ijirsm poornima km a survey on security circumstances for mobile cloud computing

4

Click here to load reader

Category:

Documents


0 download

TRANSCRIPT

Page 1: IJIRSM Poornima KM a Survey on Security Circumstances for Mobile Cloud Computing

ISSN: XXXX-XXXX Volume X, Issue X, Month Year

A Survey on Security Circumstances for Mobile

Cloud Computing

Poornima K M

Dept of Computer Science and Engineering

BTL Institute of Technology

Bangalore, India

[email protected]

ABSTRACT: Establishing applications on on-

demand infrastructures rather of building applica-

tions on fixed and rigid infrastructures was provided

by cloud computing provides. By merely exploiting

into the cloud, initiatives can gain fast access to

business applications or infrastructure resources

with decreased Capital Expenditure (CAPEX). The

more and more information is placed into the cloud

by someone and initiatives, security issues begins to

develop and raised. This paper discusses the different

security issues that rise up about how secure the mo-

bile cloud computing environment is.

1. INTRODUCTION Cloud computing means the accessibility of software,

processing power and storage on demand. Its key

features include legerity, decreased Cost, device in-

dependence, dependability (multiple redundant sites),

scalability, security and reduced maintenance. It is

already a permanent fixture of consumer orientated,

services such as email, storage and social media [4].

The chances, allowed by

cloud computing becomes available to initiatives of

all sizes that enables them to deliver more scalable

and resilient services to employees, partners and cus-

tomers at lower cost and with higher business legerity

[1].Mobile cloud computing concerns to the accessi-

bility of cloud computing services in a mobile envi-

ronment. It integrates the elements of mobile net-

works and cloud computing, thereby providing

optimum services for mobile users. In mobile cloud

computing, mobile devices no need to a powerful

configuration (e.g., CPU speed and memory capacity)

since all the data and elaborated computing modules

can be processed in the clouds [2, 5].The more and

more information that is located in the cloud by indi-

viduals and initiatives, the more and more they be-

come vulnerable to attacks and threats the Internet

has to present. The assure of cloud computing to ac-

quire fast access to business applications and boost-

ing their infrastructure resources with decreased

CAPEX put the business world into a more risky

environment. In this paper, we discuss the summary

of cloud computing technology together with the

challenges and predicts cloud computing does not

offer that conventional computing models. The dif-

ferent issues that rises with the emergence of mobile

cloud computing have been described and discussed,

thus drawing and recognizing the security risks the

cloud environment has to offer.

2. CLOUD COMPUTING 2.1 Cloud Services Cloud computing service offerings are generally clas-

sified into three delivery models: the Infrastructure as

a Service (IaaS); the Platform as a Service (PaaS);

and the Software as a Service (SaaS) [1, 3, 4, 6].

Software as a Service (SaaS) offers finish and

completed applications on demand. A single instance

of the software runs on the cloud and services multi-

ple end users or client organizations. It is a model of

software deployment where an application is hosted

as a service provided to customers throughout the

Internet. By excreting the need to install and run the

application on the customer’s own computer, SaaS

facilitates the customer’s loading of software mainte-

nance, ongoing operation, and support.

Page 2: IJIRSM Poornima KM a Survey on Security Circumstances for Mobile Cloud Computing

International Journal of Innovatory research in Science and Management - IJIRSM

ISSN: XXXX-XXXX Volume X, Issue X, Month Year 14

[Fig. 1] Cloud Computing Service Offerings

The provider allots the customer only to use its appli-

cations. Most widely used examples of SaaS include

Gmail, Google Docs, and 144

Platform as a Service (PaaS) extends an operat-

ing system and can allow for every phase of software

development and testing as well as suites of pro-

gramming languages that users can use to develop

their own applications. It allows a set of software and

development tools hosted on the provider’s servers.

Commercial examples include Microsoft Windows

Azure and Google App Engine.

Infrastructure as a Service (IaaS) provides

end users direct access to processing, storage and

other computing resources over the network. It pro-

vides virtual servers with single IP addresses and

blocks of storage on demand Examples of IaaS in-

clude Amazon Elastic Compute Cloud (EC2), Joyent,

Rackspace, and IBM Computing on Demand.

2.2 CLOUD APPLICATION

DEPLOYMENT MODELS Cloud computing architects must take into circum-

stance the three cloud application deployment and

consumption models: public, private, or hybrid

clouds.

Public Clouds: Public clouds are owned and han-

dled by Providers, and applications from different

customers are likely to be combined together on the

cloud’s servers, storage systems, and networks. Pub-

lic clouds are most often hosted aside from customer

precedes, and they provide a way to decrease cus-

tomer risk and cost by providing a flexible, even pro-

visional extension to endeavor infrastructure.

Private Clouds: Private clouds are client dedicat-

ed and are established for the exclusive use of one

client, providing the utmost control over data, securi-

ty, and quality of service. The initiative owns the

infrastructure and has control over how applications

are deployed on it. Private clouds may be deployed in

an initiative datacenter, and they also may be de-

ployed at a co-location facility.

Hybrid Clouds: Hybrid clouds combined both

public and private cloud models. They can help to

provide on-demand, externally provisioned scale. The

power to augment a private cloud with the resources

of a public cloud can be used to assert service levels

in the face of quick workload fluctuations.

2.3 Mobile Cloud Computing Mobile cloud computing refers to the utilization of

cloud computing in combining with mobile devices.

It is a grouping between mobile network and cloud

computing, thereby allowing optimum services for

mobile users. Cloud computing survives when tasks

and data are kept on the internet instead of individual

devices, allowing on-demand access. Applications

are run on a remote server and then sent to the user

[2, 5]. Figure 2 shows an overview of the mobile

cloud computing architecture.

