SlideShare a Scribd company logo
1 of 16
Security and Privacy in Mobile 
Cloud Computing 
Ganesh Arkalgud(1RV11IS021) 
Ram Kumar K R(1RV11IS042) 
Mohammed Ehab(1RV11IS032) 
Original paper by: 
Hui Suo 
Zhuohua Liu 
JiafuWan 
Keliang Zhou
Introduction 
• Advantages of cloud computing 
1. On-demand self service 
2. Extendibility 
• What is mobile cloud computing?
Products offered in mobile cloud segment 
• Android OS. 
• LiveMesh. 
• iCloud.
Factors affecting growth of mobile cloud segment 
• Battery life dependencies. 
• Limited resources of mobile devices. 
• Wireless bandwidth and delay. 
• Security of mobile cloud devices. 
• Limited calculation speed.
Model of 
Mobile Cloud 
Computing
SECURITY AND PRIVACY ISSUES IN MOBILE 
CLOUD 
COMPUTING
Mobile terminal security issues 
• Mobile Terminal. 
1. Open source OS 
2. Third party software 
3. Malware 
• Software vulnerabilities 
1. Data transfer with phone and 
computer using FTP. 
• Mis-operation without knowledge.
Mobile Network Security 
1. Phone service. 
2. SMS. 
3. Wi-fi 
4. Bluetooth etc.,
Mobile Cloud 
• Platform Reliability 
susceptible to being attacked with DOS 
• Data and Privacy Protection 
ownership and management of the users' data 
To protect the sensitive data, the single means is not enough. We need 
a complete security solution to protect the data security and privacy of 
users.
CURRENT SECURITY AND PRIVACY 
APROACHES FOR 
MOBILE CLOUD COMPUTING
Aiming at Mobile Terminal Security 
• Anti-malware 
Ex: Cloud AV 
• Software vulnerabilities 
• Regulating Users' Behavior
Aiming at Mobile Network Security 
• Encryption 
• Security Protocol
Aiming at Mobile Cloud Security 
• Protection to Platform Reliability 
• Data Encryption and Key Management 
• Authentication and Access Control 
• Privacy Protection
Summary
THANK YOU

More Related Content

What's hot

Details About Mobile Cloud Computing
Details About Mobile Cloud ComputingDetails About Mobile Cloud Computing
Details About Mobile Cloud Computingvaishnavi_sv
 
Mobile Cloud Computing
Mobile Cloud Computing Mobile Cloud Computing
Mobile Cloud Computing Varun Vijay
 
An insight for Mobile Cloud Computing (MCC)
An insight for Mobile Cloud Computing (MCC)An insight for Mobile Cloud Computing (MCC)
An insight for Mobile Cloud Computing (MCC)Yuvaraj Ilangovan
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computingsnoreen
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computingguestc37919f
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud ComputingBhaktiKarale
 
Mobile Cloud Computing : The Upcoming Trend !
Mobile Cloud Computing : The Upcoming Trend !Mobile Cloud Computing : The Upcoming Trend !
Mobile Cloud Computing : The Upcoming Trend !Sai Natkar
 
Mobile cloud computing - Introduction
Mobile cloud computing - IntroductionMobile cloud computing - Introduction
Mobile cloud computing - IntroductionManeesha Caldera
 
Mobile-Cloud Computing
Mobile-Cloud ComputingMobile-Cloud Computing
Mobile-Cloud ComputingKamal Patel
 
Research Seminar Presentation - A framework for partitioning and execution of...
Research Seminar Presentation - A framework for partitioning and execution of...Research Seminar Presentation - A framework for partitioning and execution of...
Research Seminar Presentation - A framework for partitioning and execution of...malinga2009
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computingFatih Özlü
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud ComputingVikas Kottari
 
Mobile Cloud Computing by FuGenX
Mobile Cloud Computing by FuGenXMobile Cloud Computing by FuGenX
Mobile Cloud Computing by FuGenXFuGenx Technologies
 
Energy Efficient Mobile Applications with Mobile Cloud Computing ( MCC )
Energy Efficient Mobile Applications with Mobile Cloud Computing ( MCC )Energy Efficient Mobile Applications with Mobile Cloud Computing ( MCC )
Energy Efficient Mobile Applications with Mobile Cloud Computing ( MCC )Anand Bhojan
 
