SlideShare a Scribd company logo
Internet
Computing
Laboratory
Security and Privacy Issues with Mobile
Cloud Computing Applications
Category : Mobile Cloud Computing, Mobile Cloud Security, Security and Privacy Issues
1
Present by
MERLEC M.
2016.06.08
Internet
Computing
Laboratory
Outline
2
Introduction
Security and privacy issues in MCC
Potential solution approaches
Related work: Proposed approaches & existing
solutions
Conclusion and open issues
Internet
Computing
Laboratory
Introduction
3
⦿ Why we need Mobile Cloud Computing (MCC)?
 To extend the capabilities of mobile devices
 Processing power, Data storage capacity, etc.
 Enable users to execute computational and data-intensive applications on MDs,
 Computation offloading
 Extend battery life,
 Improve reliability, etc.
Cloud computing taxonomy
⦿ Recently several approaches have been proposed to integrate mobile devices
with cloud computing systems.
Cloud Computing
Static Cloud Computing
(Data Center) Mobile Cloud Computing
Infrastructure-based
Mobile Cloud
Infrastructure-less (ad hoc)
Mobile Cloud
Internet
Computing
Laboratory
Motivation and Objective
4
⦿ MCC is based on anytime, anywhere computing paradigm,
 Integrates mobile computing with cloud computing infrastructures.
 Through mobile wireless communication network systems such as cellular network.
⦿ Recently, MCC has attracted significant attention of industries and academia
 Promises to meet the need for richer mobile applications and services
⦿ However, due to the integration of several technologies
 Privacy and Security are big concerns in mobile cloud computing.
⦿ we aimed to investigate on the security and privacy issues related to MCC
 By analyzing these issues from three main perspectives:
 Mobile Device Terminals, Mobile Communication Network and Cloud Infrastructure
Internet
Computing
Laboratory
Mobile Cloud Computing Model Architecture
5
Infrastructure-based Mobile Cloud Computing Model Architecture [2]
MD Software
architecture
(3G, LTE, etc.)
Internet
Computing
Laboratory
Security and privacy issues in MCC
6
Security issues Threats examples
Mobile
Device
terminal
Malware threats
Phishing, Spyware, Surveillance attacks, Botnets,
etc.
Software vulnerabilities
(OS, application software)
-System or input validation errors,
-Buffer overflows, SQL injection,
-Code injection, E-mail injection, etc.
Others (lack of security awareness,
mis-operation)
Users’ data leakage and privacy violation
Mobile
Network
Information leakage or
Malicious attack
 Connectivity heterogeneity
- Wi-Fi, 3G, LTE, Bluetooth, etc.
 Internet
Cloud
Platform
Platform reliability & availability  DOS attacks, side-channel attacks, ...
 Shared technology  shared dangers
Data and privacy protection
 Data breaches :
- System vulnerabilities
(Phishing, fraud, and software vulnerabilities)
- Hacked interfaces and APIs
- Compromised credentials and broken authentication
- (Permanent) data loss
Malware Treats
to mobile OS
Internet
Computing
Laboratory
Mobile Malware threats and detection techniques
7
⦿ Malicious behavior and threats of malware [3]
⦿ Classification of mobile malware detection techniques [3].
Internet
Computing
Laboratory
Security and privacy issues : Potential approaches
8
Security issues Potential approaches
Mobile
terminal
Malware threats
Prevention and Detection (signature or anomaly
-based)  CloudAV
Software vulnerabilities
(OS, application software)
-Periodically update the mobile devices’ OS
-Download and installing the system patches
-Checking the software legitimacy and
integrity
Others
(lack of security awareness,
mis-operation)
Regulating the users' behavior
Mobile
Network
Information leakage or
Malicious attack
- Data encryption
- Secure network and communication protocols
Cloud
Platform
Platform reliability Integrating the current security technologies:
-VPN, Authentication and access control
- Key management and data encryption;
-Privacy and data protection, etc.
-Complete backup and recovery solutions
Data and privacy protection
Internet
Computing
Laboratory
Related Work : Proposed approaches & existing
solutions
9
Criminals attack the weakest link to get access to sensitive data
Mobile devices are one of the easiest
paths to sensitive data.
- Outside of the perimeter:
usually outside of an organization’s
control
⦿ [11] Privacy and Data security investigation from enterprise mobility and productivity
management perspective
 Mobile is the new playground for thieves :
How to protect against mobile malware ?
Internet
Computing
Laboratory
Related Work : Proposed approaches & existing
solutions
10
MaaS360 works with Trusteer to detect, analyze and remediate mobile malware in
compromised devices.
 Detect and analyze mobile malware signatures from a continually updated database
⦿IBM MaaS360 Mobile Threat Management
 Enterprise mobility management platform to enable productivity and data protection for the
way people work [12].
Internet
Computing
Laboratory
Related Work : Proposed approaches & existing
solutions
11
[6] Investigates the security and privacy protection in Mobile Healthcare Networks (MHNs)
from the Quality of Protection (QoP) perspective.
MHN applications Mobile healthcare network
Internet
Computing
Laboratory
Related Work : Proposed approaches & existing
solutions
12
Sybil attack detection for MHNs.
⦿ Sybil attack is one of these serious threats to MHNs,
 where Sybil attackers maliciously manipulate a large number of pseudonyms (or identities)
to cheat others.
• E.g. during fitness experience sharing in MHNs, Sybil attackers may repeatedly send the same fitness
experiences to the same users with multiple identities to mislead other users’ opinions and preferences.
Internet
Computing
Laboratory
Related Work : Proposed approaches & existing
solutions
13
Quality of Protection (QoP) in MHNs [6]
Internet
Computing
Laboratory
Related Work : Proposed approaches & existing
solutions
14
A VPN connection to virtual phone
⦿ [7] Proposed a mobile cloud execution framework
 which execute mobile applications in a cloud-based virtualized execution environment,
 with encryption and isolation to protect against eavesdropping from cloud providers.
Internet
Computing
Laboratory
Conclusion and Open issues
15
⦿ In summary, MCC is an emerging computing paradigm
 Integrates cloud computing with mobile computing technologies
 Through mobile communication networks.
 Offers many opportunities to design and develop next generation of distributed
smart and digital convergence solutions
⦿ As discussed, security and privacy are one of big the concerns that need
to be considered with MCC solutions.
 Further researches are necessary in order to address these challenging issues.
Internet
Computing
Laboratory
References
1.Daojing He, Sammy Chan and Mohsen Guiszani, “User Privacy and Data Trustworthiness in Mobile Crowd Sensing”,
IEEE Wireless Communications (Volume:22 , Issue: 1 ), February 2015
2.Fangming Liu et al., “Gearing Resource-Pour Mobile Devices with Powerful Clouds: Architectures, Challenges, and Ap
plications”, IEEE Wireless Communications (Volume:20, Issue 3), June 2013
3.Daojing He, Sammy Chan and Mohsen Guiszani, “Mobile Application Security: Malware Threats and Defenses”, IEEE
Wireless Communications (Volume:22 , Issue: 1 ), February 2015
4.Hui Suo, Zhuohua Liu, Jiafu Wan, Keliang Zhou, “Security and Privacy in Mobile Cloud Computing”, 2013 9th Interna
tional on Wireless Communications and Mobile Computing Conference (IWCMC), Sardinia, 1-5 july 2013
5.D. Huang, X. Zhang ; M. Kang ; J. Luo, “MobiCloud: Building Secure Cloud Framework for Mobile Computing and Co
mmunication”, 2010 Fifth IEEE International SOSE, Nanjing, 4-5 June 2010
6.Kuan Zhang et al., “Security and privacy for mobile healthcare networks: from a quality of protection perspective”,
IEEE Wireless Communications (Volume:22 , Issue: 4 ), August 2015
7. Shih-Hao Hung et al., “An Online Migration Environment for Executing Mobile Applications on the Cloud”, 5th Inter-
nation Conference on Innovative, IEEE 2011
8.Shih-Hao Hung, Chi-Sheng Shih, Jeng-Peng Shieh ∗, Chen-Pang Lee, Yi-Hsiang Huang, “An Online Migration Environ
ment for Executing Mobile Applications on the Cloud”, IEEE 2011
9.Gonzalo Huerta-Canepa, Dongman Lee, “Virtual Cloud Computing Provider for Mobile Devices”, MCS'10 procee-
dings of the 1st ACM Workshop on Mobile Cloud Computing & Services, California, USA
10.IBM Security, “Mobile is the new playground for thieves. How to protect against mobile malware”, White Paper,
IBM Corporation 2016
16
Ad

