SlideShare a Scribd company logo
1 of 27
Mobile Cloud:
Security Issues and Challenges
Mrs. Vani, Mr. John & Mr. Manikandan
Paper Presentation on
Evolution of Cloud Computing
Mobile Cloud Computing
Features
Challenges
Security Issues
Existing Solutions
Possible Solutions
Conclusion
Refernces
CONTENTS
Cloud Computing - Evolution
 Mainframe Computing - many users shared powerful
mainframes using dummy terminals.
 PC Computing - stand-alone PCs became powerful
enough to meet the majority of users’ needs.
 Network Computing - PCs, laptops, and servers were
connected together through local networks to
share resources and increase performance.
Cloud Computing - Evolution
 Internet Computing - local networks were connected
to other local networks forming a global network
such as the Internet to utilize remote applications
and resources.
 Grid Computing - provided shared computing power
and storage through a distributed computing system.
 Cloud Computing - further provides shared resources
on the Internet in a scalable and simple way.
Cloud Computing
Common Location-independent Online Utility on Demand
Common : implies multi-tenancy,
not single or isolated tenancy
Utility : implies pay-for-use
on Demand : implies infinite, immediate,
invisible scalability
Cloud Computing
 Latest distributed computing model.
 Implements the utility computing vision.
 On-demand, pay-as-you-go, and utility computing.
 A ubiquitous network access.
 Objective - To increase the capacity and capabilities
of client devices by accessing leased infrastructure
and software applications instead of owning them.
Cloud Computing - Services
A Few Services of Cloud:
 SaaS - to use on demand software that is
provided by the service provider via a thin client
device for consumers
 PaaS - applications deployed without the burden
and cost of buying and managing the hardware and
software for customers
 IaaS - outsourcing of responsibility of equipment
 MaaS, CaaS, LaaS, XaaS
Mobile Cloud Computing
A new distributed computing paradigm for
mobile applications whereby the storage and
the data processing are migrated from the
mobiles to resources rich and powerful
centralized computing data centers in
computational clouds.
Aepona, “White paper, Mobile Cloud Computing
Solution Brief”, November 2010.
Mobile Cloud Computing - Features
 In MCC, these are Transferred to cloud
 Intensive computing
 Data storage
 Information processing
 Ubiquity and Mobility are two major features in next
generation network.
Mobile Cloud Computing - Architecture
Mobile Cloud Computing -Characteristics
 Scalability
 Agility
 Reliability
 Security
 Reduced Cost
 Reduced Maintenance
Mobile Cloud Computing - Challenges
 Limitation of bandwidth and communication latency
 Signal Disturbance
 Security
 Limited power, memory, screen, OS
 Low computing ability – Processing power
 Quality of Service (affected by landforms, weather
and buildings)
Mobile Cloud Computing - Challenges
Limitations in contrast with PCs and Laptops
 3 times less in processing capacity
 8 times less in memory
 5 to 10 times less in storage capacity
 10 times less in network bandwidth
Mobile Cloud Computing –Security Layers
Security Services are in three layers
 Backbone layer – security surveillance in cloud
physical system
 Infrastructure layer – monitors VMs in cloud,
storage verification, Evaluation and Audits, …
 Application and Platform layer – user management,
key management, authentication, authorization,
encryption and data integration.
Recent survey – 73% of IT executives and CEOs are
unwilling to adopt cloud services due to privacy and
security
Mobile Cloud Computing –Security Issues
Security Issues in MCC
 Data Ownership
 Privacy
 Data Security
 Other security issues
Mobile Cloud Computing –Security Issues
Security Issues in MCC
 Data Ownership – MCC provides the facility to store
personal data and other data (purchases)
who owns the data?
users need to be aware of different rights on
purchases (Audio, Video, …).
 Privacy – one of the biggest challenge
Some apps store user’s data remotely, which may be
sold to others (agencies ...) without the permissions
of user. ( like updates about Location).
Mobile Cloud Computing –Security Issues
 Data Security and Other security issues – Mobiles
are famous for malicious code – gives possibility of
loss.
 Data loss from lost/stolen devices
 Info stealing by malicious malware
 Data leakage due to poorly written third party app
 Unassured network access, unreliable APs
 Insecure Market places
 Near Field Communication and Proximity based
hacking
Mobile Cloud – Existing Solutions
 Anand Surendra – Secure framework to store data in