Security and privacy issues with mobile cloud computing applications june 2016
Security and privacy issues with mobile cloud computing applications june 2016Security and privacy issues with mobile cloud computing applications june 2016
Security and privacy issues with mobile cloud computing applications june 2016Merlec Mpyana
 
Market oriented mobile cloud computing architecture
Market oriented mobile cloud computing architectureMarket oriented mobile cloud computing architecture
Market oriented mobile cloud computing architectureSaeid Abolfazli
 
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud Computing
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud ComputingQoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud Computing
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud ComputingReza Rahimi
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud ComputingPooja Sharma
 

What's hot (20)

Details About Mobile Cloud Computing
Details About Mobile Cloud ComputingDetails About Mobile Cloud Computing
Details About Mobile Cloud Computing
 
Mobile Cloud Computing
Mobile Cloud Computing Mobile Cloud Computing
Mobile Cloud Computing
 
An insight for Mobile Cloud Computing (MCC)
An insight for Mobile Cloud Computing (MCC)An insight for Mobile Cloud Computing (MCC)
An insight for Mobile Cloud Computing (MCC)
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
Mobile Cloud Computing : The Upcoming Trend !
Mobile Cloud Computing : The Upcoming Trend !Mobile Cloud Computing : The Upcoming Trend !
Mobile Cloud Computing : The Upcoming Trend !
 
Mobile cloud computing - Introduction
Mobile cloud computing - IntroductionMobile cloud computing - Introduction
Mobile cloud computing - Introduction
 
Mobile-Cloud Computing
Mobile-Cloud ComputingMobile-Cloud Computing
Mobile-Cloud Computing
 
Mcc architecture
Mcc architectureMcc architecture
Mcc architecture
 
Research Seminar Presentation - A framework for partitioning and execution of...
Research Seminar Presentation - A framework for partitioning and execution of...Research Seminar Presentation - A framework for partitioning and execution of...
Research Seminar Presentation - A framework for partitioning and execution of...
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Mobile Cloud Computing by FuGenX
Mobile Cloud Computing by FuGenXMobile Cloud Computing by FuGenX
Mobile Cloud Computing by FuGenX
 
Energy Efficient Mobile Applications with Mobile Cloud Computing ( MCC )
Energy Efficient Mobile Applications with Mobile Cloud Computing ( MCC )Energy Efficient Mobile Applications with Mobile Cloud Computing ( MCC )
Energy Efficient Mobile Applications with Mobile Cloud Computing ( MCC )
 
Security and privacy issues with mobile cloud computing applications june 2016
Security and privacy issues with mobile cloud computing applications june 2016Security and privacy issues with mobile cloud computing applications june 2016
Security and privacy issues with mobile cloud computing applications june 2016
 
Market oriented mobile cloud computing architecture
Market oriented mobile cloud computing architectureMarket oriented mobile cloud computing architecture
Market oriented mobile cloud computing architecture
 
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud Computing
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud ComputingQoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud Computing
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud Computing
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud Computing
 

Viewers also liked

Mobile Security Solution - Cloud Computing Major Project
Mobile Security Solution - Cloud Computing Major ProjectMobile Security Solution - Cloud Computing Major Project
Mobile Security Solution - Cloud Computing Major ProjectTarun Gupta
 
Mobile Privacy Consumer Survey Results by Harris Interactive & TRUSTe
Mobile Privacy Consumer Survey Results by Harris Interactive & TRUSTeMobile Privacy Consumer Survey Results by Harris Interactive & TRUSTe
Mobile Privacy Consumer Survey Results by Harris Interactive & TRUSTeJanet Jaiswal
 
Advances In Satellite Communication
Advances In Satellite CommunicationAdvances In Satellite Communication
Advances In Satellite Communicationabhijeet rasal
 
Mobile based authentication and payment
Mobile based authentication and paymentMobile based authentication and payment
Mobile based authentication and paymentJosef Noll
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Adz91 Digital Ads Pvt Ltd
 
Broadband wireless communications
Broadband wireless communicationsBroadband wireless communications
Broadband wireless communicationsNagu Omsi
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing securityZachariah Pabi
 
MULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSMULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSKathirvel Ayyaswamy
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 
Designing for privacy in mobile applications
Designing for privacy in mobile applicationsDesigning for privacy in mobile applications
Designing for privacy in mobile applicationsVodafone developer
 