Recommended

Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and Security
John Paul Prassanna
 
Mobile Cloud Computing
Mobile Cloud Computing
Vikas Kottari
 
iCloud by Apple
iCloud by Apple
Richa Dewani
 
Mobile computing
Mobile computing
Mohit Sharma
 
AMBIENT INTELLIGENCE by Bhagyasri Matta
AMBIENT INTELLIGENCE by Bhagyasri Matta
bagisrim
 
IBM Cloud Computing
IBM Cloud Computing
Ritul Chaudhary
 
Introduction to Mobile Cloud Computing
Introduction to Mobile Cloud Computing
Zainoddin Shaikh
 
Mobile computing
Mobile computing
Tapesh Chalisgaonkar
 
Icloud seminar report
Icloud seminar report
Richa Dewani
 
Cloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
 
Cloud computing
Cloud computing
Shiva Prasad
 
Mobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud Computing
Vineet Garg
 
Introduction to ios
Introduction to ios
Swapnali Pawar
 
Building Blocks for IoT Devices
Building Blocks for IoT Devices
Anil Gorthy
 
Ambient intelligence
Ambient intelligence
Nikhil Patteri
 
CLOUD STORAGE.pptx
CLOUD STORAGE.pptx
RuturajJadhav25
 
Internet of Things changing our lives
Internet of Things changing our lives
ABHILASHGUPTAKONIJET
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud Computing
saurabh soni
 
Mobile Computing
Mobile Computing
gaurav koriya
 
Privacy and security in IoT
Privacy and security in IoT
Vasco Veloso
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
Viresh Suri
 
Mobile cloud Computing
Mobile cloud Computing
Pooja Sharma
 
Cloud security ppt
Cloud security ppt
Venkatesh Chary
 
Cloud Computing PPT.pptx
Cloud Computing PPT.pptx
HetKhandol
 
Security challenges in IoT
Security challenges in IoT
Vishnupriya T H
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPT
Seminar Links
 
15CS81 Module1 IoT
15CS81 Module1 IoT
Ganesh Awati
 
Introduction to Cloud Storage
Introduction to Cloud Storage
lisbk
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
ijcnes
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print Authentication
IJNSA Journal
 

More Related Content

What's hot (20)

Icloud seminar report
Icloud seminar report
Richa Dewani
 
Cloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
 
Cloud computing
Cloud computing
Shiva Prasad
 
Mobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud Computing
Vineet Garg
 
Introduction to ios
Introduction to ios
Swapnali Pawar
 
Building Blocks for IoT Devices
Building Blocks for IoT Devices
Anil Gorthy
 
Ambient intelligence
Ambient intelligence
Nikhil Patteri
 
CLOUD STORAGE.pptx
CLOUD STORAGE.pptx
RuturajJadhav25
 
Internet of Things changing our lives
Internet of Things changing our lives
ABHILASHGUPTAKONIJET
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud Computing
saurabh soni
 
Mobile Computing
Mobile Computing
gaurav koriya
 
Privacy and security in IoT
Privacy and security in IoT
Vasco Veloso
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
Viresh Suri
 
Mobile cloud Computing
Mobile cloud Computing
Pooja Sharma
 
Cloud security ppt
Cloud security ppt
Venkatesh Chary
 
Cloud Computing PPT.pptx
Cloud Computing PPT.pptx
HetKhandol
 
Security challenges in IoT
Security challenges in IoT
Vishnupriya T H
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPT
Seminar Links
 
15CS81 Module1 IoT
15CS81 Module1 IoT
Ganesh Awati
 
Introduction to Cloud Storage
Introduction to Cloud Storage
lisbk
 
Icloud seminar report
Icloud seminar report
Richa Dewani
 
Cloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
 
Mobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud Computing
Vineet Garg
 
Building Blocks for IoT Devices
Building Blocks for IoT Devices
Anil Gorthy
 
Internet of Things changing our lives
Internet of Things changing our lives
ABHILASHGUPTAKONIJET
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud Computing
saurabh soni
 
Privacy and security in IoT
Privacy and security in IoT
Vasco Veloso
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
Viresh Suri
 