secured fashion to protect user’s privacy.
 Jibitesh Mishra – Secure architecture to maintain
integrity and security of data.
 Itani et. al – an energy efficient framework to assure
user’s integrity.
 Jon Oberheide – architecture with three components
 Host Agent – lightweight process on device
 Network Service – analyses what is sent by host
 Cache - Global Shared & Local Private cache
Mobile Cloud – Existing Solutions
 Chetan et. al – wildcat prevention and protection
 Cloud access protection – OTP, OpAuTH
 Embedded device identity protection –
personalized profile on each device.
 Marinelli – Hyrax, a MCC platform from Hadoop
 Offers sane performance in data sharing
 Allows users to utilize data and computing
process on networks
Mobile Cloud – Possible Solutions
Some steps for winning battle of breaches:
 Prioritize the objectives and set the risk
tolerance
 there is no 100% secure.
 Harddecisions on different levels of protection.
 Protect data with proactive security plan
 A plan with threat landscape in mind (hacking
cyber crime, media & social scams, etc…)
 With policies and technologies.
Mobile Cloud – Possible Solutions
Some steps for winning battle of breaches:
 Prepare the response to inevitable sophisticated
attacks
 Advanced continual threats need to be
encountered.
 Unified and tested response plan is needed.
 Promote the culture of security awareness
 Careless mistakes of individuals (an employee
could affect master plan of CEO).
 Build data security on culture of organization.
Conclusion
 To attain more security and increase reliability
 Threats need to be addressed & studied
 Data security plan needs to be developed.
 It is essential to keep in mind in designing a
framework for MCC
 More cost effective
 More energy efficient
 Better security
 Better performance
References
1. PRNewswire.org, http://www.reportlinker.com/, 2012.
2. Preston A. Coz, “Mobile Cloud Computing: Devices, trends, issues &
enabling technologies”, 2012.
3. Schneider, “Essential characteristics of Mobile Cloud Computing”,
Marquette University, United States, 2012.
4. Professor Kun Yang, Dr. Shumao Ou, Professor Hai Jin, Huazhong and
Professor Amiya Nayak, “Mobile Cloud Computing and Networking”,
Proceedings of IEEE conference, 2013.
5. M. Rajendra Prasad, Jayadev Gyani and P. R. K. Murti, “Mobile Cloud
Computing: Implications and Challenges, Journal of Information
Engineering and Applications”, Vol 2, No.7, 2012, Print ISSN 2224-5782, pp
7 - 15.
6. Ronnie D. Caytiles and Sunguk Lee, “Security Considerations for Public
Mobile Cloud Computing”, International Journal of Advanced Science and
Technology, Vol. 44, July 2012.
References
7. Soeung-Kon Victor Ko, Jung- Hoon Le and Sung Woo Kim, “Mobile Cloud
Computing Security Considerations”, April 30, 2012.
8. Anand Surendra Shimpi and R. Chander, “Secure Framework in Data
Processing for Mobile Cloud Computing”, International Journal of
Computer & Communication Technology, ISSN (Print) 0975- 7449, vol. 3,
Iss. 3, 2012.
9. Jibitesh Mishra, Sanjit Kumar Dash and Sweta Dash, “Mobile Cloud
Computing: A Secure Framework of Cloud Computing for Mobile
Application”, Institute for Computer Sciences, Social Informatics and
Telecommunications Engineering, 2012, pp. 347- 356.
10.Itani et al, “Towards secure mobile cloud: A survey”, Proceedings of
Analyses paper, 2012.
11.Eugene E. Marinelli, “Hyrax: Cloud Computing on Mobile Devices”,
Dissertation of Thesis, Carnegie Mellon University, Pittsburgh, 2009.
12.Xiaojun Yu and Qiaoyan Wen, “Design of Security Solution to Mobile Cloud
Storage”,: Knowledge Discovery and Data Mining, AISC, Springer-Verlag
Berlin Heidelberg H. Tan (Ed.), 2012, pp. 255–263.
References
13.Robert Lemos, “Cloud's Future Security Depends on Mobile”, Proceedings of
RSA Conference, February 2012.
14.V. L. Divya, “Mobile Applications with Cloud Computing”, International
Journal of Scientific and Research, Vol. 2, Issue 4, April 2012, ISSN 2250-
3153.
15.Han Qi and Abdullah Gani, “Research on Mobile Cloud Computing: Trends,
Review and Perspectives”, Proceedings of Analyses paper, University of
Malaya, Malaysia, 2012.
16.S. Chetan, Gautam Kumar, K. Dinesh, K. Mathew and M. A. Abhimanyu,
“Cloud Computing for Mobile World”, Proceedings of Analyses paper,
National Institute of Technology, Calicut, 2010.
17.Jon Oberheide and Evan Cooke, “Virtualized cloud security services for
mobile devices”, Proceedings of the Workshop on Virtualization in Mobile
Cloud Computing, ACM, New York, USA, 2008, pp 31–35.
18.Cecil Donald, Arockiam and Arul Oli, “”, International Journal of
Engineering and Technology, Vol. 3, Issue 1, July 2013.
queries
Thank You