Designing for Privacy in Mobile and Web Apps - Interaction '14, Amsterdam
Designing for Privacy in Mobile and Web Apps - Interaction '14, AmsterdamDesigning for Privacy in Mobile and Web Apps - Interaction '14, Amsterdam
Designing for Privacy in Mobile and Web Apps - Interaction '14, AmsterdamAmber Case
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingIGEEKS TECHNOLOGIES
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud ComputingSimeon Oriko
 

Viewers also liked (20)

Mobile Security Solution - Cloud Computing Major Project
Mobile Security Solution - Cloud Computing Major ProjectMobile Security Solution - Cloud Computing Major Project
Mobile Security Solution - Cloud Computing Major Project
 
Mobile Privacy Consumer Survey Results by Harris Interactive & TRUSTe
Mobile Privacy Consumer Survey Results by Harris Interactive & TRUSTeMobile Privacy Consumer Survey Results by Harris Interactive & TRUSTe
Mobile Privacy Consumer Survey Results by Harris Interactive & TRUSTe
 
Advances In Satellite Communication
Advances In Satellite CommunicationAdvances In Satellite Communication
Advances In Satellite Communication
 
Mobile based authentication and payment
Mobile based authentication and paymentMobile based authentication and payment
Mobile based authentication and payment
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
Broadband wireless communications
Broadband wireless communicationsBroadband wireless communications
Broadband wireless communications
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing security
 
Cognitive radio
Cognitive radioCognitive radio
Cognitive radio
 
MULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSMULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKS
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Multimedia Network
Multimedia NetworkMultimedia Network
Multimedia Network
 
Designing for privacy in mobile applications
Designing for privacy in mobile applicationsDesigning for privacy in mobile applications
Designing for privacy in mobile applications
 
3 g vs 4g
3 g vs 4g3 g vs 4g
3 g vs 4g
 
Designing for Privacy in Mobile and Web Apps - Interaction '14, Amsterdam
Designing for Privacy in Mobile and Web Apps - Interaction '14, AmsterdamDesigning for Privacy in Mobile and Web Apps - Interaction '14, Amsterdam
Designing for Privacy in Mobile and Web Apps - Interaction '14, Amsterdam
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
3g 4g ppt
3g 4g ppt3g 4g ppt
3g 4g ppt
 
Introduction to 3G
Introduction to 3GIntroduction to 3G
Introduction to 3G
 
3g & 4g technology
3g & 4g technology3g & 4g technology
3g & 4g technology
 

Similar to Security and Privacy in Mobile Cloud Computing

C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
Mobile computing
Mobile computingMobile computing
Mobile computingamellia27
 
mobile infrastructure management
mobile infrastructure managementmobile infrastructure management
mobile infrastructure managementAkhil Kumar
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network securityAnkit Anand
 
Android vulnerability study
Android vulnerability studyAndroid vulnerability study
Android vulnerability studySri Harsha Pamu
 
Mobile Device Security Training
Mobile Device Security TrainingMobile Device Security Training
Mobile Device Security TrainingBryan Len
 
Presentation on 5G security
Presentation on 5G securityPresentation on 5G security
Presentation on 5G securityRanjitUpadhyay4
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture materialAnkit Gupta
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAJorge Sebastiao
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedAsyathShahina
 
Discover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid CloudDiscover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid CloudLaurenWendler
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...Ulf Mattsson
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...SubmissionResearchpa
 
Securing the Mobile Enterprise
Securing the Mobile EnterpriseSecuring the Mobile Enterprise
Securing the Mobile EnterpriseIBM Danmark
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information TransparencyUsman Arshad
 

Similar to Security and Privacy in Mobile Cloud Computing (20)

C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
mobile infrastructure management
mobile infrastructure managementmobile infrastructure management
mobile infrastructure management
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Android vulnerability study
Android vulnerability studyAndroid vulnerability study
Android vulnerability study
 
Mobile Device Security Training
Mobile Device Security TrainingMobile Device Security Training
Mobile Device Security Training
 
Presentation on 5G security
Presentation on 5G securityPresentation on 5G security
Presentation on 5G security
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture material
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSA
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it used
 
Discover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid CloudDiscover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid Cloud
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 
Ubiquity
UbiquityUbiquity
Ubiquity
 
