Mobile Cloud Computing



Similar documents
Mobile Hybrid Cloud Computing Issues and Solutions

Mobile Cloud Computing. Chamitha de Alwis, PhD Senior Lecturer University of Sri Jayewardenepura

Significance of Tokenization in Promoting Cloud Based Secure Elements

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

Mobile Cloud Computing: Survey & Discussion. Jianting Yue Sep 27, 2013

NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro

Embedded Java & Secure Element for high security in IoT systems

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

Secure Authentication for the Development of Mobile Internet Services Critical Considerations

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

MOBILE APPLICATIONS AND CLOUD COMPUTING. Roberto Beraldi

Applying the NFC Secure Element in Mobile Identity Apps. RANDY VANDERHOOF Executive Director Smart Card Alliance

Mobile NFC 101. Presenter: Nick von Dadelszen Date: 31st August 2012 Company: Lateral Security (IT) Services Limited

Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战

Bringing Security & Interoperability to Mobile Transactions. Critical Considerations

Performance Management for Cloudbased STC 2012

Secure Smart Objects: Issues and Research trends

Security Considerations for Public Mobile Cloud Computing

Your Mobile Phone as a Ticket (NFC)

EMV-TT. Now available on Android. White Paper by

Testing & Assuring Mobile End User Experience Before Production. Neotys

Chapter 1: Introduction

Chytré karty opět o rok dál...

M 2 M IWG. Eclipse, M2M and the Internet of Things. Overview. M 2 M Industry WorkGroup! M2M?

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.

Training MIFARE SDK. Public. MobileKnowledge June 2015

Using RFID Techniques for a Universal Identification Device

Mobile MasterCard PayPass Testing and Approval Guide. December Version 2.0

Key & Data Storage on Mobile Devices

Index. 1-FLYPOS hardware/firmware Technology Overview 2-FLYPOS software architecture 3-Gateway/Acquirer Interface 4-Letters of Approval

ACI TOKEN MANAGER FOR MOBILE: TOKEN SERVICE PROVISION, HCE AND EMBEDDED SECURE ELEMENT IN THE CLOUD

Smart Cards a(s) Safety Critical Systems

Introduction: Why do we need computer networks?

Android pay. Frequently asked questions

Using an NFC-equipped mobile phone as a token in physical access control

DEVELOPING NFC APPS for BLACKBERRY

CHAPTER 8 CLOUD COMPUTING

HCE, Apple Pay The shock of simplifying the NFC? paper

Mobile Cloud Computing: Approaches and Issues

Global Identity Management of Virtual Machines Based on Remote Secure Elements

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

Smart Card Technology Capabilities

An NFC Ticketing System with a new approach of an Inverse Reader Mode

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

NACCU Migrating to Contactless:

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

NFC. Technical Overview. Release r05

Common requirements and recommendations on interoperable media and multi-application management

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

The OpenEapSmartcard platform. Pr Pascal Urien ENST Paris

Mobile Cloud Computing Security Considerations

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya

Ways to Use USB in Embedded Systems

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada

LESSON 13 VIRTUALIZATION AND CLOUD COMPUTING

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

Secure Containers. Jan Imagination Technologies HGI Dec, 2014 p1

NFC Application Mobile Payments

Cloud Computing for SCADA

Cloud Computing. Adam Barker

Cloud Computing Technology

IoT concepts Andrea Acquaviva EDA group Politecnico di Torino, Italy

Mobile Electronic Payments

Security in ST : From Company to Products

How To Understand Cloud Computing

Loyalty Systems over Near Field Communication (NFC)

Banking. Extending Value to Customers. KONA Banking product matrix. is leading the next generation of payment solutions.

