Privacy & Security of Mobile Cloud Computing (MCC)

Similar documents
Security & Privacy Issues in Mobile Cloud Computing

A Road Map on Security Deliverables for Mobile Cloud Application

IMPROVED SECURITY SYSTEM IN MOBILE CLOUD ACCESS THROUGH FUZZY INTRUSION DETECTION TECHNIQUE

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

Mobile Cloud Computing : Issues, Security,Advantages, Trends

Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3

Privacy & Security of Mobile Cloud Computing

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao

CHAPTER 1 INTRODUCTION

Near Sheltered and Loyal storage Space Navigating in Cloud

A Secure Decentralized Access Control Scheme for Data stored in Clouds

Mobile Cloud Computing Security Considerations

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma CpE /24/2016

VoteID 2011 Internet Voting System with Cast as Intended Verification

Network Security. Chapter 9 Integrating Security Services into Communication Architectures

Security Considerations for Public Mobile Cloud Computing

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

PrivyLink Cryptographic Key Server *

Cisco Advanced Services for Network Security

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

How To Ensure Correctness Of Data In The Cloud

Secure cloud access system using JAR ABSTRACT:

SharePoint Unlimited... or how to deal with the explosive growth of unstructured data in SharePoint in a secure and transparent manner.

A Lightweight Secure SIP Model for End-to-End Communication

SCADA SYSTEMS AND SECURITY WHITEPAPER

Monitor and administer network security

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

API Management: Powered by SOA Software Dedicated Cloud

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

Basics of Internet Security

Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption

Injazat s Managed Services Portfolio

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC

How To Make A Secure Storage On A Mobile Device Secure

CS Final Exam

What is an SSL Certificate?

Cisco Which VPN Solution is Right for You?

LBSEC.

DiamondStream Data Security Policy Summary

Chapter 11 Cloud Application Development

Workshop on Building international cooperation WG2 : Network Information Security / cyber security

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

Ranked Keyword Search Using RSE over Outsourced Cloud Data

Bellevue University Cybersecurity Programs & Courses

Secure information storage

Campus LAN at NKN Member Institutions

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for BEA WebLogic

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

An introduction to Cryptosoft

A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor

Network Security Administrator

Implementing Cloud Data Security by Encryption using Rijndael Algorithm

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

Data management using Virtualization in Cloud Computing

Keyword: Cloud computing, service model, deployment model, network layer security.

Cloud Computing for hand-held Devices:Enhancing Smart phones viability with Computation Offload

IT Networking and Security

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Project Proposal. Data Storage / Retrieval with Access Control, Security and Pre-Fetching

Securing MANET Using Diffie Hellman Digital Signature Scheme

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

SaaS-Based Employee Benefits Enrollment System

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

Future Generation Computer Systems

Cisco AON Secure File Transfer Extension Module

Transcription:

Privacy & Security of Mobile Cloud Computing (MCC) Manmohan Chaturvedi Principal Advisor Research & Technology Development Beyond Evolution Tech Solutions Pvt. Ltd.

MOBILE COMPUTING CHALLENGES Mobile devices being battery powered, have limited processing power, low storage, less security, unpredictable Internet connectivity, and less energy The aforementioned limitations of mobile devices are always obstacles for computationally intensive and storage demanding applications on a mobile

MOBILE CLOUD COMPUTING (MCC) PARADIGM To augment the capability, capacity and battery time of the mobile devices, computationally intensive and storage demanding jobs should be moved to cloud Careful planning is required before offloading the jobs on a cloud server by considering the network conditions and communication overhead to make offloading beneficial for mobile users

NEEDED ECO-SYSTEM There is a need for a lightweight secure framework that provides security with minimum communication and processing overhead on mobile devices The security and privacy protection services can be achieved with the help of secure cloud application services In addition to security and privacy, the secure cloud application services provide the user management, key management, encryption on demand, intrusion detection, authentication, and authorization services to mobile users

NEEDED ECO-SYSTEM There is a need for a secure communication channel between cloud and the mobile device The most challenging aspects in MCC are guaranteeing user privacy and the provision of mobile application security that uses cloud resources.

MOBILE CLOUD COMPUTING ARCHITECTURE (A.N. KHAN ET AL.,12) A.N. KHAN ET AL. / FUTURE GENERATION COMPUTER SYSTEMS (DOI:10.1016/J.FUTURE.2012.08.003

SECURITY SERVICES ON DIFFERENT LAYERS (A.N. KHAN ET AL.,12)

MODEL FOR PROPOSED RESEARCH Zhou and Huang proposed a privacy preserving framework called Privacy Preserving Cipher Policy Attribute-Based Encryption (PP-CP-ABE) for lightweight mobile devices. (Z. Zhou, D. Huang, Efficient and secure data storage operations for mobile cloud computing, IACR Cryptology eprint Archive: 185, 2011) The proposed scheme offloads the processing and storage intensive encryption and decryption operations on cloud without revealing any information about data contents and security key.

ILLUSTRATIVE ARCHITECTURE FOR MCC (A.N. KHAN ET AL.,12)

LAYOUT OF COMMUNICATION Mobile End Low End with limited power and Computational ability WAP Gateway Act as a bridge between WAP protocol and HTTP/HTTPS protocol. Cloud Server Server end, highly efficient for computation and memory rich.

WORK ON MOBILE END Application perspective for mobile end: Lightweight Protects user data in device. Check any unauthorized attempt of accessing data within the device Application perspective for remote end: Ability to communicate securely. Can authenticate remote servers.

SECURE ROUTING PROTOCOL Ability for authenticating user. Ability to maintain trust services. Handles High level Computations on server side. Highly scalable and easy to integrate with previous technologies. Maintains the integrity of data.

WORK ON SERVER END Provide authentication. User data to be stored in encrypted form. Supports virtualization. Cross checks the identity of the user. Validates the data integrity.

PHASE 1 OF RESEARCH To analyze patterns of threats and attacks between mobile device to WAP gateway. Finding the efficient way of authentication by introducing suitable change in routing protocols. Maintain a trust service between user and server side. Using digital signatures and an interdependency model.

PHASE 2 OF RESEARCH Public Key Infrastructure will be modeled and high level computation will be performed towards server side. To validate the usefulness and the efficiency of the approach. Simulations will provide the efficiency parameter. Comparison of this developed approach with the existing approaches.

CONCLUDING REMARKS The proposed research would attempt to leverage the strengths of Mathematics and Electrical Engineering departments at IIT Delhi Any collaboration on the proposed research can be suitably coordinated by our company Beyond Evolution Tech Solutions Pvt Ltd

Thanks