Difference between revisions of "Journal:Virtualization-based security techniques on mobile cloud computing: Research gaps and challenges"
Shawndouglas (talk | contribs) (Saving and adding more.) |
Shawndouglas (talk | contribs) (Saving and adding more.) |
||
Line 26: | Line 26: | ||
==Introduction== | ==Introduction== | ||
Nowadays, [[cloud computing]] is an attractive technology that is known to have an increasing importance for users by delivering services over the internet. It is defined as an information technology (IT) paradigm that allows the user to exploit cloud services in an on-demand way.<ref name="DengAHOme11">{{cite journal |title=A Home Healthcare System in the Cloud--Addressing Security and Privacy Challenges |journal=IEEE 4th International Conference on Cloud Computing |author=Deng, M.; Petkovic, M.; Nalin, M. et al. |pages=549-556 |year=2011 |doi=10.1109/CLOUD.2011.108}}</ref> Three main services are provided: infrastructure as a service (IaaS), platform as a service (PaaS), and [[software as a service]] (SaaS). In IaaS, virtualization relies on sharing computing resources rather than having personal mobile devices to handle and to perform applications and tasks simultaneously and efficiently.<ref name=" | Nowadays, [[cloud computing]] is an attractive technology that is known to have an increasing importance for users by delivering services over the internet. It is defined as an information technology (IT) paradigm that allows the user to exploit cloud services in an on-demand way.<ref name="DengAHOme11">{{cite journal |title=A Home Healthcare System in the Cloud--Addressing Security and Privacy Challenges |journal=IEEE 4th International Conference on Cloud Computing |author=Deng, M.; Petkovic, M.; Nalin, M. et al. |pages=549-556 |year=2011 |doi=10.1109/CLOUD.2011.108}}</ref> Three main services are provided: infrastructure as a service (IaaS), platform as a service (PaaS), and [[software as a service]] (SaaS). In IaaS, virtualization relies on sharing computing resources rather than having personal mobile devices to handle and to perform applications and tasks simultaneously and efficiently.<ref name="RahimiMobile14">{{cite journal |title=Mobile Cloud Computing: A Survey, State of Art and Future Directions |journal=Mobile Networks and Applications |author=Rahimi, M.R.; Rn, J.; Liu, C.H. et al. |volume=19 |issue=2 |pages=133–43 |year=2014 |doi=10.1007/s11036-013-0477-4}}</ref> | ||
Mobile cloud computing (MCC) has quickly grown in popularity among individuals and user communities. It combines the cloud computing paradigm with mobile devices through wireless technology in order to avoid the devices’ capacity restrictions and leverage the resources offered by cloud computing services.<ref name="ZhangEnsuring17">{{cite journal |title=Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing |journal=Information Sciences |author=Zhang, Y.; Chen, X.; Li, J. et al. |volume=379 |pages=42–61 |year=2017 |doi=10.1016/j.ins.2016.04.015}}</ref> Mobile devices such as smartphone and tablets have several limitations in their resource capacities (CPU, memory, and storage space) which inhibit application developers from providing powerful software solutions and hinder users in enjoying those solutions in their daily life.<ref name="RahimiMobile14" /> Integrating cloud computing services with mobile computing is an interesting solution towards solving these issues. MCC allows users to upload and move their applications, services, and data on shared cloud servers, taking advantage of their large remote storage capacity and significant computing resources when running intensive applications, taking the strain off the battery life of mobile devices. Recently, the use of mobile devices has moved beyond simple applications and into more complex and crucial applications which deal with sensitive data in various multimedia formats (text, images, audio, and video), including banking, health, and transport applications. The moving of clients’ data and services to the cloud raises many security challenges, particularly involving the major concerns of data security and privacy protection due to data being located in different distributed places. | |||
==References== | ==References== |
Revision as of 20:29, 3 September 2019
Full article title | Virtualization-based security techniques on mobile cloud computing: Research gaps and challenges |
---|---|
Journal | International Journal of Interactive Mobile Technologies |
Author(s) | Annane, Boubakeur; Ghazali, Osman |
Author affiliation(s) | Universiti Utara Malaysia |
Primary contact | Email: jakhar256 at yahoo dot com |
Year published | 2019 |
Volume and issue | 13(4) |
Page(s) | 20–32 |