WIND RIVER INTELLIGENT DEVICE PLATFORM XT


Norton Mobile Privacy Notice

Analysis of advanced issues in mobile security in android operating system

SierraVMI Sizing Guide

SINGLE DEVICE FOR MULTIPLE TASKS

emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge

IRT84. Irt84. Datasheet. EMV L1 compliant terminal with ISO14443A/B. 1

Securing the future of mobile services. SIMalliance Open Mobile API. An Introduction v2.0. Security, Identity, Mobility

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

Mark Bennett. Search and the Virtual Machine

advant advanced contactless smart card system

NFC Mobile Handset High Level Requirements V2

MOBILE SMARTPHONES AS SECURE SIGNATURE-CREATION DEVICES

VIA COLLAGE Deployment Guide

Computer Science. About PaaS Security. Donghoon Kim Henry E. Schaffer Mladen A. Vouk

<t base Trusted Application Development

Seminar: Security Metrics in Cloud Computing ( se)

Planning the Migration of Enterprise Applications to the Cloud

M2M For industrial and automotive

Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009

Java Card. Smartcards. Demos. . p.1/30

Transcription:

Mobile Cloud Computing Dr Samia Bouzefrane Laboratoire CEDRIC CNAM, 292 rue Saint Martin http://cedric.cnam.fr/~bouzefra samia.bouzefrane@cnam.fr 1

Agenda Mobile Cloud computing Mobile trusted computing Cloud computing Security Issues Mobile Cloud Computing & Internet of Things Convergence samia.bouzefrane@cnam.fr 2

Context/Involvement CNRS Action on SecureSmart Objects& Internet of ThingsduGDR ASR http://samovar.telecom-sudparis.eu/spip.php?rubrique157 Book on Smart Cards(in French Les Cartes à puce, Sept. 2013, coordinatedby S. Bouzefrane& P. Paradinas, ISBN : 9782746239135) Book on identitymanagement Systems(in French La gestion des identités numériques, coordinatedby M. Laurent & S. Bouzefrane, to appear oct. 2014, Ed. ISTE). samia.bouzefrane@cnam.fr 3

Mobile Cloud Computing samia.bouzefrane@cnam.fr 4

Mobile Cloud Computing Mobile Computing Untrustedmobile devices with limited resources Trusted Platforms for trusted computing Smart cards (contact, contactless), Secure Elements/NFC, Trusted Execution Environment Etc. Cloud Computing Elastic on-demand resource provisioning with minimum management effort samia.bouzefrane@cnam.fr 5

Trusted platforms for mobile devices samia.bouzefrane@cnam.fr 6

Smart cards as secure devices samia.bouzefrane@cnam.fr 7

According to Eurosmart Smart Secure Device (Mu) Smart Secure Contactless (Mu) NFC Secure Elements (Mu) Source Eurosmart, Nov. 2013: http://www.eurosmart.com/publications/market-overview samia.bouzefrane@cnam.fr 8

ISO7816 Standard The standard ISO 7816-1 defines the physical characteristics of the card The standard ISO 7816-2 defines theposition ofthecontacts within the card The standard ISO 7816-3 defines theelectricsignalsusedto communicate with the card The standard ISO 7816-4 defines the basic commands to interact with the smart cards samia.bouzefrane@cnam.fr 9

Card Contacts in ISO7816-2 APDU protocol for communication samia.bouzefrane@cnam.fr 10

APDU communication Mobile SIM samia.bouzefrane@cnam.fr 11

Physical characteristics Monolithic component : CPU (8, 16, 32 bits) PROM (32 to 64 KB) containsos (JVM) RAM (1 to 4 KB) EEPROM/Flash 1KB to 128 KB (256 KB for Java Card) contains data and applications I/O interface crypto processor samia.bouzefrane@cnam.fr 12

A safety box Stores security keys and sensitive data Implements cryptographic algorithms Crypto-processor Physical sensors (light, power) Used for authentication and encryption SIM card authentication with the cell networks Banking card authentication with payment terminals samia.bouzefrane@cnam.fr 13

Java Card platforms 99% of SIM Cards are Java Card platforms samia.bouzefrane@cnam.fr 14

Java Card Specification Java Card 3 Specification by Oracle Classic edition (extension of Java Card 2.2) Java Card API Specification Java Card Runtime Environment Specification Java Card Virtual Machine Specification Connected edition (Web oriented, not deployed) Global Platform defines a trust environment in multi-application cards (used in Java Card platforms) samia.bouzefrane@cnam.fr 15

GlobalPlatformCardSpecification v2.2.1 Controlling Authorities' Security Domain(s) Global Services Application(s) Application Providers' Security Domain(s) Issuer's Security Domain Application Provider Application(s) Card Issuer Application(s) GP API RTE API OPEN and GP Trusted Framework Runtime Environment samia.bouzefrane@cnam.fr 16

