Difference between revisions of "Journal:Virtualization-based security techniques on mobile cloud computing: Research gaps and challenges"

From LIMSWiki
Jump to navigationJump to search
(Saving and adding more.)
(Saving and adding more.)
Line 26: Line 26:


==Introduction==
==Introduction==
Nowadays, [[cloud computing]] is an attractive technology that is known to have an increasing importance for users by delivering services over the internet. It is defined as an information technology (IT) paradigm that allows the user to exploit cloud services in an on-demand way.<ref name="DengAHOme11">{{cite journal |title=A Home Healthcare System in the Cloud--Addressing Security and Privacy Challenges |journal=IEEE 4th International Conference on Cloud Computing |author=Deng, M.; Petkovic, M.; Nalin, M. et al. |pages=549-556 |year=2011 |doi=10.1109/CLOUD.2011.108}}</ref> Three main services are provided: infrastructure as a service (IaaS), platform as a service (PaaS), and [[software as a service]] (SaaS). In IaaS, virtualization relies on sharing computing resources rather than having personal mobile devices to handle and to perform applications and tasks simultaneously and efficiently.<ref name="ZhangEnsuring17">{{cite journal |title=Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing |journal=Information Sciences |author=Zhang, Y.; Chen, X.; Li, J. et al. |volume=379 |pages=42–61 |year=2017 |doi=10.1016/j.ins.2016.04.015}}</ref>
Nowadays, [[cloud computing]] is an attractive technology that is known to have an increasing importance for users by delivering services over the internet. It is defined as an information technology (IT) paradigm that allows the user to exploit cloud services in an on-demand way.<ref name="DengAHOme11">{{cite journal |title=A Home Healthcare System in the Cloud--Addressing Security and Privacy Challenges |journal=IEEE 4th International Conference on Cloud Computing |author=Deng, M.; Petkovic, M.; Nalin, M. et al. |pages=549-556 |year=2011 |doi=10.1109/CLOUD.2011.108}}</ref> Three main services are provided: infrastructure as a service (IaaS), platform as a service (PaaS), and [[software as a service]] (SaaS). In IaaS, virtualization relies on sharing computing resources rather than having personal mobile devices to handle and to perform applications and tasks simultaneously and efficiently.<ref name="RahimiMobile14">{{cite journal |title=Mobile Cloud Computing: A Survey, State of Art and Future Directions |journal=Mobile Networks and Applications |author=Rahimi, M.R.; Rn, J.; Liu, C.H. et al. |volume=19 |issue=2 |pages=133–43 |year=2014 |doi=10.1007/s11036-013-0477-4}}</ref>
 


Mobile cloud computing (MCC) has quickly grown in popularity among individuals and user communities. It combines the cloud computing paradigm with mobile devices through wireless technology in order to avoid the devices’ capacity restrictions and leverage the resources offered by cloud computing services.<ref name="ZhangEnsuring17">{{cite journal |title=Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing |journal=Information Sciences |author=Zhang, Y.; Chen, X.; Li, J. et al. |volume=379 |pages=42–61 |year=2017 |doi=10.1016/j.ins.2016.04.015}}</ref> Mobile devices such as smartphone and tablets have several limitations in their resource capacities (CPU, memory, and storage space) which inhibit application developers from providing powerful software solutions and hinder users in enjoying those solutions in their daily life.<ref name="RahimiMobile14" /> Integrating cloud computing services with mobile computing is an interesting solution towards solving these issues. MCC allows users to upload and move their applications, services, and data on shared cloud servers, taking advantage of their large remote storage capacity and significant computing resources when running intensive applications, taking the strain off the battery life of mobile devices. Recently, the use of mobile devices has moved beyond simple applications and into more complex and crucial applications which deal with sensitive data in various multimedia formats (text, images, audio, and video), including banking, health, and transport applications. The moving of clients’ data and services to the cloud raises many security challenges, particularly involving the major concerns of data security and privacy protection due to data being located in different distributed places.