DOI | 10.3991/ijim.v13i04.10515 |
ISSN | 1865-7923 |
Distribution license | Creative Commons Attribution 3.0 Austria |
Website | https://online-journals.org/index.php/i-jim/article/view/10515 |
Download | https://online-journals.org/index.php/i-jim/article/download/10515/5587 (PDF) |
Abstract
The principle constraints of mobile devices are their limited resources, including processing capability, storage space, and battery life. However, cloud computing offers a means of vast computing resources and services. With it a new idea emerged, the inclusion of cloud computing into mobile devices such as smartphones, tablet, and other personal digital assistants (PDA) to augment their capacities, providing a robust technology called mobile cloud computing (MCC). Although MCC has brought many advantages to mobile users, it also still suffers from the security and privacy issues of data while hosted on virtual machines (VM) on remote cloud’s servers. Currently, the eyes of security experts are turned towards the virtualization-based security techniques used either on the cloud or on mobile devices. The new challenge is to develop secure methods in order to authenticate highly sensitive digital content. This paper investigates the main challenges regarding the security and privacy issues inherent to the mobile cloud, focusing on the virtualization issue layer and giving clear strengths and weaknesses of recent relevant virtualization security techniques existing in the literature. Hence, the paper provides perspectives for researchers to adapt in order to achieve progress with future work.
Keywords: mobile cloud computing; virtualization; security and privacy of information; user virtual machines
Introduction
Nowadays, cloud computing is an attractive technology that is known to have an increasing importance for users by delivering services over the internet. It is defined as an information technology (IT) paradigm that allows the user to exploit cloud services in an on-demand way.[1] Three main services are provided: infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). In IaaS, virtualization relies on sharing computing resources rather than having personal mobile devices to handle and to perform applications and tasks simultaneously and efficiently.[2]
Mobile cloud computing (MCC) has quickly grown in popularity among individuals and user communities. It combines the cloud computing paradigm with mobile devices through wireless technology in order to avoid the devices’ capacity restrictions and leverage the resources offered by cloud computing services.[3] Mobile devices such as smartphone and tablets have several limitations in their resource capacities (CPU, memory, and storage space) which inhibit application developers from providing powerful software solutions and hinder users in enjoying those solutions in their daily life.[2] Integrating cloud computing services with mobile computing is an interesting solution towards solving these issues. MCC allows users to upload and move their applications, services, and data on shared cloud servers, taking advantage of their large remote storage capacity and significant computing resources when running intensive applications, taking the strain off the battery life of mobile devices. Recently, the use of mobile devices has moved beyond simple applications and into more complex and crucial applications which deal with sensitive data in various multimedia formats (text, images, audio, and video), including banking, health, and transport applications. The moving of clients’ data and services to the cloud raises many security challenges, particularly involving the major concerns of data security and privacy protection due to data being located in different distributed places.
References
- ↑ Deng, M.; Petkovic, M.; Nalin, M. et al. (2011). "A Home Healthcare System in the Cloud--Addressing Security and Privacy Challenges". IEEE 4th International Conference on Cloud Computing: 549-556. doi:10.1109/CLOUD.2011.108.
- ↑ 2.0 2.1 Rahimi, M.R.; Rn, J.; Liu, C.H. et al. (2014). "Mobile Cloud Computing: A Survey, State of Art and Future Directions". Mobile Networks and Applications 19 (2): 133–43. doi:10.1007/s11036-013-0477-4.
- ↑ Zhang, Y.; Chen, X.; Li, J. et al. (2017). "Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing". Information Sciences 379: 42–61. doi:10.1016/j.ins.2016.04.015.
Notes
This presentation attempts to remain faithful to the original, with only a few minor changes to presentation. Grammar and punctuation has been updated reasonably to improve readability. In some cases important information was missing from the references, and that information was added.