Mobile cloud Computing
Mobile cloud Computing
Pooja Sharma
 
Cloud Computing PPT.pptx
Cloud Computing PPT.pptx
HetKhandol
 
Security challenges in IoT
Security challenges in IoT
Vishnupriya T H
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPT
Seminar Links
 
15CS81 Module1 IoT
15CS81 Module1 IoT
Ganesh Awati
 
Introduction to Cloud Storage
Introduction to Cloud Storage
lisbk
 

Similar to Security and privacy issues with mobile cloud computing applications june 2016 (20)

Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
ijcnes
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print Authentication
IJNSA Journal
 
Data Security in Mobile Cloud Computing A State of the Art Review
Data Security in Mobile Cloud Computing A State of the Art Review
Rida Qayyum
 
Security and Privacy Aware Programming Model for IoT Applications in Cloud En...
Security and Privacy Aware Programming Model for IoT Applications in Cloud En...
ijccsa
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
IJNSA Journal
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
amitkhanna2070
 
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
Rida Qayyum
 
Project 3
Project 3
Priyanka Goswami
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
IJERD Editor
 
Security and Privacy of Big Data in Mobile Devices
Security and Privacy of Big Data in Mobile Devices
IOSRjournaljce
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computing
acijjournal
 
Mobile Cloud Computing1 informatique.pptx
Mobile Cloud Computing1 informatique.pptx
ChouaibBakh
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
Yolanda Ivey
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
IJIR JOURNALS IJIRUSA
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
iosrjce
 
A017360104
A017360104
IOSR Journals
 
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
ijitcs
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
ijcnes
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print Authentication
IJNSA Journal
 
Data Security in Mobile Cloud Computing A State of the Art Review
Data Security in Mobile Cloud Computing A State of the Art Review
Rida Qayyum
 
Security and Privacy Aware Programming Model for IoT Applications in Cloud En...
Security and Privacy Aware Programming Model for IoT Applications in Cloud En...
ijccsa
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
IJNSA Journal
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
amitkhanna2070
 
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
Rida Qayyum
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
IJERD Editor
 
Security and Privacy of Big Data in Mobile Devices
Security and Privacy of Big Data in Mobile Devices
IOSRjournaljce
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computing
acijjournal
 
Mobile Cloud Computing1 informatique.pptx
Mobile Cloud Computing1 informatique.pptx
ChouaibBakh
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
Yolanda Ivey
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
IJIR JOURNALS IJIRUSA
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
iosrjce
 
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
ijitcs
 
Ad

Recently uploaded (20)

ICT-8-Module-REVISED-K-10-CURRICULUM.pdf
ICT-8-Module-REVISED-K-10-CURRICULUM.pdf
penafloridaarlyn
 
Chalukyas of Gujrat, Solanki Dynasty NEP.pptx
Chalukyas of Gujrat, Solanki Dynasty NEP.pptx
Dr. Ravi Shankar Arya Mahila P. G. College, Banaras Hindu University, Varanasi, India.
 
What are the benefits that dance brings?
What are the benefits that dance brings?
memi27
 
GEOGRAPHY-Study Material [ Class 10th] .pdf
GEOGRAPHY-Study Material [ Class 10th] .pdf
SHERAZ AHMAD LONE
 
Paper 108 | Thoreau’s Influence on Gandhi: The Evolution of Civil Disobedience
Paper 108 | Thoreau’s Influence on Gandhi: The Evolution of Civil Disobedience
Rajdeep Bavaliya
 
How to Implement Least Package Removal Strategy in Odoo 18 Inventory
How to Implement Least Package Removal Strategy in Odoo 18 Inventory
Celine George
 
Exploring Ocean Floor Features for Middle School
Exploring Ocean Floor Features for Middle School
Marie
 
Introduction to Generative AI and Copilot.pdf
Introduction to Generative AI and Copilot.pdf
TechSoup
 
FEBA Sofia Univercity final diplian v3 GSDG 5.2025.pdf
FEBA Sofia Univercity final diplian v3 GSDG 5.2025.pdf
ChristinaFortunova
 
Overview of Employee in Odoo 18 - Odoo Slides
Overview of Employee in Odoo 18 - Odoo Slides
Celine George
 
Wax Moon, Richmond, VA. Terrence McPherson
Wax Moon, Richmond, VA. Terrence McPherson
TerrenceMcPherson1
 