More Related Content

What's hot (20)

Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Chap 1 introduction to cloud computing
Chap 1 introduction to cloud computingChap 1 introduction to cloud computing
Chap 1 introduction to cloud computing
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Evolution of the cloud
Evolution of the cloudEvolution of the cloud
Evolution of the cloud
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Grid Computing
Grid ComputingGrid Computing
Grid Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPTCloud Computing and Services | PPT
Cloud Computing and Services | PPT
 
Cloud Ecosystem
Cloud EcosystemCloud Ecosystem
Cloud Ecosystem
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacy
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Cloud Computing & Distributed Computing
Cloud Computing & Distributed ComputingCloud Computing & Distributed Computing
Cloud Computing & Distributed Computing
 
Grid computing
Grid computingGrid computing
Grid computing
 
A brief history of cloud computing
A brief history of cloud computingA brief history of cloud computing
A brief history of cloud computing
 
Security Issues for Cellular Telephony
Security Issues for Cellular TelephonySecurity Issues for Cellular Telephony
Security Issues for Cellular Telephony
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Viewers also liked

Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud ComputingSimeon Oriko
 
Mobile Cloud Computing: Big Picture
Mobile Cloud Computing: Big PictureMobile Cloud Computing: Big Picture
Mobile Cloud Computing: Big PictureReza Rahimi
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple pptAgarwaljay
 
Mobile Security Solution - Cloud Computing Major Project
Mobile Security Solution - Cloud Computing Major ProjectMobile Security Solution - Cloud Computing Major Project
Mobile Security Solution - Cloud Computing Major ProjectTarun Gupta
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Security and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud ComputingSecurity and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud ComputingRam Kumar K R
 
Mobile Cloud Computing
Mobile Cloud Computing Mobile Cloud Computing
Mobile Cloud Computing Varun Vijay
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in IndiaYogesh Lolge
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing securityZachariah Pabi
 
Digital Signature
Digital SignatureDigital Signature
Digital Signaturesaurav5884
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing BasicsSagar Sane
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaPrashant Gupta
 
A Disaster Tolerant Cloud Computing Model as a Disaster Survival Methodology ...
A Disaster Tolerant Cloud Computing Model as a Disaster Survival Methodology ...A Disaster Tolerant Cloud Computing Model as a Disaster Survival Methodology ...
A Disaster Tolerant Cloud Computing Model as a Disaster Survival Methodology ...Chad Lawler
 
Givens Presentation2
Givens Presentation2Givens Presentation2
Givens Presentation2Karen Stuart
 

Viewers also liked (20)

Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Mobile Cloud Computing: Big Picture
Mobile Cloud Computing: Big PictureMobile Cloud Computing: Big Picture
Mobile Cloud Computing: Big Picture
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
Mobile Security Solution - Cloud Computing Major Project
Mobile Security Solution - Cloud Computing Major ProjectMobile Security Solution - Cloud Computing Major Project
Mobile Security Solution - Cloud Computing Major Project
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Security and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud ComputingSecurity and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud Computing
 
Mobile Cloud Computing
Mobile Cloud Computing Mobile Cloud Computing
Mobile Cloud Computing
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing security
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing Basics
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
 
A Disaster Tolerant Cloud Computing Model as a Disaster Survival Methodology ...
A Disaster Tolerant Cloud Computing Model as a Disaster Survival Methodology ...A Disaster Tolerant Cloud Computing Model as a Disaster Survival Methodology ...
A Disaster Tolerant Cloud Computing Model as a Disaster Survival Methodology ...
 
