privacy & security of mobile cloud computing (mcc) security and privacy protection services can...
Post on 23-Apr-2018
217 Views
Preview:
TRANSCRIPT
Privacy & Security of MobileCloud Computing (MCC)
Manmohan ChaturvediPrincipal Advisor Research & Technology
DevelopmentBeyond Evolution Tech Solutions Pvt. Ltd.
MOBILE COMPUTING CHALLENGES
Mobile devices being battery powered, havelimited processing power, low storage, lesssecurity, unpredictable Internet connectivity, andless energy
The aforementioned limitations of mobile devicesare always obstacles for computationallyintensive and storage demanding applications ona mobile
MOBILE CLOUD COMPUTING (MCC)PARADIGM
To augment the capability, capacity and batterytime of the mobile devices, computationallyintensive and storage demanding jobs should bemoved to cloud
Careful planning is required before offloading thejobs on a cloud server by considering the networkconditions and communication overhead to makeoffloading beneficial for mobile users
NEEDED ECO-SYSTEM
There is a need for a lightweight secureframework that provides security with minimumcommunication and processing overhead onmobile devices
The security and privacy protection services canbe achieved with the help of secure cloudapplication services
In addition to security and privacy, the securecloud application services provide the usermanagement, key management, encryption ondemand, intrusion detection, authentication, andauthorization services to mobile users
NEEDED ECO-SYSTEM
There is a need for a secure communicationchannel between cloud and the mobile device
The most challenging aspects in MCC areguaranteeing user privacy and the provision ofmobile application security that uses cloudresources.
MOBILE CLOUD COMPUTING ARCHITECTURE (A.N. KHANET AL.,12)A.N. KHAN ET AL. / FUTURE GENERATION COMPUTER SYSTEMS(DOI:10.1016/J.FUTURE.2012.08.003
MODEL FOR PROPOSED RESEARCH
Zhou and Huang proposed a privacy preservingframework called Privacy Preserving CipherPolicy Attribute-Based Encryption (PP-CP-ABE)for lightweight mobile devices. (Z. Zhou, D.Huang, Efficient and secure data storageoperations for mobile cloud computing, IACRCryptology ePrint Archive: 185, 2011)
The proposed scheme offloads the processing andstorage intensive encryption and decryptionoperations on cloud without revealing anyinformation about data contents and securitykey.
LAYOUT OF COMMUNICATION
Mobile End Low End with limited
power andComputational ability
WAP Gateway Act as a bridge between
WAP protocol andHTTP/HTTPS protocol.
Cloud Server Server end, highly
efficient for computationand memory rich.
WORK ON MOBILE END
Application perspective for mobile end: Lightweight Protects user data in device. Check any unauthorized attempt of accessing data
within the device Application perspective for remote end: Ability to communicate securely. Can authenticate remote servers.
SECURE ROUTING PROTOCOL
Ability for authenticating user. Ability to maintain trust services. Handles High level Computations on server side. Highly scalable and easy to integrate with
previous technologies. Maintains the integrity of data.
WORK ON SERVER END
Provide authentication. User data to be stored in encrypted form. Supports virtualization. Cross checks the identity of the user. Validates the data integrity .
PHASE 1 OF RESEARCH
To analyze patterns of threats and attacksbetween mobile device to WAP gateway.
Finding the efficient way of authentication byintroducing suitable change in routing protocols.
Maintain a trust service between user and serverside. Using digital signatures and an interdependency
model.
PHASE 2 OF RESEARCH
Public Key Infrastructure will be modeled andhigh level computation will be performed towardsserver side.
To validate the usefulness and the efficiency ofthe approach. Simulations will provide the efficiency parameter. Comparison of this developed approach with the
existing approaches.
CONCLUDING REMARKS
The proposed research would attempt to leveragethe strengths of Mathematics and ElectricalEngineering departments at IIT Delhi
Any collaboration on the proposed research canbe suitably coordinated by our company ‘BeyondEvolution Tech Solutions Pvt Ltd’
top related