[Fig. 2] Mobile Cloud Computing Architecture

Overview

3. MOBILE CLOUD COM-

PUTING SECURITY Assuring mobile cloud computing user’s privacy and

integrity of data or applications is one of the key is-

sues most cloud providers are given aid. Since mobile

cloud computing is a combining of mobile networks

and cloud computing, the security concerned issues

are then divided into two classes: Mobile network

user’s security; and cloud security [8, 9, 10].

Page 3: IJIRSM Poornima KM a Survey on Security Circumstances for Mobile Cloud Computing

International Journal of Innovatory research in Engineering and Technology - IJIRET

ISSN: XXXX-XXXX Volume X, Issue X, Month Year 15

[Fig. 3] Mobile Cloud Computing Security Architec-

ture Overview

3.1 Mobile Network User’s Security Numerous threats and security vulnerabilities such as

malicious codes are known to the different mobile

devices such as Smart phones, PDAs, cellular

phones, laptops, and the like. Some applications to

these devices can induce privacy issues for mobile

users [10]. There are two main issues referring the

subscriber’s security

Security for mobile applications: The sim-

plest ways to find security threats will be installing

and running security software and antivirus programs

on mobile devices. But since mobile devices are re-

strained with processing and power limitations, pro-

tecting them from these threats could be more diffi-

cult equated to even computers.

Privacy: allowing private information such as

showing your current location and user’s important

information produces scenarios for privacy issues.

For example, the use of location based services

(LBS) provided by global positioning system (GPS)

devices. Threats for displaying private information

could be minimized through selecting and analyzing

the initiative needs and need only assigned services

to be gained and moved to the cloud.

3.2 Securing Information on the

Cloud Individuals and initiative take advantage of the bene-

fits for storing large amount of data or applications

on a cloud. However, issues in terms of their integri-

ty, authentication, and digital rights must be taken

care of [10].

Integrity: Every mobile cloud user must assure the

integrity of their information stored on the cloud.

Every accession they make must me authenticated

and verified. Different approaches in maintaining

integrity for one’s information that is stored on the

cloud is being proposed. For example, every infor-

mation stored by each individual or initiative in the

cloud is tagged or initialized to them wherein they are

the only one to have accession (move, update or de-

lete) such information. Every accession they make

must be authenticated ensuring that it is their own

information and thus confirming its integrity.

Authentication:Different authentication mechanisms

have been represented and suggested using cloud

computing to ensure the data access desirable for

mobile environments. Some uses the open standards

and even supports the integration of several authenti-

cation methods. For example, the use of access or

log-in IDs, passwords or PINS, authentication re-

quests, etc.

Digital rights management: Illegal distribu-

tion and piracy of digital contents such as video, im-

age, and audio, and e-book, programs becomes more

and more popular. Some solutions to protect these

contents from illegal access are implemented such as

provision of encryption and decryption keys to ap-

proach these contents. A coding or decoding platform

must be done before any mobile user can have access

to such digital contents.

4. CONCLUSION Cloud computing applies a substantial assure as a

transformative technology that can change the very

nature of computing specifically to business initia-

tive. It allow on-demand network access to a shared

pool of set up computing resources (e.g., networks,

servers, storage, applications, and services) that can

be quickly provisioned and issued with minimal

management effort or service provider interaction.

Mobile cloud computing is one of mobile technology

trends in the future since it combines the advantages

of both mobile computing and cloud computing,

hence providing optimal services for mobile users.

This paper have talked about security issues with

regard to mobile cloud computing. Assuring mobile

cloud computing user’s privacy and integrity of data

or applications is one of the key issues most cloud

providers are given attending. Since mobile cloud

computing is a combining of mobile networks and

cloud computing, the security concerned issues are

then divided into two classes: mobile network user’s

security; and mobile cloud security.

Page 4: IJIRSM Poornima KM a Survey on Security Circumstances for Mobile Cloud Computing

International Journal of Innovatory research in Science and Management - IJIRSM

ISSN: XXXX-XXXX Volume X, Issue X, Month Year 16

REFERENCES [1] NEC Company, Ltd. and Information and Privacy

Commissioner, Ontario, Canada. “Modeling Cloud

Computing Architecture Without Compromising Pri-

vacy: A Privacy by Design Approach, (2010),

http://www.ipc.on.ca/images/Resources/pbd-NEC-

cloud.pdf..

[2] http://www.smartdevelopments.org/?p=84

.

[3]https://wiki.cloudsecurityalliance.org/guidance/ind

ex.php/Cloud_Computing_Architectural_Framework.

[4] http://andromida.hubpages.com/hub/cloud-

computing-architecture.

[5]http://www.readwriteweb.com/archives/why_clou

d_computing_is_the_future_of_mobile.php.

[6] Sun Microsystems, Inc., “Introduction to Cloud

Computing Architecture”, White Paper, 1st Edition,

(2009)June.

[7] P. Mell and T. Grance, “The NIST Definition of

Cloud Computing”, National Institute of Standards

and Technology, Information Technology Laborato-

ry, Version 15, 10-7-09 (2009).

[8] D. Huang, Z. Zhou, L. Xu, T. Xing and Y. Zhong,

“Secure Data Processing Framework for Mobile

Cloud Computing”, IEEE INFOCOM 2011 Work-

shop on Cloud Computing, 978-1-4244-9920-

5/11/$26.00 ©2011IEEE, (2011) pp. 620-624.

[9] S. Morrow, “Data Security in the Cloud”, Cloud

Computing: Principles and Paradigms, Edited by

RajkumarBuyya, James Broberg and Andrzej

Goscinski Copyright 2011 John Wiley & Sons, Inc.,

(2011) pp.