+ All Categories
Home > Technology > Securing elastic applications_on_mobile_devices

Securing elastic applications_on_mobile_devices

Date post: 19-Jan-2017
Category:
Upload: firzhan-naqash
View: 242 times
Download: 0 times
Share this document with a friend
21
Securing Elastic Applications on Mobile Devices for Cloud Computing Xinwen Zhang Joshua Schiffman Simon Gibbs Anugeetha Kunjithapatham Sangoh Jeong Presenter :- M.S.F.NAQASH
Transcript
Page 1: Securing elastic applications_on_mobile_devices

Securing Elastic Applications on Mobile Devices

for Cloud Computing

Xinwen ZhangJoshua SchiffmanSimon GibbsAnugeetha KunjithapathamSangoh Jeong

Presenter :- M.S.F.NAQASH

Page 2: Securing elastic applications_on_mobile_devices

Contents

• Introduction• Objective• Overview of Elastic Application• Key Terms• Challenges• ThreatModels • Related Works• Conclusion

Page 3: Securing elastic applications_on_mobile_devices

Introduction

• Cloud Computing Utility computing where resources are

provided as a service over the internet.• Enterprise consumers – Real Benefiters• End Users - ??

Page 4: Securing elastic applications_on_mobile_devices

Objective

Design elastic applications to augment the resource constrained platforms with elastic computing resources from the cloud.

Targeted for Consumer Electronic devices

Page 5: Securing elastic applications_on_mobile_devices

Overview of Elastic Application

Page 6: Securing elastic applications_on_mobile_devices

Key Terms

• Weblets - Partitions of an Elastic Application. - Functions Independently - Communicate with each other - Reasonable Amount of Data dependency - Migratable

Page 7: Securing elastic applications_on_mobile_devices

Key Terms

• Device Elasticity Manager - Runs on the Device side. - Maintains the Configuration changes during Run Time. - Contains the Cost Module. - Contains Optimizer.

Page 8: Securing elastic applications_on_mobile_devices

Key Terms

• Cloud Elasticity Service - Cloud Manager

– Oversee Resources. - Application Manager

– Install And Maintain Applications - Cloud Fabric Interface. - Node Manager.

Page 9: Securing elastic applications_on_mobile_devices

Challenges

• New Application Model is needed.• Protocol for Run Time Communication• Cost Objective Functions • Framework has to be transparent• Security And Privacy

.

Page 10: Securing elastic applications_on_mobile_devices

Elastic Framework Architecture

Page 11: Securing elastic applications_on_mobile_devices

Threat Models• Threats to Mobile Devices. - Compromising DEM and Device• Threats to Cloud Platform And Application

Container.- Compromises CES

• Threats to Communication Channels.- Worm & Viruse Attacks

- MITM, Packet Injection, DDOS

• Framework has to be transparent• Security And Privacy

.

Page 12: Securing elastic applications_on_mobile_devices

Security Objectives

• Trustworthy weblet containers.• Authentication And Secure Session Management• Authorization & Access Control• Logging And Auditing

.

Page 13: Securing elastic applications_on_mobile_devices

Authentication And Secure Session Management

• Secure Installment of Elastic Applications- Binaries of Weblets.- UI Components.- Metadata encoded in to Manifest- SHA1 value of binaries

• Part of the weblets can be installed in CES..

Page 14: Securing elastic applications_on_mobile_devices

Authentication Between Weblets

• Weblets residing in cloud and consumer device have to be authenticated prior to communication.

.

Page 15: Securing elastic applications_on_mobile_devices

• Weblets residing in cloud and consumer device have to be authenticated prior to communication.

.

Page 16: Securing elastic applications_on_mobile_devices

Secure Migration

Page 17: Securing elastic applications_on_mobile_devices

Authorization of Weblets

• Deals with accessing the authorized web servers from the cloud.

• Two type of keys are obtained while logging in

- Application Session Key (ask)- Application Secret Key (ass)

• These keys are shared in 4 different ways.

Page 18: Securing elastic applications_on_mobile_devices

Authorization of Weblets ….

• Shared User credential.• Shared Session Information• Use Session Information Only On device

weblet• oAuth-like

Page 19: Securing elastic applications_on_mobile_devices

Related Works

• CloneCloud.• Trusted Cloud Computing Paltform• Cyber Foraging

Page 20: Securing elastic applications_on_mobile_devices

Conclusion

• Proposes an elastic application framework with new application model and elasticity Infrastructure.

• Further analyses the impending threats to the framework and the alternatives to be considered.

• Another important aspect is about the authentication and secure communication between weblets.

Page 21: Securing elastic applications_on_mobile_devices

Thank You


Recommended