Plate Tectonic Boundaries and Continental Drift Theory
Plate Tectonic Boundaries and Continental Drift Theory
Marie
 
Paper 109 | Archetypal Journeys in ‘Interstellar’: Exploring Universal Themes...
Paper 109 | Archetypal Journeys in ‘Interstellar’: Exploring Universal Themes...
Rajdeep Bavaliya
 
Energy Balances Of Oecd Countries 2011 Iea Statistics 1st Edition Oecd
Energy Balances Of Oecd Countries 2011 Iea Statistics 1st Edition Oecd
razelitouali
 
Introduction to problem solving Techniques
Introduction to problem solving Techniques
merlinjohnsy
 
Nice Dream.pdf /
Nice Dream.pdf /
ErinUsher3
 
PEST OF WHEAT SORGHUM BAJRA and MINOR MILLETS.pptx
PEST OF WHEAT SORGHUM BAJRA and MINOR MILLETS.pptx
Arshad Shaikh
 
Assisting Individuals and Families to Promote and Maintain Health – Unit 7 | ...
Assisting Individuals and Families to Promote and Maintain Health – Unit 7 | ...
RAKESH SAJJAN
 
BUSINESS QUIZ PRELIMS | QUIZ CLUB OF PSGCAS | 9 SEPTEMBER 2024
BUSINESS QUIZ PRELIMS | QUIZ CLUB OF PSGCAS | 9 SEPTEMBER 2024
Quiz Club of PSG College of Arts & Science
 
Publishing Your Memoir with Brooke Warner
Publishing Your Memoir with Brooke Warner
Brooke Warner
 
ICT-8-Module-REVISED-K-10-CURRICULUM.pdf
ICT-8-Module-REVISED-K-10-CURRICULUM.pdf
penafloridaarlyn
 
What are the benefits that dance brings?
What are the benefits that dance brings?
memi27
 
GEOGRAPHY-Study Material [ Class 10th] .pdf
GEOGRAPHY-Study Material [ Class 10th] .pdf
SHERAZ AHMAD LONE
 
Paper 108 | Thoreau’s Influence on Gandhi: The Evolution of Civil Disobedience
Paper 108 | Thoreau’s Influence on Gandhi: The Evolution of Civil Disobedience
Rajdeep Bavaliya
 
How to Implement Least Package Removal Strategy in Odoo 18 Inventory
How to Implement Least Package Removal Strategy in Odoo 18 Inventory
Celine George
 
Exploring Ocean Floor Features for Middle School
Exploring Ocean Floor Features for Middle School
Marie
 
Introduction to Generative AI and Copilot.pdf
Introduction to Generative AI and Copilot.pdf
TechSoup
 
FEBA Sofia Univercity final diplian v3 GSDG 5.2025.pdf
FEBA Sofia Univercity final diplian v3 GSDG 5.2025.pdf
ChristinaFortunova
 
Overview of Employee in Odoo 18 - Odoo Slides
Overview of Employee in Odoo 18 - Odoo Slides
Celine George
 
Wax Moon, Richmond, VA. Terrence McPherson
Wax Moon, Richmond, VA. Terrence McPherson
TerrenceMcPherson1
 
Plate Tectonic Boundaries and Continental Drift Theory
Plate Tectonic Boundaries and Continental Drift Theory
Marie
 
Paper 109 | Archetypal Journeys in ‘Interstellar’: Exploring Universal Themes...
Paper 109 | Archetypal Journeys in ‘Interstellar’: Exploring Universal Themes...
Rajdeep Bavaliya
 
Energy Balances Of Oecd Countries 2011 Iea Statistics 1st Edition Oecd
Energy Balances Of Oecd Countries 2011 Iea Statistics 1st Edition Oecd
razelitouali
 
Introduction to problem solving Techniques
Introduction to problem solving Techniques
merlinjohnsy
 
Nice Dream.pdf /
Nice Dream.pdf /
ErinUsher3
 
PEST OF WHEAT SORGHUM BAJRA and MINOR MILLETS.pptx
PEST OF WHEAT SORGHUM BAJRA and MINOR MILLETS.pptx
Arshad Shaikh
 
Assisting Individuals and Families to Promote and Maintain Health – Unit 7 | ...
Assisting Individuals and Families to Promote and Maintain Health – Unit 7 | ...
RAKESH SAJJAN
 