Givens Presentation2
Givens Presentation2Givens Presentation2
Givens Presentation2
 

Similar to Mobile Cloud Computing Challenges and Security

Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
Cloud computing..
Cloud computing..Cloud computing..
Cloud computing..manoj kumar
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTUREacijjournal
 
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...AlAtfat
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security IssuesStelios Krasadakis
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...IJERD Editor
 
A220113
A220113A220113
A220113irjes
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture materialAnkit Gupta
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 

Similar to Mobile Cloud Computing Challenges and Security (20)

Ms3422732277
Ms3422732277Ms3422732277
Ms3422732277
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Cloud computing..
Cloud computing..Cloud computing..
Cloud computing..
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
G0314043
G0314043G0314043
G0314043
 
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
 
Bn4301364368
Bn4301364368Bn4301364368
Bn4301364368
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
 
A220113
A220113A220113
A220113
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture material
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 

Recently uploaded

Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
DiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfDiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfChristalin Nelson
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
The role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipThe role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipKarl Donert
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Unit :1 Basics of Professional Intelligence
Unit :1 Basics of Professional IntelligenceUnit :1 Basics of Professional Intelligence
Unit :1 Basics of Professional IntelligenceDr Vijay Vishwakarma
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...Nguyen Thanh Tu Collection
 
4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptxmary850239
 
Employablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxEmployablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxryandux83rd
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineCeline George
 
DBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfDBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfChristalin Nelson
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFEPART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFEMISSRITIMABIOLOGYEXP
 
The Emergence of Legislative Behavior in the Colombian Congress
The Emergence of Legislative Behavior in the Colombian CongressThe Emergence of Legislative Behavior in the Colombian Congress
The Emergence of Legislative Behavior in the Colombian CongressMaria Paula Aroca
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17Celine George
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 

Recently uploaded (20)

Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
DiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfDiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdf
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
The role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipThe role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenship
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Unit :1 Basics of Professional Intelligence
Unit :1 Basics of Professional IntelligenceUnit :1 Basics of Professional Intelligence
Unit :1 Basics of Professional Intelligence
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
 
4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx
 
Employablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxEmployablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptx
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command Line
 
Chi-Square Test Non Parametric Test Categorical Variable
Chi-Square Test Non Parametric Test Categorical VariableChi-Square Test Non Parametric Test Categorical Variable
Chi-Square Test Non Parametric Test Categorical Variable
 
DBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfDBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdf
 
Spearman's correlation,Formula,Advantages,
Spearman's correlation,Formula,Advantages,Spearman's correlation,Formula,Advantages,
Spearman's correlation,Formula,Advantages,
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFEPART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
 
The Emergence of Legislative Behavior in the Colombian Congress
The Emergence of Legislative Behavior in the Colombian CongressThe Emergence of Legislative Behavior in the Colombian Congress
The Emergence of Legislative Behavior in the Colombian Congress
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 

