Malware Treats
to mobile OS
Internet
Computing
Laboratory
Mobile Malware threats and detection techniques
7
⦿ Malicious behavior and threats of malware [3]
⦿ Classification of mobile malware detection techniques [3].
Internet
Computing
Laboratory
Security and privacy issues : Potential approaches
8
Security issues Potential approaches
Mobile
terminal
Malware threats
Prevention and Detection (signature or anomaly
-based)  CloudAV
Software vulnerabilities
(OS, application software)
-Periodically update the mobile devices’ OS
-Download and installing the system patches
-Checking the software legitimacy and
integrity
Others
(lack of security awareness,
mis-operation)
Regulating the users' behavior
Mobile
Network
Information leakage or
Malicious attack
- Data encryption
- Secure network and communication protocols
Cloud
Platform
Platform reliability Integrating the current security technologies:
-VPN, Authentication and access control
- Key management and data encryption;
-Privacy and data protection, etc.
-Complete backup and recovery solutions
Data and privacy protection
Internet
Computing
Laboratory
Related Work : Proposed approaches & existing
solutions
9
Criminals attack the weakest link to get access to sensitive data
Mobile devices are one of the easiest
paths to sensitive data.
- Outside of the perimeter:
usually outside of an organization’s
control
⦿ [11] Privacy and Data security investigation from enterprise mobility and productivity
management perspective
 Mobile is the new playground for thieves :
How to protect against mobile malware ?
Internet
Computing
Laboratory
Related Work : Proposed approaches & existing
solutions
10
MaaS360 works with Trusteer to detect, analyze and remediate mobile malware in
compromised devices.
 Detect and analyze mobile malware signatures from a continually updated database
⦿IBM MaaS360 Mobile Threat Management
 Enterprise mobility management platform to enable productivity and data protection for the
way people work [12].
Internet
Computing
Laboratory
Related Work : Proposed approaches & existing
solutions
11
[6] Investigates the security and privacy protection in Mobile Healthcare Networks (MHNs)
from the Quality of Protection (QoP) perspective.
MHN applications Mobile healthcare network
Internet
Computing
Laboratory
Related Work : Proposed approaches & existing
solutions
12
Sybil attack detection for MHNs.
⦿ Sybil attack is one of these serious threats to MHNs,
 where Sybil attackers maliciously manipulate a large number of pseudonyms (or identities)
to cheat others.
• E.g. during fitness experience sharing in MHNs, Sybil attackers may repeatedly send the same fitness
experiences to the same users with multiple identities to mislead other users’ opinions and preferences.
Internet
Computing
Laboratory
Related Work : Proposed approaches & existing
solutions
13
Quality of Protection (QoP) in MHNs [6]
Internet
Computing
Laboratory
Related Work : Proposed approaches & existing
solutions
14
A VPN connection to virtual phone
⦿ [7] Proposed a mobile cloud execution framework
 which execute mobile applications in a cloud-based virtualized execution environment,
 with encryption and isolation to protect against eavesdropping from cloud providers.
Internet
Computing
Laboratory
Conclusion and Open issues
15
⦿ In summary, MCC is an emerging computing paradigm
 Integrates cloud computing with mobile computing technologies
 Through mobile communication networks.
 Offers many opportunities to design and develop next generation of distributed
smart and digital convergence solutions
⦿ As discussed, security and privacy are one of big the concerns that need
to be considered with MCC solutions.
 Further researches are necessary in order to address these challenging issues.
Internet
Computing
Laboratory
References
1.Daojing He, Sammy Chan and Mohsen Guiszani, “User Privacy and Data Trustworthiness in Mobile Crowd Sensing”,
IEEE Wireless Communications (Volume:22 , Issue: 1 ), February 2015
2.Fangming Liu et al., “Gearing Resource-Pour Mobile Devices with Powerful Clouds: Architectures, Challenges, and Ap
plications”, IEEE Wireless Communications (Volume:20, Issue 3), June 2013
3.Daojing He, Sammy Chan and Mohsen Guiszani, “Mobile Application Security: Malware Threats and Defenses”, IEEE
Wireless Communications (Volume:22 , Issue: 1 ), February 2015
4.Hui Suo, Zhuohua Liu, Jiafu Wan, Keliang Zhou, “Security and Privacy in Mobile Cloud Computing”, 2013 9th Interna
tional on Wireless Communications and Mobile Computing Conference (IWCMC), Sardinia, 1-5 july 2013
5.D. Huang, X. Zhang ; M. Kang ; J. Luo, “MobiCloud: Building Secure Cloud Framework for Mobile Computing and Co
mmunication”, 2010 Fifth IEEE International SOSE, Nanjing, 4-5 June 2010
6.Kuan Zhang et al., “Security and privacy for mobile healthcare networks: from a quality of protection perspective”,
IEEE Wireless Communications (Volume:22 , Issue: 4 ), August 2015
7. Shih-Hao Hung et al., “An Online Migration Environment for Executing Mobile Applications on the Cloud”, 5th Inter-
nation Conference on Innovative, IEEE 2011
8.Shih-Hao Hung, Chi-Sheng Shih, Jeng-Peng Shieh ∗, Chen-Pang Lee, Yi-Hsiang Huang, “An Online Migration Environ
ment for Executing Mobile Applications on the Cloud”, IEEE 2011
9.Gonzalo Huerta-Canepa, Dongman Lee, “Virtual Cloud Computing Provider for Mobile Devices”, MCS'10 procee-
dings of the 1st ACM Workshop on Mobile Cloud Computing & Services, California, USA
10.IBM Security, “Mobile is the new playground for thieves. How to protect against mobile malware”, White Paper,
IBM Corporation 2016
16