Security domains in Java Card In Java Card platforms Each application (package) in a Security Domain Many applications from distinct providers may co-exist in the same card A firewall applet checks the isolation Each application has its own trusted execution environment The applications may share objects samia.bouzefrane@cnam.fr 17

Secure Elements samia.bouzefrane@cnam.fr 18

Secure Elements are Java Card platforms SIM cards (SIM centric) Embedded secure elements (Phone centric) External secure SD Card (SD centric) Use NFC capabilities distance : 0-20 cm, frequency : 13.56MHz (HF), rate: 424 kbits/s Use the security domains of GlobalPlatform samia.bouzefrane@cnam.fr 19

Secure Elements samia.bouzefrane@cnam.fr 20

NFC Forum specifications Peer to peer mode Read/Write mode Card emulation mode Applications LLCP (Logical Link Control Protocol) RTD (Record Type Definition) & NDEF (Data Exchange Format) Card Emulation (Smart Card Capability for Mobile Devices) RF Layer ISO 18092 + ISO 14443 Type A, Type B + FeliCa samia.bouzefrane@cnam.fr 21

Mobile Payment OTA Single WireProtocol(SWP) : thesim card(se) is linkedto thenfc chip. GlobalPlatform is used for isolation & security. Java Android Applications OS CPU UICC SIM Apps OS NFC Chip NFC antenna External env. samia.bouzefrane@cnam.fr 22

Standards for mobile payment / SCP (Smart Card Platform) to specify the interface between the SIM card and the chip NFC. to specify the multiapplication architecture of the secure element. for the impact on the EMV payment applications. samia.bouzefrane@cnam.fr 23

Host Card Emulation samia.bouzefrane@cnam.fr 24

HCE (Host Card Emulation) Google Solution Alternative solution for SE Software platform Implements a stack protocol to support APDU and NFC standards from Android 4.4 Motivation: to be independent from the SE providers (ex., telecom operators for SIM cards) samia.bouzefrane@cnam.fr 25

HCE http://developer.android.com/guide/topics/connectivity/nfc/hce.html NFC card emulation with a secure element NFC card emulation without a secure element HCE supports APDU stack protocol samia.bouzefrane@cnam.fr 26

Pros & Cons As a software, HCE is less secure than a secure hardware device HCE concept does not target applications with high level of security Has larger resources (memory & processor) Independent from SE providers samia.bouzefrane@cnam.fr 27

Trusted Execution Environment samia.bouzefrane@cnam.fr 28

According to GP Target mobile devices Rich OS is vulnerable to attacks SE is resilient to attacks but limited TEE can serve as a comprise between Rich OS performance and SE security https://www.globalplatform.org/documents/globalplatform_tee_white_paper_feb2011.pdf samia.bouzefrane@cnam.fr 29

Architecture of TEE https://www.globalplatform.org/documents/globalplatform_tee_white_paper_feb2011.pdf samia.bouzefrane@cnam.fr 30

Benefits of TEE Created for security and speed Has larger resources than SE RAM size (up to 1 MB), RAM speed (64bits/200 to 800MHz, Flash size (shared with Rich OS) Secure storage per application TEE may cooperate with SE Offer security mechanisms (Generation and storage of cryptographic keys, Attestation mechanism, Secure boot, etc.) Examples of implementations: SierraVisor and SierraTEE (ARM), ARM TrustZone, Trustonic TEE samia.bouzefrane@cnam.fr 31

Trusted Platform Module samia.bouzefrane@cnam.fr 32

Trusted Platform Module Manufacturers: HP, Infineon, Intel Dell, FUJITSU, etc. Convert non secure PCs, printers, mobile devices, etc. to trusted environment More than500 millions ofpcswithtpms http://trusted-computing.wikispaces.com/ M+-+TPM+Chip+can+be+turned+off+Entirely samia.bouzefrane@cnam.fr 33

Trusted Platform Module "TPM chip" or "TPM Security Device" TPM Specifications by Trusted Computing Group (consortium of companies) http://en.wikipedia.org/wiki/trusted_platform_module samia.bouzefrane@cnam.fr 34

First trusted platforms : PCs to store secret keys, to encrypt data files/messages, to sign data, etc. implement mechanisms and protocols to ensure that a platform has loaded its software properly. Have their own hardware and are independent from the operating system of the PC. samia.bouzefrane@cnam.fr 35