Mobile Cloud Computing Challenges and Security

  • 1. Mobile Cloud: Security Issues and Challenges Mrs. Vani, Mr. John & Mr. Manikandan Paper Presentation on
  • 2. Evolution of Cloud Computing Mobile Cloud Computing Features Challenges Security Issues Existing Solutions Possible Solutions Conclusion Refernces CONTENTS
  • 3. Cloud Computing - Evolution  Mainframe Computing - many users shared powerful mainframes using dummy terminals.  PC Computing - stand-alone PCs became powerful enough to meet the majority of users’ needs.  Network Computing - PCs, laptops, and servers were connected together through local networks to share resources and increase performance.
  • 4. Cloud Computing - Evolution  Internet Computing - local networks were connected to other local networks forming a global network such as the Internet to utilize remote applications and resources.  Grid Computing - provided shared computing power and storage through a distributed computing system.  Cloud Computing - further provides shared resources on the Internet in a scalable and simple way.
  • 5. Cloud Computing Common Location-independent Online Utility on Demand Common : implies multi-tenancy, not single or isolated tenancy Utility : implies pay-for-use on Demand : implies infinite, immediate, invisible scalability
  • 6. Cloud Computing  Latest distributed computing model.  Implements the utility computing vision.  On-demand, pay-as-you-go, and utility computing.  A ubiquitous network access.  Objective - To increase the capacity and capabilities of client devices by accessing leased infrastructure and software applications instead of owning them.
  • 7. Cloud Computing - Services A Few Services of Cloud:  SaaS - to use on demand software that is provided by the service provider via a thin client device for consumers  PaaS - applications deployed without the burden and cost of buying and managing the hardware and software for customers  IaaS - outsourcing of responsibility of equipment  MaaS, CaaS, LaaS, XaaS
  • 8. Mobile Cloud Computing A new distributed computing paradigm for mobile applications whereby the storage and the data processing are migrated from the mobiles to resources rich and powerful centralized computing data centers in computational clouds. Aepona, “White paper, Mobile Cloud Computing Solution Brief”, November 2010.
  • 9. Mobile Cloud Computing - Features  In MCC, these are Transferred to cloud  Intensive computing  Data storage  Information processing  Ubiquity and Mobility are two major features in next generation network.
  • 10. Mobile Cloud Computing - Architecture
  • 11. Mobile Cloud Computing -Characteristics  Scalability  Agility  Reliability  Security  Reduced Cost  Reduced Maintenance
  • 12. Mobile Cloud Computing - Challenges  Limitation of bandwidth and communication latency  Signal Disturbance  Security  Limited power, memory, screen, OS  Low computing ability – Processing power  Quality of Service (affected by landforms, weather and buildings)
  • 13. Mobile Cloud Computing - Challenges Limitations in contrast with PCs and Laptops  3 times less in processing capacity  8 times less in memory  5 to 10 times less in storage capacity  10 times less in network bandwidth
  • 14. Mobile Cloud Computing –Security Layers Security Services are in three layers  Backbone layer – security surveillance in cloud physical system  Infrastructure layer – monitors VMs in cloud, storage verification, Evaluation and Audits, …  Application and Platform layer – user management, key management, authentication, authorization, encryption and data integration. Recent survey – 73% of IT executives and CEOs are unwilling to adopt cloud services due to privacy and security
  • 15. Mobile Cloud Computing –Security Issues Security Issues in MCC  Data Ownership  Privacy  Data Security  Other security issues
  • 16. Mobile Cloud Computing –Security Issues Security Issues in MCC  Data Ownership – MCC provides the facility to store personal data and other data (purchases) who owns the data? users need to be aware of different rights on purchases (Audio, Video, …).  Privacy – one of the biggest challenge Some apps store user’s data remotely, which may be sold to others (agencies ...) without the permissions of user. ( like updates about Location).
  • 17. Mobile Cloud Computing –Security Issues  Data Security and Other security issues – Mobiles are famous for malicious code – gives possibility of loss.  Data loss from lost/stolen devices  Info stealing by malicious malware  Data leakage due to poorly written third party app  Unassured network access, unreliable APs  Insecure Market places  Near Field Communication and Proximity based hacking