More Related Content

What's hot

Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentationomkar parab
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptJagriti Rai
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing402chandan
 
Introduction to Mobile Cloud Computing
Introduction to Mobile Cloud ComputingIntroduction to Mobile Cloud Computing
Introduction to Mobile Cloud ComputingZainoddin Shaikh
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Harsh Bhanushali
 
Internet Of Things Introduction
Internet Of Things Introduction Internet Of Things Introduction
Internet Of Things Introduction AARYAN GUPTA
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
IoT Architecture
IoT ArchitectureIoT Architecture
IoT ArchitectureNaseeba P P
 
Cloud computing and artificial intelligence
Cloud computing and artificial intelligenceCloud computing and artificial intelligence
Cloud computing and artificial intelligenceFurqan Haider
 
Cloud Computing Project
Cloud Computing Project Cloud Computing Project
Cloud Computing Project Ayush Mukherjee
 

What's hot (20)

Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
IoT
IoTIoT
IoT
 
Big Data & The Cloud
Big Data & The CloudBig Data & The Cloud
Big Data & The Cloud
 
cloud storage
cloud storagecloud storage
cloud storage
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
Introduction to Mobile Cloud Computing
Introduction to Mobile Cloud ComputingIntroduction to Mobile Cloud Computing
Introduction to Mobile Cloud Computing
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
Internet Of Things Introduction
Internet Of Things Introduction Internet Of Things Introduction
Internet Of Things Introduction
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
IoT Architecture
IoT ArchitectureIoT Architecture
IoT Architecture
 
Cloud computing and artificial intelligence
Cloud computing and artificial intelligenceCloud computing and artificial intelligence
Cloud computing and artificial intelligence
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Cloud, Fog & Edge Computing
Cloud, Fog & Edge ComputingCloud, Fog & Edge Computing
Cloud, Fog & Edge Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Project
Cloud Computing Project Cloud Computing Project
Cloud Computing Project
 
AWS and industrial IoT
AWS and industrial IoTAWS and industrial IoT
AWS and industrial IoT
 

Similar to Mobile Cloud Security Issues

Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computingijcnes
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationSecuring Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationIJNSA Journal
 
Data Security in Mobile Cloud Computing A State of the Art Review
Data Security in Mobile Cloud Computing A State of the Art ReviewData Security in Mobile Cloud Computing A State of the Art Review
Data Security in Mobile Cloud Computing A State of the Art ReviewRida Qayyum
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationIJNSA Journal
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
 
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...Rida Qayyum
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...IJERD Editor
 
Security and Privacy of Big Data in Mobile Devices
Security and Privacy of Big Data in Mobile DevicesSecurity and Privacy of Big Data in Mobile Devices
Security and Privacy of Big Data in Mobile DevicesIOSRjournaljce
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computingacijjournal
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingYolanda Ivey
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
 
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACHMOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACHijitcs
 
76 s201913
76 s20191376 s201913
76 s201913IJRAT
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
 

Similar to Mobile Cloud Security Issues (20)

Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationSecuring Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print Authentication
 
Data Security in Mobile Cloud Computing A State of the Art Review
Data Security in Mobile Cloud Computing A State of the Art ReviewData Security in Mobile Cloud Computing A State of the Art Review
Data Security in Mobile Cloud Computing A State of the Art Review
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
 
