Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Security and Privacy in Mobile Cloud Computing

1,086 views

Published on

Based on a paper on the same name. Security and Privacy in Mobile Cloud Computing

Published in: Technology
  • I’ve personally never heard of companies who can produce a paper for you until word got around among my college groupmates. My professor asked me to write a research paper based on a field I have no idea about. My research skills are also very poor. So, I thought I’d give it a try. I chose a writer who matched my writing style and fulfilled every requirement I proposed. I turned my paper in and I actually got a good grade. I highly recommend ⇒ www.HelpWriting.net ⇐
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Security and Privacy in Mobile Cloud Computing

  1. 1. Security and Privacy in Mobile Cloud Computing Ganesh Arkalgud(1RV11IS021) Ram Kumar K R(1RV11IS042) Mohammed Ehab(1RV11IS032) Original paper by: Hui Suo Zhuohua Liu JiafuWan Keliang Zhou
  2. 2. Introduction • Advantages of cloud computing 1. On-demand self service 2. Extendibility • What is mobile cloud computing?
  3. 3. Products offered in mobile cloud segment • Android OS. • LiveMesh. • iCloud.
  4. 4. Factors affecting growth of mobile cloud segment • Battery life dependencies. • Limited resources of mobile devices. • Wireless bandwidth and delay. • Security of mobile cloud devices. • Limited calculation speed.
  5. 5. Model of Mobile Cloud Computing
  6. 6. SECURITY AND PRIVACY ISSUES IN MOBILE CLOUD COMPUTING
  7. 7. Mobile terminal security issues • Mobile Terminal. 1. Open source OS 2. Third party software 3. Malware • Software vulnerabilities 1. Data transfer with phone and computer using FTP. • Mis-operation without knowledge.
  8. 8. Mobile Network Security 1. Phone service. 2. SMS. 3. Wi-fi 4. Bluetooth etc.,
  9. 9. Mobile Cloud • Platform Reliability susceptible to being attacked with DOS • Data and Privacy Protection ownership and management of the users' data To protect the sensitive data, the single means is not enough. We need a complete security solution to protect the data security and privacy of users.
  10. 10. CURRENT SECURITY AND PRIVACY APROACHES FOR MOBILE CLOUD COMPUTING
  11. 11. Aiming at Mobile Terminal Security • Anti-malware Ex: Cloud AV • Software vulnerabilities • Regulating Users' Behavior
  12. 12. Aiming at Mobile Network Security • Encryption • Security Protocol
  13. 13. Aiming at Mobile Cloud Security • Protection to Platform Reliability • Data Encryption and Key Management • Authentication and Access Control • Privacy Protection
  14. 14. Summary
  15. 15. THANK YOU

×