Security Architecture for Federated Mobile Cloud Computing
نویسنده
چکیده
Mobile cloud computing systems are getting increasingly popular because they can facilitate many new applications, such as opportunistic social computing by smartphone users who happen to be at a scene of importance (e.g., disaster rescue), while possibly uploading compute-heavy tasks to the resource-rich clouds. Federated mobile cloud computing further allows to coordinate and optimize the services to mobile users of different clouds. Accompanying the great deal of opportunities it brings up, federated mobile cloud computing imposes a diverse set of new challenges, especially from a security perspective because the defender needs to cope with a large spectrum of attacks. Example security questions are: How should we better deal with the new dimension of threats that are caused by that smartphones run a huge population of untrusted third-party applications (apps)? How should we monitor the mobile clouds for security purposes? How should we deal with the targeted attackers that attempt to launch attacks against the various credentials used for authentication purposes (e.g., banking)? How should we enhance the privacy of users when a malware breaks into their smartphone (e.g., records of location information?) How should the federated mobile clouds share security information and possibly coordinate their defense activities? In this chapter, we explore the threat model against, and security requirements of, federated mobile clouds computing. We then propose and investigate a comprehensive security architecture, which can seamlessly integrate a set of novel security mechanisms that are tailored to satisfy the security needs of federated mobile cloud computing. Shouhuai Xu Department of Computer Science, University of Texas at San Antonio, One UTSA Circle, San Antonio, TX 78249, e-mail: [email protected] E. Paul Ratazzi Information Directorate, Air Force Research Laboratory, Rome, NY 13441, e-mail: edward.
منابع مشابه
A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملFederated Cloud Security Architecture for Secure and Agile Clouds
Cyber threats against clouds have evolved rapidly. Traditional reactive cyber defense technologies are not effective and sufficient to protect federated clouds. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set of seamlessly integ...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کامل