Securing the Mobile Enterprise
Securing the Mobile EnterpriseSecuring the Mobile Enterprise
Securing the Mobile Enterprise
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 

More from Ram Kumar K R

Z transforms and their applications
Z transforms and their applicationsZ transforms and their applications
Z transforms and their applicationsRam Kumar K R
 
A brief introduction to Spintronics
A brief introduction to SpintronicsA brief introduction to Spintronics
A brief introduction to SpintronicsRam Kumar K R
 
File systems for mobile phones or handheld devices
File systems for mobile phones or handheld devices File systems for mobile phones or handheld devices
File systems for mobile phones or handheld devices Ram Kumar K R
 
connecting discrete mathematics and software engineering
connecting discrete mathematics and software engineeringconnecting discrete mathematics and software engineering
connecting discrete mathematics and software engineeringRam Kumar K R
 
Alternate sources of energy
Alternate sources of energy  Alternate sources of energy
Alternate sources of energy Ram Kumar K R
 
Inroduction to Cloud databases
Inroduction to Cloud databasesInroduction to Cloud databases
Inroduction to Cloud databasesRam Kumar K R
 
Google and it's management Strategies
Google and it's management StrategiesGoogle and it's management Strategies
Google and it's management StrategiesRam Kumar K R
 

More from Ram Kumar K R (8)

Z transforms and their applications
Z transforms and their applicationsZ transforms and their applications
Z transforms and their applications
 
A brief introduction to Spintronics
A brief introduction to SpintronicsA brief introduction to Spintronics
A brief introduction to Spintronics
 
File systems for mobile phones or handheld devices
File systems for mobile phones or handheld devices File systems for mobile phones or handheld devices
File systems for mobile phones or handheld devices
 
connecting discrete mathematics and software engineering
connecting discrete mathematics and software engineeringconnecting discrete mathematics and software engineering
connecting discrete mathematics and software engineering
 
Alternate sources of energy
Alternate sources of energy  Alternate sources of energy
Alternate sources of energy
 
Inroduction to Cloud databases
Inroduction to Cloud databasesInroduction to Cloud databases
Inroduction to Cloud databases
 
Airports
AirportsAirports
Airports
 
Google and it's management Strategies
Google and it's management StrategiesGoogle and it's management Strategies
Google and it's management Strategies
 

Recently uploaded

MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 

Recently uploaded (20)

MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 

Security and Privacy in Mobile Cloud Computing

  • 1. Security and Privacy in Mobile Cloud Computing Ganesh Arkalgud(1RV11IS021) Ram Kumar K R(1RV11IS042) Mohammed Ehab(1RV11IS032) Original paper by: Hui Suo Zhuohua Liu JiafuWan Keliang Zhou
  • 2. Introduction • Advantages of cloud computing 1. On-demand self service 2. Extendibility • What is mobile cloud computing?
  • 3.
  • 4. Products offered in mobile cloud segment • Android OS. • LiveMesh. • iCloud.
  • 5. Factors affecting growth of mobile cloud segment • Battery life dependencies. • Limited resources of mobile devices. • Wireless bandwidth and delay. • Security of mobile cloud devices. • Limited calculation speed.
  • 6. Model of Mobile Cloud Computing
  • 7. SECURITY AND PRIVACY ISSUES IN MOBILE CLOUD COMPUTING
  • 8. Mobile terminal security issues • Mobile Terminal. 1. Open source OS 2. Third party software 3. Malware • Software vulnerabilities 1. Data transfer with phone and computer using FTP. • Mis-operation without knowledge.
  • 9. Mobile Network Security 1. Phone service. 2. SMS. 3. Wi-fi 4. Bluetooth etc.,
  • 10. Mobile Cloud • Platform Reliability susceptible to being attacked with DOS • Data and Privacy Protection ownership and management of the users' data To protect the sensitive data, the single means is not enough. We need a complete security solution to protect the data security and privacy of users.
  • 11. CURRENT SECURITY AND PRIVACY APROACHES FOR MOBILE CLOUD COMPUTING
  • 12. Aiming at Mobile Terminal Security • Anti-malware Ex: Cloud AV • Software vulnerabilities • Regulating Users' Behavior
  • 13. Aiming at Mobile Network Security • Encryption • Security Protocol
  • 14. Aiming at Mobile Cloud Security • Protection to Platform Reliability • Data Encryption and Key Management • Authentication and Access Control • Privacy Protection