  • 18. Mobile Cloud – Existing Solutions  Anand Surendra – Secure framework to store data in secured fashion to protect user’s privacy.  Jibitesh Mishra – Secure architecture to maintain integrity and security of data.  Itani et. al – an energy efficient framework to assure user’s integrity.  Jon Oberheide – architecture with three components  Host Agent – lightweight process on device  Network Service – analyses what is sent by host  Cache - Global Shared & Local Private cache
  • 19. Mobile Cloud – Existing Solutions  Chetan et. al – wildcat prevention and protection  Cloud access protection – OTP, OpAuTH  Embedded device identity protection – personalized profile on each device.  Marinelli – Hyrax, a MCC platform from Hadoop  Offers sane performance in data sharing  Allows users to utilize data and computing process on networks
  • 20. Mobile Cloud – Possible Solutions Some steps for winning battle of breaches:  Prioritize the objectives and set the risk tolerance  there is no 100% secure.  Harddecisions on different levels of protection.  Protect data with proactive security plan  A plan with threat landscape in mind (hacking cyber crime, media & social scams, etc…)  With policies and technologies.
  • 21. Mobile Cloud – Possible Solutions Some steps for winning battle of breaches:  Prepare the response to inevitable sophisticated attacks  Advanced continual threats need to be encountered.  Unified and tested response plan is needed.  Promote the culture of security awareness  Careless mistakes of individuals (an employee could affect master plan of CEO).  Build data security on culture of organization.
  • 22. Conclusion  To attain more security and increase reliability  Threats need to be addressed & studied  Data security plan needs to be developed.  It is essential to keep in mind in designing a framework for MCC  More cost effective  More energy efficient  Better security  Better performance
  • 23. References 1. PRNewswire.org, http://www.reportlinker.com/, 2012. 2. Preston A. Coz, “Mobile Cloud Computing: Devices, trends, issues & enabling technologies”, 2012. 3. Schneider, “Essential characteristics of Mobile Cloud Computing”, Marquette University, United States, 2012. 4. Professor Kun Yang, Dr. Shumao Ou, Professor Hai Jin, Huazhong and Professor Amiya Nayak, “Mobile Cloud Computing and Networking”, Proceedings of IEEE conference, 2013. 5. M. Rajendra Prasad, Jayadev Gyani and P. R. K. Murti, “Mobile Cloud Computing: Implications and Challenges, Journal of Information Engineering and Applications”, Vol 2, No.7, 2012, Print ISSN 2224-5782, pp 7 - 15. 6. Ronnie D. Caytiles and Sunguk Lee, “Security Considerations for Public Mobile Cloud Computing”, International Journal of Advanced Science and Technology, Vol. 44, July 2012.
  • 24. References 7. Soeung-Kon Victor Ko, Jung- Hoon Le and Sung Woo Kim, “Mobile Cloud Computing Security Considerations”, April 30, 2012. 8. Anand Surendra Shimpi and R. Chander, “Secure Framework in Data Processing for Mobile Cloud Computing”, International Journal of Computer & Communication Technology, ISSN (Print) 0975- 7449, vol. 3, Iss. 3, 2012. 9. Jibitesh Mishra, Sanjit Kumar Dash and Sweta Dash, “Mobile Cloud Computing: A Secure Framework of Cloud Computing for Mobile Application”, Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2012, pp. 347- 356. 10.Itani et al, “Towards secure mobile cloud: A survey”, Proceedings of Analyses paper, 2012. 11.Eugene E. Marinelli, “Hyrax: Cloud Computing on Mobile Devices”, Dissertation of Thesis, Carnegie Mellon University, Pittsburgh, 2009. 12.Xiaojun Yu and Qiaoyan Wen, “Design of Security Solution to Mobile Cloud Storage”,: Knowledge Discovery and Data Mining, AISC, Springer-Verlag Berlin Heidelberg H. Tan (Ed.), 2012, pp. 255–263.
  • 25. References 13.Robert Lemos, “Cloud's Future Security Depends on Mobile”, Proceedings of RSA Conference, February 2012. 14.V. L. Divya, “Mobile Applications with Cloud Computing”, International Journal of Scientific and Research, Vol. 2, Issue 4, April 2012, ISSN 2250- 3153. 15.Han Qi and Abdullah Gani, “Research on Mobile Cloud Computing: Trends, Review and Perspectives”, Proceedings of Analyses paper, University of Malaya, Malaysia, 2012. 16.S. Chetan, Gautam Kumar, K. Dinesh, K. Mathew and M. A. Abhimanyu, “Cloud Computing for Mobile World”, Proceedings of Analyses paper, National Institute of Technology, Calicut, 2010. 17.Jon Oberheide and Evan Cooke, “Virtualized cloud security services for mobile devices”, Proceedings of the Workshop on Virtualization in Mobile Cloud Computing, ACM, New York, USA, 2008, pp 31–35. 18.Cecil Donald, Arockiam and Arul Oli, “”, International Journal of Engineering and Technology, Vol. 3, Issue 1, July 2013.

Editor's Notes

  1. ;qjkx
  2. ;qjkx
  3. ;qjkx
  4. ;qjkx