TAMEC: Trusted Augmented Mobile Execution on Cloud (original) (raw)
Related papers
Towards secure communication for highly scalable mobile applications in cloud computing systems
2011
Cloud computing is a distributed computing model in which clients pay for computing and data storage resources of a third-party cloud provider. Cloud applications can scale up or down almost instantly to meet real-time computational demands. Despite the economic advantages of a pay-on-demand business model, security remains a paramount concern. Cloud applications by nature must store and retain access to a potentially large volume of data. Yet, the consensus among IT organizations is that the cloud provider generally cannot be implicitly trusted, and thus this data should ideally be transmitted and stored in encrypted form. Major challenges exist concerning the aspects of the generation, distribution, and usage of encryption keys in cloud systems, such as the safe location of keys, and the presence of users that tend to connect to contemporary cloud applications using resource-constrained mobile devices in extremely large numbers simultaneously; these characteristics lead to difficulties in achieving efficient and highly scalable key management. In this work, at first, leading models for key distribution are applied to a cloud computing system. The underlying schemes include identity-based encryption, multi-level key management, and data re-encryption. Each model varies in how user keys are stored, exchanged, regenerated , and used; each is analyzed and compared in terms of storage and communication requirements, assessing the impact on tight resource constraints in a mobile device environment; these constraints include costly wireless data usage, limited mobile processing power, and limited battery life. The analysis is applicable in light of current trends towards mobile devices communicating with interactive cloud applications. Next, a model for key distribution based on the principle of dynamic data re-encryption is modified and applied to a cloud computing system in a unique way. The proposed cloud-based re-encryption model is secure, efficient, and scalable in a cloud computing context, as keys are managed by the client for trust reasons, processor-intensive data re-encryption is handled by the cloud provider, and key redistribution is minimized to conserve communication on mobile devices. A versioning history mechanism effectively manages keys for a continuously changing user population. Finally, an implementation on commercial mobile and cloud platforms is used to validate the performance of the models.
A New Secure Mobile Cloud Architecture
2015
The demand and use of mobile phones, PDAs and smart phones are constantly on the rise as such, manufacturers of these devices are improving the technology and usability of these devices constantly. Due to the handy shape and size these devices come in, their processing capabilities and functionalities, they are preferred by many over the conventional desktop or laptop computers. Mobile devices are being used today to perform most tasks that a desktop or laptop computer could be used for. On this premise, mobile devices are also used to connect to the resources of cloud computing hence, mobile cloud computing (MCC). The seemingly ubiquitous and pervasive nature of most mobile devices has made it acceptable and adequate to match the ubiquitous and pervasive nature of cloud computing. Mobile cloud computing is said to have increased the challenges known to cloud computing due to the security loop holes that most mobile devices have.
An Efficient and Secured Framework for Mobile Cloud Computing
In mobile cloud computing, mobile devices can rely on cloud computing and information storage resource to perform computationally intensive operations such as searching, data mining, and multimedia processing. In addition to providing traditional computation services, mobile cloud also enhances the operation of traditional ad hoc network by treating mobile devices as service nodes, e.g., sensing services. The sensed information, such as location coordinates, health related information, should be processed and stored in a secure fashion to protect user's privacy in the cloud. To this end, we present a new mobile cloud data processing framework through trust management and private data isolation. Finally, an implementation pilot for improving teenagers' driving safety, which is called Focus Drive, is presented to demonstrate the solution.
Trusted Platforms to Secure Mobile Cloud Computing
2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS), 2014
Taking full advantage of the availability of Cloud computing facilities, Mobile Cloud Computing (MCC) is becoming more and more popular as an element of mobile technology. This availability enables mobile users to use the cloud infrastructure to overcome the limitations of mobile technology; namely limited data storage, processing power and battery life. With the increasing use of mobile cloud computing, security issues remain a challenge. This paper investigates some available trusted platforms in order to pinpoint the question on how to secure the MCC under trusted platforms. This investigation comprises an overview of the security aspects of Trusted Platforms including Secure Elements (SE), Host Card Emulation (HCE), Trusted Execution Environment (TEE), and Trusted Platform Module (TPM). In addition, it shows how these platforms can be suitable for securing mobile Cloud computing.
Secure Mobile-Cloud Framework - Implementation on the Mobile Device
2013
Secure Mobile-Cloud is a framework proposed to secure the data transmitted between the components of a mobile cloud application. In addition, the framework, takes into account the following aspects: 1) the users options regarding the security level required for private data and 2) the device energy consumption. The framework includes several distributed components. Some of these components are deployed on the mobile device and some of them in Cloud. This paper is focused on the implementation of the Secure Mobile-Cloud framework components on the mobile device. A proof of concept Android prototype is proposed.