Project 3
Project 3Project 3
Project 3
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
 
Security and Privacy of Big Data in Mobile Devices
Security and Privacy of Big Data in Mobile DevicesSecurity and Privacy of Big Data in Mobile Devices
Security and Privacy of Big Data in Mobile Devices
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computing
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
A017360104
A017360104A017360104
A017360104
 
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACHMOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
 
76 s201913
76 s20191376 s201913
76 s201913
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Ms3422732277
Ms3422732277Ms3422732277
Ms3422732277
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 

Mobile Cloud Security Issues

  • 1. Internet Computing Laboratory Security and Privacy Issues with Mobile Cloud Computing Applications Category : Mobile Cloud Computing, Mobile Cloud Security, Security and Privacy Issues 1 Present by MERLEC M. 2016.06.08
  • 2. Internet Computing Laboratory Outline 2 Introduction Security and privacy issues in MCC Potential solution approaches Related work: Proposed approaches & existing solutions Conclusion and open issues
  • 3. Internet Computing Laboratory Introduction 3 ⦿ Why we need Mobile Cloud Computing (MCC)?  To extend the capabilities of mobile devices  Processing power, Data storage capacity, etc.  Enable users to execute computational and data-intensive applications on MDs,  Computation offloading  Extend battery life,  Improve reliability, etc. Cloud computing taxonomy ⦿ Recently several approaches have been proposed to integrate mobile devices with cloud computing systems. Cloud Computing Static Cloud Computing (Data Center) Mobile Cloud Computing Infrastructure-based Mobile Cloud Infrastructure-less (ad hoc) Mobile Cloud
  • 4. Internet Computing Laboratory Motivation and Objective 4 ⦿ MCC is based on anytime, anywhere computing paradigm,  Integrates mobile computing with cloud computing infrastructures.  Through mobile wireless communication network systems such as cellular network. ⦿ Recently, MCC has attracted significant attention of industries and academia  Promises to meet the need for richer mobile applications and services ⦿ However, due to the integration of several technologies  Privacy and Security are big concerns in mobile cloud computing. ⦿ we aimed to investigate on the security and privacy issues related to MCC  By analyzing these issues from three main perspectives:  Mobile Device Terminals, Mobile Communication Network and Cloud Infrastructure
  • 5. Internet Computing Laboratory Mobile Cloud Computing Model Architecture 5 Infrastructure-based Mobile Cloud Computing Model Architecture [2] MD Software architecture (3G, LTE, etc.)
  • 6. Internet Computing Laboratory Security and privacy issues in MCC 6 Security issues Threats examples Mobile Device terminal Malware threats Phishing, Spyware, Surveillance attacks, Botnets, etc. Software vulnerabilities (OS, application software) -System or input validation errors, -Buffer overflows, SQL injection, -Code injection, E-mail injection, etc. Others (lack of security awareness, mis-operation) Users’ data leakage and privacy violation Mobile Network Information leakage or Malicious attack  Connectivity heterogeneity - Wi-Fi, 3G, LTE, Bluetooth, etc.  Internet Cloud Platform Platform reliability & availability  DOS attacks, side-channel attacks, ...  Shared technology  shared dangers Data and privacy protection  Data breaches : - System vulnerabilities (Phishing, fraud, and software vulnerabilities) - Hacked interfaces and APIs - Compromised credentials and broken authentication - (Permanent) data loss Malware Treats to mobile OS
  • 7. Internet Computing Laboratory Mobile Malware threats and detection techniques 7 ⦿ Malicious behavior and threats of malware [3] ⦿ Classification of mobile malware detection techniques [3].
  • 8. Internet Computing Laboratory Security and privacy issues : Potential approaches 8 Security issues Potential approaches Mobile terminal Malware threats Prevention and Detection (signature or anomaly -based)  CloudAV Software vulnerabilities (OS, application software) -Periodically update the mobile devices’ OS -Download and installing the system patches -Checking the software legitimacy and integrity Others (lack of security awareness, mis-operation) Regulating the users' behavior Mobile Network Information leakage or Malicious attack - Data encryption - Secure network and communication protocols Cloud Platform Platform reliability Integrating the current security technologies: -VPN, Authentication and access control - Key management and data encryption; -Privacy and data protection, etc. -Complete backup and recovery solutions Data and privacy protection
