Secure Mobile Cloud Computing and Security Issues

作者: Qijun Gu , Mina Guirguis

DOI: 10.1007/978-1-4614-3296-8_3

关键词: Computer networkCloud computingCloud computing securityComputer scienceMobile computingVirtual machineComputer security modelMobile cloud computingComputer securityMobile deviceSecurity properties

摘要: The proliferation of mobile devices, coupled by the increase in their capabilities, have enabled establishment a rich computing platform that can be utilized conjunction with cloud services. In this chapter, we overview latest models and architectures focusing on security properties. particular, study wide range threats against availability, privacy integrity which devices jointly perform computation. We then present defense mechanisms ensure applications. Throughout identify potential as well possible opportunities for defenses.

参考文章(61)
Thomas Raffetseder, Christopher Kruegel, Engin Kirda, Detecting System Emulators Lecture Notes in Computer Science. pp. 1- 18 ,(2007) , 10.1007/978-3-540-75496-1_1
Ryan Riley, Xuxian Jiang, Dongyan Xu, Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing recent advances in intrusion detection. pp. 1- 20 ,(2008) , 10.1007/978-3-540-87403-4_1
Mithun Acharya, David J. Thuente, Intelligent jamming in wireless networks with applications to 802.11b and other networks military communications conference. pp. 1075- 1081 ,(2006)
Xuxian Jiang, Yajin Zhou, A Survey of Android Malware Springer, New York, NY. pp. 3- 20 ,(2013) , 10.1007/978-1-4614-7394-7_2
Steven Y. Ko, Kyungho Jeon, Ramsés Morales, The HybrEx model for confidentiality and privacy in cloud computing ieee international conference on cloud computing technology and science. pp. 8- 8 ,(2011) , 10.5555/2170444.2170452
Gary C. Kessler, Jeff Lessard, Android forensics: Simplifying cell phone examinations Small Scale Digital Device Forensics Journal. ,vol. 4, ,(2010)
Machigar Ongtang, Stephen McLaughlin, William Enck, Patrick McDaniel, Semantically rich application-centric security in Android Security and Communication Networks. ,vol. 5, pp. 658- 673 ,(2012) , 10.1002/SEC.360
Erik Learned-Miller, Robert J. Walls, Brian Neil Levine, Forensic triage for mobile phones with DEC0DE usenix security symposium. pp. 7- 7 ,(2011)
Petros Maniatis, Byung-Gon Chun, Augmented smartphone applications through clone cloud execution HotOS'09 Proceedings of the 12th conference on Hot topics in operating systems. pp. 8- 8 ,(2009)
Tal Garfinkel, Mendel Rosenblum, A Virtual Machine Introspection Based Architecture for Intrusion Detection. network and distributed system security symposium. ,(2003)