+ All Categories
Home > Documents > Privacy & Security of Mobile Cloud Computing (MCC) security and privacy protection services can be...

Privacy & Security of Mobile Cloud Computing (MCC) security and privacy protection services can be...

Date post: 23-Apr-2018
Category:
Upload: duonglien
View: 217 times
Download: 4 times
Share this document with a friend
17
Privacy & Security of Mobile Cloud Computing (MCC) Manmohan Chaturvedi Principal Advisor Research & Technology Development Beyond Evolution Tech Solutions Pvt. Ltd.
Transcript

Privacy & Security of MobileCloud Computing (MCC)

Manmohan ChaturvediPrincipal Advisor Research & Technology

DevelopmentBeyond Evolution Tech Solutions Pvt. Ltd.

MOBILE COMPUTING CHALLENGES

Mobile devices being battery powered, havelimited processing power, low storage, lesssecurity, unpredictable Internet connectivity, andless energy

The aforementioned limitations of mobile devicesare always obstacles for computationallyintensive and storage demanding applications ona mobile

MOBILE CLOUD COMPUTING (MCC)PARADIGM

To augment the capability, capacity and batterytime of the mobile devices, computationallyintensive and storage demanding jobs should bemoved to cloud

Careful planning is required before offloading thejobs on a cloud server by considering the networkconditions and communication overhead to makeoffloading beneficial for mobile users

NEEDED ECO-SYSTEM

There is a need for a lightweight secureframework that provides security with minimumcommunication and processing overhead onmobile devices

The security and privacy protection services canbe achieved with the help of secure cloudapplication services

In addition to security and privacy, the securecloud application services provide the usermanagement, key management, encryption ondemand, intrusion detection, authentication, andauthorization services to mobile users

NEEDED ECO-SYSTEM

There is a need for a secure communicationchannel between cloud and the mobile device

The most challenging aspects in MCC areguaranteeing user privacy and the provision ofmobile application security that uses cloudresources.

MOBILE CLOUD COMPUTING ARCHITECTURE (A.N. KHANET AL.,12)A.N. KHAN ET AL. / FUTURE GENERATION COMPUTER SYSTEMS(DOI:10.1016/J.FUTURE.2012.08.003

SECURITY SERVICES ON DIFFERENT LAYERS (A.N. KHANET AL.,12)

MODEL FOR PROPOSED RESEARCH

Zhou and Huang proposed a privacy preservingframework called Privacy Preserving CipherPolicy Attribute-Based Encryption (PP-CP-ABE)for lightweight mobile devices. (Z. Zhou, D.Huang, Efficient and secure data storageoperations for mobile cloud computing, IACRCryptology ePrint Archive: 185, 2011)

The proposed scheme offloads the processing andstorage intensive encryption and decryptionoperations on cloud without revealing anyinformation about data contents and securitykey.

ILLUSTRATIVE ARCHITECTURE FOR MCC(A.N. KHAN ET AL.,12)

LAYOUT OF COMMUNICATION

Mobile End Low End with limited

power andComputational ability

WAP Gateway Act as a bridge between

WAP protocol andHTTP/HTTPS protocol.

Cloud Server Server end, highly

efficient for computationand memory rich.

WORK ON MOBILE END

Application perspective for mobile end: Lightweight Protects user data in device. Check any unauthorized attempt of accessing data

within the device Application perspective for remote end: Ability to communicate securely. Can authenticate remote servers.

SECURE ROUTING PROTOCOL

Ability for authenticating user. Ability to maintain trust services. Handles High level Computations on server side. Highly scalable and easy to integrate with

previous technologies. Maintains the integrity of data.

WORK ON SERVER END

Provide authentication. User data to be stored in encrypted form. Supports virtualization. Cross checks the identity of the user. Validates the data integrity .

PHASE 1 OF RESEARCH

To analyze patterns of threats and attacksbetween mobile device to WAP gateway.

Finding the efficient way of authentication byintroducing suitable change in routing protocols.

Maintain a trust service between user and serverside. Using digital signatures and an interdependency

model.

PHASE 2 OF RESEARCH

Public Key Infrastructure will be modeled andhigh level computation will be performed towardsserver side.

To validate the usefulness and the efficiency ofthe approach. Simulations will provide the efficiency parameter. Comparison of this developed approach with the

existing approaches.

CONCLUDING REMARKS

The proposed research would attempt to leveragethe strengths of Mathematics and ElectricalEngineering departments at IIT Delhi

Any collaboration on the proposed research canbe suitably coordinated by our company ‘BeyondEvolution Tech Solutions Pvt Ltd’

Thanks


Recommended