Publishing Your Memoir with Brooke Warner
Publishing Your Memoir with Brooke Warner
Brooke Warner
 
Ad

Security and privacy issues with mobile cloud computing applications june 2016

  • 1. Internet Computing Laboratory Security and Privacy Issues with Mobile Cloud Computing Applications Category : Mobile Cloud Computing, Mobile Cloud Security, Security and Privacy Issues 1 Present by MERLEC M. 2016.06.08
  • 2. Internet Computing Laboratory Outline 2 Introduction Security and privacy issues in MCC Potential solution approaches Related work: Proposed approaches & existing solutions Conclusion and open issues
  • 3. Internet Computing Laboratory Introduction 3 ⦿ Why we need Mobile Cloud Computing (MCC)?  To extend the capabilities of mobile devices  Processing power, Data storage capacity, etc.  Enable users to execute computational and data-intensive applications on MDs,  Computation offloading  Extend battery life,  Improve reliability, etc. Cloud computing taxonomy ⦿ Recently several approaches have been proposed to integrate mobile devices with cloud computing systems. Cloud Computing Static Cloud Computing (Data Center) Mobile Cloud Computing Infrastructure-based Mobile Cloud Infrastructure-less (ad hoc) Mobile Cloud
  • 4. Internet Computing Laboratory Motivation and Objective 4 ⦿ MCC is based on anytime, anywhere computing paradigm,  Integrates mobile computing with cloud computing infrastructures.  Through mobile wireless communication network systems such as cellular network. ⦿ Recently, MCC has attracted significant attention of industries and academia  Promises to meet the need for richer mobile applications and services ⦿ However, due to the integration of several technologies  Privacy and Security are big concerns in mobile cloud computing. ⦿ we aimed to investigate on the security and privacy issues related to MCC  By analyzing these issues from three main perspectives:  Mobile Device Terminals, Mobile Communication Network and Cloud Infrastructure
  • 5. Internet Computing Laboratory Mobile Cloud Computing Model Architecture 5 Infrastructure-based Mobile Cloud Computing Model Architecture [2] MD Software architecture (3G, LTE, etc.)
  • 6. Internet Computing Laboratory Security and privacy issues in MCC 6 Security issues Threats examples Mobile Device terminal Malware threats Phishing, Spyware, Surveillance attacks, Botnets, etc. Software vulnerabilities (OS, application software) -System or input validation errors, -Buffer overflows, SQL injection, -Code injection, E-mail injection, etc. Others (lack of security awareness, mis-operation) Users’ data leakage and privacy violation Mobile Network Information leakage or Malicious attack  Connectivity heterogeneity - Wi-Fi, 3G, LTE, Bluetooth, etc.  Internet Cloud Platform Platform reliability & availability  DOS attacks, side-channel attacks, ...  Shared technology  shared dangers Data and privacy protection  Data breaches : - System vulnerabilities (Phishing, fraud, and software vulnerabilities) - Hacked interfaces and APIs - Compromised credentials and broken authentication - (Permanent) data loss Malware Treats to mobile OS
  • 7. Internet Computing Laboratory Mobile Malware threats and detection techniques 7 ⦿ Malicious behavior and threats of malware [3] ⦿ Classification of mobile malware detection techniques [3].
  • 8. Internet Computing Laboratory Security and privacy issues : Potential approaches 8 Security issues Potential approaches Mobile terminal Malware threats Prevention and Detection (signature or anomaly -based)  CloudAV Software vulnerabilities (OS, application software) -Periodically update the mobile devices’ OS -Download and installing the system patches -Checking the software legitimacy and integrity Others (lack of security awareness, mis-operation) Regulating the users' behavior Mobile Network Information leakage or Malicious attack - Data encryption - Secure network and communication protocols Cloud Platform Platform reliability Integrating the current security technologies: -VPN, Authentication and access control - Key management and data encryption; -Privacy and data protection, etc. -Complete backup and recovery solutions Data and privacy protection