  • 9. Internet Computing Laboratory Related Work : Proposed approaches & existing solutions 9 Criminals attack the weakest link to get access to sensitive data Mobile devices are one of the easiest paths to sensitive data. - Outside of the perimeter: usually outside of an organization’s control ⦿ [11] Privacy and Data security investigation from enterprise mobility and productivity management perspective  Mobile is the new playground for thieves : How to protect against mobile malware ?
  • 10. Internet Computing Laboratory Related Work : Proposed approaches & existing solutions 10 MaaS360 works with Trusteer to detect, analyze and remediate mobile malware in compromised devices.  Detect and analyze mobile malware signatures from a continually updated database ⦿IBM MaaS360 Mobile Threat Management  Enterprise mobility management platform to enable productivity and data protection for the way people work [12].
  • 11. Internet Computing Laboratory Related Work : Proposed approaches & existing solutions 11 [6] Investigates the security and privacy protection in Mobile Healthcare Networks (MHNs) from the Quality of Protection (QoP) perspective. MHN applications Mobile healthcare network
  • 12. Internet Computing Laboratory Related Work : Proposed approaches & existing solutions 12 Sybil attack detection for MHNs. ⦿ Sybil attack is one of these serious threats to MHNs,  where Sybil attackers maliciously manipulate a large number of pseudonyms (or identities) to cheat others. • E.g. during fitness experience sharing in MHNs, Sybil attackers may repeatedly send the same fitness experiences to the same users with multiple identities to mislead other users’ opinions and preferences.
  • 13. Internet Computing Laboratory Related Work : Proposed approaches & existing solutions 13 Quality of Protection (QoP) in MHNs [6]
  • 14. Internet Computing Laboratory Related Work : Proposed approaches & existing solutions 14 A VPN connection to virtual phone ⦿ [7] Proposed a mobile cloud execution framework  which execute mobile applications in a cloud-based virtualized execution environment,  with encryption and isolation to protect against eavesdropping from cloud providers.
  • 15. Internet Computing Laboratory Conclusion and Open issues 15 ⦿ In summary, MCC is an emerging computing paradigm  Integrates cloud computing with mobile computing technologies  Through mobile communication networks.  Offers many opportunities to design and develop next generation of distributed smart and digital convergence solutions ⦿ As discussed, security and privacy are one of big the concerns that need to be considered with MCC solutions.  Further researches are necessary in order to address these challenging issues.
  • 16. Internet Computing Laboratory References 1.Daojing He, Sammy Chan and Mohsen Guiszani, “User Privacy and Data Trustworthiness in Mobile Crowd Sensing”, IEEE Wireless Communications (Volume:22 , Issue: 1 ), February 2015 2.Fangming Liu et al., “Gearing Resource-Pour Mobile Devices with Powerful Clouds: Architectures, Challenges, and Ap plications”, IEEE Wireless Communications (Volume:20, Issue 3), June 2013 3.Daojing He, Sammy Chan and Mohsen Guiszani, “Mobile Application Security: Malware Threats and Defenses”, IEEE Wireless Communications (Volume:22 , Issue: 1 ), February 2015 4.Hui Suo, Zhuohua Liu, Jiafu Wan, Keliang Zhou, “Security and Privacy in Mobile Cloud Computing”, 2013 9th Interna tional on Wireless Communications and Mobile Computing Conference (IWCMC), Sardinia, 1-5 july 2013 5.D. Huang, X. Zhang ; M. Kang ; J. Luo, “MobiCloud: Building Secure Cloud Framework for Mobile Computing and Co mmunication”, 2010 Fifth IEEE International SOSE, Nanjing, 4-5 June 2010 6.Kuan Zhang et al., “Security and privacy for mobile healthcare networks: from a quality of protection perspective”, IEEE Wireless Communications (Volume:22 , Issue: 4 ), August 2015 7. Shih-Hao Hung et al., “An Online Migration Environment for Executing Mobile Applications on the Cloud”, 5th Inter- nation Conference on Innovative, IEEE 2011 8.Shih-Hao Hung, Chi-Sheng Shih, Jeng-Peng Shieh ∗, Chen-Pang Lee, Yi-Hsiang Huang, “An Online Migration Environ ment for Executing Mobile Applications on the Cloud”, IEEE 2011 9.Gonzalo Huerta-Canepa, Dongman Lee, “Virtual Cloud Computing Provider for Mobile Devices”, MCS'10 procee- dings of the 1st ACM Workshop on Mobile Cloud Computing & Services, California, USA 10.IBM Security, “Mobile is the new playground for thieves. How to protect against mobile malware”, White Paper, IBM Corporation 2016 16