Secure mobile cloud computing

نویسندگان

چکیده

Cloud computing is recognized as a cost-effective paradigm in outsourcing, where infrastructure, platforms, and software can be offered service. However, problems related to privacy security are still challenging, especially mobile cloud systems. end users now using systems for applications that fall under the data intensive paradigm, such skyline queries, streaming information relays, crowdsourced disaster management. above shift has opened new research directions security, interoperability, sustainable development, many other areas. With advent of fifth generation cellular telephony (5G), edge starting merge seamlessly with computing. The 5G radio access network offers some novel features, slicing, possibility operating nonpublic networks, example, within factory, but this context it may even more interesting natively supports associated each base station, core effectively defined networking supported infrastructure. This special issue presents four papers, which encompass practical approaches advance all aspects handling large amounts secure manner cloud, nodes, cloud-connected clusters MANETs wireless sensor networks. In first paper, Bartuzi Trokielewicz tackle challenge authentication devices1 through developing biometric methodology based on images human hand generated multiple light spectra. following three types devices were used recording image data: (i) visible light—a digital camera predetermined sensitivity, (ii) near-infrared—a custom-built device customized Logitech Quickcam Messenger experiments presented (iii) thermal cameras. features extracted from these then experimental analysis verification potential impact fusing different recognition thus also accuracies. Secure processing, transfer, task execution require optimization resource utilization. Such include power consumption, well communication protocols, remote deployment services. Nawrocki et al. their paper2 developed an agent-based adaptive system enabling services device, device's operation, including aspects, analyzed. They machine learning (ML) algorithms allocation tasks conventional resources. most aspect model online procedures ML methods real-time modification training sets during algorithm collected knowledge. makes approach distinctly models, process offline must updated short time intervals order simulate process. Monitoring large-scale distributed networks nodes become really challenging era Facebook, providing various e-services rapid development global trade Detection anomalies, malicious data, requires scalable centralized databases alerts confirm detect external attacks. On hand, personalization local monitoring detection tools. user redirected fake webpage or service, tricked into revealing sensitive attacker. Liu present model,3 nefarious websites avoid compromise. deployed terminals, servers, convolutional neural authors show efficiency case Low latency, ultra-high speed, high reliability important criteria IoT connectivity future smart grids (5G) potentially solve those reduction number connected sensors keeping optimal coverage reliability. Borgaonkar al.,4 pedagogical describe how grid achieve better when by utilizing mechanisms technology, offloading integral part 5G. survey state art applications, identify requirements low-voltage regulation use case. go develop threat model, discuss specifications come bear We believe papers section will serve reference students, researchers, engineers interested currently working evolving interdisciplinary area security-aware intelligent hope readers find inspiration research. grateful contributors section. thank efforts presentation recent results. would like express our sincere thanks reviewers, who have helped us ensure quality publication. Our editorial management teams Wiley's Concurrency Computation: Practice Experience journal great support throughout entire publication

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Data Storage in Mobile Cloud Computing

In cloud computing highly scalable computing resources are supplied as an outer service through internet on pay-as-usability basis. Portio research [1] estimates that mobile subscribers will reach 6.5 billion by the end of 2012, 6.9 billion by the end of 2013. Due to increasing use of mobile devices the requirement of cloud computing in mobile devices arise, which gave birth to Mobile Cloud Com...

متن کامل

Secure Mobile Cloud Computing and Security Issues

The proliferation of mobile devices, coupled by the increase in their capabilities, have enabled the establishment of a rich mobile computing platform that can be utilized in conjunction with cloud services. In this chapter, we overview the latest mobile computing models and architectures focusing on their security properties. In particular, we study a wide range of threats against the availabi...

متن کامل

Towards secure mobile cloud computing: A survey

Mobile cloud computing is gaining popularity among mobile users. The ABI Research predicts that the number of mobile cloud computing subscribers is expected to grow from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total mobile users) in 2014. Despite the hype achieved by mobile cloud computing, the growth of mobile cloud computing subscribers is still below expectat...

متن کامل

A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems

Cloud computing systems, in which clients rent and share computing resources of third party platforms, have gained widespread use in recent years. Furthermore, cloud computing for mobile systems (i.e., systems in which the clients are mobile devices) have too been receiving considerable attention in technical literature. We propose a new method of delegating computations of resource-constrained...

متن کامل

Consolidated Identity Management System for secure mobile cloud computing

Security issues in cloud computing are shown to be the biggest obstacle that could lower the wide benefits of the cloud systems. This obstacle may be strengthened when cloud services are accessed by mobile devices. Mobile devices could be easily lost or stolen and hence, they are easy to compromise. Additionally, mobile users tend to store access credentials, passwords and other Personal Identi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Concurrency and Computation: Practice and Experience

سال: 2021

ISSN: ['1532-0634', '1532-0626']

DOI: https://doi.org/10.1002/cpe.6528