  • 9. Internet Computing Laboratory Related Work : Proposed approaches & existing solutions 9 Criminals attack the weakest link to get access to sensitive data Mobile devices are one of the easiest paths to sensitive data. - Outside of the perimeter: usually outside of an organization’s control ⦿ [11] Privacy and Data security investigation from enterprise mobility and productivity management perspective  Mobile is the new playground for thieves : How to protect against mobile malware ?
  • 10. Internet Computing Laboratory Related Work : Proposed approaches & existing solutions 10 MaaS360 works with Trusteer to detect, analyze and remediate mobile malware in compromised devices.  Detect and analyze mobile malware signatures from a continually updated database ⦿IBM MaaS360 Mobile Threat Management  Enterprise mobility management platform to enable productivity and data protection for the way people work [12].
  • 11. Internet Computing Laboratory Related Work : Proposed approaches & existing solutions 11 [6] Investigates the security and privacy protection in Mobile Healthcare Networks (MHNs) from the Quality of Protection (QoP) perspective. MHN applications Mobile healthcare network
  • 12. Internet Computing Laboratory Related Work : Proposed approaches & existing solutions 12 Sybil attack detection for MHNs. ⦿ Sybil attack is one of these serious threats to MHNs,  where Sybil attackers maliciously manipulate a large number of pseudonyms (or identities) to cheat others. • E.g. during fitness experience sharing in MHNs, Sybil attackers may repeatedly send the same fitness experiences to the same users with multiple identities to mislead other users’ opinions and preferences.
  • 13. Internet Computing Laboratory Related Work : Proposed approaches & existing solutions 13 Quality of Protection (QoP) in MHNs [6]
  • 14. Internet Computing Laboratory Related Work : Proposed approaches & existing solutions 14 A VPN connection to virtual phone ⦿ [7] Proposed a mobile cloud execution framework  which execute mobile applications in a cloud-based virtualized execution environment,  with encryption and isolation to protect against eavesdropping from cloud providers.
  • 15. Internet Computing Laboratory Conclusion and Open issues 15 ⦿ In summary, MCC is an emerging computing paradigm  Integrates cloud computing with mobile computing technologies  Through mobile communication networks.  Offers many opportunities to design and develop next generation of distributed smart and digital convergence solutions ⦿ As discussed, security and privacy are one of big the concerns that need to be considered with MCC solutions.  Further researches are necessary in order to address these challenging issues.
  • 16. Internet Computing Laboratory References 1.Daojing He, Sammy Chan and Mohsen Guiszani, “User Privacy and Data Trustworthiness in Mobile Crowd Sensing”, IEEE Wireless Communications (Volume:22 , Issue: 1 ), February 2015 2.Fangming Liu et al., “Gearing Resource-Pour Mobile Devices with Powerful Clouds: Architectures, Challenges, and Ap plications”, IEEE Wireless Communications (Volume:20, Issue 3), June 2013 3.Daojing He, Sammy Chan and Mohsen Guiszani, “Mobile Application Security: Malware Threats and Defenses”, IEEE Wireless Communications (Volume:22 , Issue: 1 ), February 2015 4.Hui Suo, Zhuohua Liu, Jiafu Wan, Keliang Zhou, “Security and Privacy in Mobile Cloud Computing”, 2013 9th Interna tional on Wireless Communications and Mobile Computing Conference (IWCMC), Sardinia, 1-5 july 2013 5.D. Huang, X. Zhang ; M. Kang ; J. Luo, “MobiCloud: Building Secure Cloud Framework for Mobile Computing and Co mmunication”, 2010 Fifth IEEE International SOSE, Nanjing, 4-5 June 2010 6.Kuan Zhang et al., “Security and privacy for mobile healthcare networks: from a quality of protection perspective”, IEEE Wireless Communications (Volume:22 , Issue: 4 ), August 2015 7. Shih-Hao Hung et al., “An Online Migration Environment for Executing Mobile Applications on the Cloud”, 5th Inter- nation Conference on Innovative, IEEE 2011 8.Shih-Hao Hung, Chi-Sheng Shih, Jeng-Peng Shieh ∗, Chen-Pang Lee, Yi-Hsiang Huang, “An Online Migration Environ ment for Executing Mobile Applications on the Cloud”, IEEE 2011 9.Gonzalo Huerta-Canepa, Dongman Lee, “Virtual Cloud Computing Provider for Mobile Devices”, MCS'10 procee- dings of the 1st ACM Workshop on Mobile Cloud Computing & Services, California, USA 10.IBM Security, “Mobile is the new playground for thieves. How to protect against mobile malware”, White Paper, IBM Corporation 2016 16