==References==
==References==

Revision as of 20:29, 3 September 2019

Full article title Virtualization-based security techniques on mobile cloud computing: Research gaps and challenges
Journal International Journal of Interactive Mobile Technologies
Author(s) Annane, Boubakeur; Ghazali, Osman
Author affiliation(s) Universiti Utara Malaysia
Primary contact Email: jakhar256 at yahoo dot com
Year published 2019
Volume and issue 13(4)
Page(s) 20–32
DOI 10.3991/ijim.v13i04.10515
ISSN 1865-7923
Distribution license Creative Commons Attribution 3.0 Austria
Website https://online-journals.org/index.php/i-jim/article/view/10515
Download https://online-journals.org/index.php/i-jim/article/download/10515/5587 (PDF)

Abstract

The principle constraints of mobile devices are their limited resources, including processing capability, storage space, and battery life. However, cloud computing offers a means of vast computing resources and services. With it a new idea emerged, the inclusion of cloud computing into mobile devices such as smartphones, tablet, and other personal digital assistants (PDA) to augment their capacities, providing a robust technology called mobile cloud computing (MCC). Although MCC has brought many advantages to mobile users, it also still suffers from the security and privacy issues of data while hosted on virtual machines (VM) on remote cloud’s servers. Currently, the eyes of security experts are turned towards the virtualization-based security techniques used either on the cloud or on mobile devices. The new challenge is to develop secure methods in order to authenticate highly sensitive digital content. This paper investigates the main challenges regarding the security and privacy issues inherent to the mobile cloud, focusing on the virtualization issue layer and giving clear strengths and weaknesses of recent relevant virtualization security techniques existing in the literature. Hence, the paper provides perspectives for researchers to adapt in order to achieve progress with future work.

Keywords: mobile cloud computing; virtualization; security and privacy of information; user virtual machines

Introduction

Nowadays, cloud computing is an attractive technology that is known to have an increasing importance for users by delivering services over the internet. It is defined as an information technology (IT) paradigm that allows the user to exploit cloud services in an on-demand way.[1] Three main services are provided: infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). In IaaS, virtualization relies on sharing computing resources rather than having personal mobile devices to handle and to perform applications and tasks simultaneously and efficiently.[2]

Mobile cloud computing (MCC) has quickly grown in popularity among individuals and user communities. It combines the cloud computing paradigm with mobile devices through wireless technology in order to avoid the devices’ capacity restrictions and leverage the resources offered by cloud computing services.[3] Mobile devices such as smartphone and tablets have several limitations in their resource capacities (CPU, memory, and storage space) which inhibit application developers from providing powerful software solutions and hinder users in enjoying those solutions in their daily life.[2] Integrating cloud computing services with mobile computing is an interesting solution towards solving these issues. MCC allows users to upload and move their applications, services, and data on shared cloud servers, taking advantage of their large remote storage capacity and significant computing resources when running intensive applications, taking the strain off the battery life of mobile devices. Recently, the use of mobile devices has moved beyond simple applications and into more complex and crucial applications which deal with sensitive data in various multimedia formats (text, images, audio, and video), including banking, health, and transport applications. The moving of clients’ data and services to the cloud raises many security challenges, particularly involving the major concerns of data security and privacy protection due to data being located in different distributed places.

References

  1. Deng, M.; Petkovic, M.; Nalin, M. et al. (2011). "A Home Healthcare System in the Cloud--Addressing Security and Privacy Challenges". IEEE 4th International Conference on Cloud Computing: 549-556. doi:10.1109/CLOUD.2011.108. 
  2. 2.0 2.1 Rahimi, M.R.; Rn, J.; Liu, C.H. et al. (2014). "Mobile Cloud Computing: A Survey, State of Art and Future Directions". Mobile Networks and Applications 19 (2): 133–43. doi:10.1007/s11036-013-0477-4. 
  3. Zhang, Y.; Chen, X.; Li, J. et al. (2017). "Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing". Information Sciences 379: 42–61. doi:10.1016/j.ins.2016.04.015. 

Notes

This presentation attempts to remain faithful to the original, with only a few minor changes to presentation. Grammar and punctuation has been updated reasonably to improve readability. In some cases important information was missing from the references, and that information was added.