IJERT-Creating Trust between Mobile and Cloud using Progressive Encryption
International Journal of Engineering Research and Technology (IJERT), 2015
https://www.ijert.org/creating-trust-between-mobile-and-cloud-using-progressive-encryption https://www.ijert.org/research/creating-trust-between-mobile-and-cloud-using-progressive-encryption-IJERTV4IS090637.pdf Cloud computing is providing resources advent over a network which is benefiting almost all IT services. With software as a service and storage as service more and more enterprise applications are shifting towards Cloud platform making Smartphones their thin Clients and thus promoting Mobile Cloud Computing. Mobile cloud computing is a computing of data and storage of data outside the mobile device. The data storage and data processing happens on the cloud not on the mobile device. Thus mobile cloud computing provides the use of technology smartly and reserving the scarce resources of mobile. But as more and more sensitive information is passing the Mobile phones, the need of securing the information and creating a trust between the Mobile user and the Storage Cloud is emerging. This leads to the area to be focused that is security of mobile data, offloading to cloud for storage and processing. There are many encryption techniques used by researchers such as RSA, DES and AES for security purpose. These techniques have some loopholes. So, we are proposing a framework which will use ECC technique with progressive encryption to provide better security to the mobile data on cloud without creating much overhead on the Smartphone.
IJERT-Secure And Disseminate Cloud Data Over A Mobile
International Journal of Engineering Research and Technology (IJERT), 2012
https://www.ijert.org/secure-and-disseminate-cloud-data-over-a-mobile https://www.ijert.org/research/secure-and-disseminate-cloud-data-over-a-mobile-IJERTV1IS10212.pdf Cloud computing is one of the emerging technologies that will lead to the next generation of Internet. Cloud computing is a way of computing, via the Internet, that broadly shares computer resources instead of using software or storage on a local PC. Cloud computing is an outgrowth of the ease-of access to remote computing sites provided by the Internet. Cloud computing platforms provide easy access to a company's high-performance computing and storage infrastructure through web services. Cloud computing is emerging as one of the most important branch for providing seamless applications on mobile devices. In this paper we design an archive mechanism that integrates cloud storage, hybrid cryptography, and digital signatures to provide security requirements for data storage of mobile phones. Our mechanism not only can avoid malicious attackers from illegal access but also can share desired information with targeted friends by distinct access rights.
SeC2: SECURE MOBILE SOLUTION FOR DISTRIBUTED PUBLIC CLOUD STORAGES
Proceedings of the 2nd International Conference on Cloud Computing and Services Science, 2012
Cloud Computing is an emerging technology that attracts increasing attention as a high-performance and low-cost solution to process arbitrarily huge data and share them among different users and organizations. Nonetheless, this technology rises new questions on security and privacy, especially when working with highly confidential data. Existing solutions offering end-to-end security such as TLS are of no help since the stored data is only encrypted during their transport. Therefore, a message-level security must at least be applied to protect those data during and after the storing process. This paper investigates a novel solution for secure data storage in the cloud. It presents a security concept allowing each client to encrypt outgoing data on one's mobile device and share it among a defined user group while using a seamless service provision. As our concept is used transparently as well as independently on each device, users keep full control over their data and almost no changes on the existing infrastructure of cloud storage services are needed.
Mobile Cloud Computing and Its Security and Privacy Challenges
Concepts, Methodologies, Tools, and Applications
Mobile cloud computing has grown out of two hot technology trends, mobility and cloud. The emergence of cloud computing and its extension into the mobile domain creates the potential for a global, interconnected mobile cloud computing environment that will allow the entire mobile ecosystem to enrich their services across multiple networks. We can utilize significant optimization and increased operating power offered by cloud computing to enable seamless and transparent use of cloud resources to extend the capability of resource constrained mobile devices. However, in order to realize mobile cloud computing, we need to develop mechanisms to achieve interoperability among heterogeneous and distributed devices. We need solutions to discover best available resources in the cloud servers based on the user demands and approaches to deliver desired resources and services efficiently and in a timely fashion to the mobile terminals. Furthermore, while mobile cloud computing has tremendous potential to enable the mobile terminals to have access to powerful and reliable computing resources anywhere and anytime, we must consider several issues including privacy and security, and reliability in realizing mobile cloud computing. In this chapter, the authors first explore the architectural components required to realize a mobile cloud computing infrastructure. They then discuss mobile cloud computing features with their unique privacy and security implications. They present unique issues of mobile cloud computing that exacerbate privacy and security challenges. They also discuss various approaches to address these challenges and explore the future work needed to provide a trustworthy mobile cloud computing environment.
Trust delegation-based secure mobile cloud computing framework
2023 IEEE International Conference on Emerging Trends in Engineering, Sciences and Technology (ICES&T)
Nowadays, practically everyone has a smartphone with them. These smart devices store several types of personal information, such as images, files, credit card pins, etc., and are used for communication purposes. Consider the possibility that someone could gain access to it without our knowledge. How could they possibly use it? One of the most critical security concerns is data and privacy in terms of stolen data and malicious file behaviour. However, private and delicate data are required for these practical uses. Similarly, connected phones' other weak points are their limited battery life, slow processor speed, and unpatched vulnerabilities. To overcome such limitations, mobile cloud computing (MCC) is introduced, which analyzes data in the cloud and returns the findings to the smartphone. However, MCC increased the effectiveness of several programs. MCC also considered several types of issues, such as real-time communication data confidentiality. Further, safety, speed, and customer satisfaction are the three fundamental parameters of mobile cloud services that will be highlighted in this article. Finally, a model concept is also elaborate for demonstration purposes to employ the trustbased assignment system to enhance safety ratios, showing the perfection of the five-portable cloud computing architecture.