Cloud Computing samia.bouzefrane@cnam.fr 36

Motivations Mobile devices (e.g., smartphoneand tablet PC) are becoming an essential part of human life Explosion of mobile applications that provide services/data (e.g., iphone apps and Google apps) As a consequence, Mobile devices deal with heavy computation tasks/data (Image/video/multimedia processing, Natural language processing, Social networking, Sensor data applications, Cloud gaming, etc.) samia.bouzefrane@cnam.fr 37

Challenges Mobile devices face challenges in terms of Resources (e.g., battery life, storage, and bandwidth) Communications (e.g., mobility and security) The limited resources significantly impact the service quality samia.bouzefrane@cnam.fr 38

Cloud computing Cloud computing is viewed as a solution for mobile applications to: prolong the resources of mobile devices in elastic on-demand fashion. Cloud computing infrastructure models: public, private, hybrid Cloud computing service models: Infrastructure as a service (IaaS) Platform as a service (PaaS) Software as service (SaaS) samia.bouzefrane@cnam.fr 39

MCC definition According to: http://www.mobilecloudcomputingforum.com/ Mobile cloud computing at its simplest, refers to an infrastructure where both the data storage and data processing happen outside of the mobile device. Mobile cloud applications move the computing power and data storage away from mobile phones and into the cloud, bringing applications and MC to not just smartphone users but a much broader range of mobile subscribers. samia.bouzefrane@cnam.fr 40

Architecture of MCC samia.bouzefrane@cnam.fr 41

Advantages of MCC/1 Extending battery life: computation offloading techniques have been proposed to migrate the large computations from resource-limited resources (mobile devices) to resourceful machines (Cloud servers). Improving data storage and processing power and save energy: mobile users store/access through wireless networks to data on the Cloud (ex.; sharing photos) intensive computation may be performed on the Cloud (ex. Mobile healthcare, Mobile commerce, Mobile learning, Mobile gaming, etc.) samia.bouzefrane@cnam.fr 42

Advantages of MCC/2 Improve reliability: storing data or running computation on the Cloud improve the data and computation reliability because they are replicated in different Cloud nodes. Dynamic provisioning: is a flexible way to access data/services when desired Scalability: the deployment of mobile applications is scaled thanks to the scalability feature offered by the Cloud. H.T. Dinhet al., A survey of mobile Cloud computing, Wirel. Comm. Mob. COmput. 2013; 13:1587-1611, copyright 2011 John Wiley & Sons, Ltd. samia.bouzefrane@cnam.fr 43

Cloud as a Server A remote cloud server acting as service provider to mobile devices N. Fernando et al. / Future Generation Computer Systems 29 (2013) 84 106 samia.bouzefrane@cnam.fr 44

Important issues in Cloud Server model Low bandwidth: Unlike wired networks, the radio resource for wireless networks is scarce Service availability: unable to connect to the Cloud because of congestion, network failures, etc. samia.bouzefrane@cnam.fr 45

Alternative solutions Cloudlet(introduced by [1]) is a trusted, resource-rich computer (multi-core or a cluster of computers) that may access to the Internet, and accessible by nearby mobile devices. A concept supported by the NIST due to WIFI hotspots that are becoming powerful computers. Virtual Cloud: Built up with peer-to-peer connected mobile devices so that mobile devices are resource providers of a virtual cloud. [1]: SatyanarayananM., BahlP., CaceresR., Davies N., «The case for VM-based cloudlets in mobile computing», IEEE Pervatsive Computing 2009, 8(4): 14-23. samia.bouzefrane@cnam.fr 46

Cloudlet Elements S. Simanta, K. Ha, G. Lewis, Ed Morris, and M. Satyanarayanan, A Reference Architecture for Mobile Code Offload in Hostile Environments, http://www.cs.cmu.edu/~satya/docdir/simanta-mobicase2012.pdf samia.bouzefrane@cnam.fr 47

Cloudlet architecture The Cloudlet is the service provider N. Fernando et al. / Future Generation Computer Systems 29 (2013) 84 106 samia.bouzefrane@cnam.fr 48

Virtual Cloud The mobile devices are service providers N. Fernando et al. / Future Generation Computer Systems 29 (2013) 84 106 samia.bouzefrane@cnam.fr 49

Securityissues for MCC samia.bouzefrane@cnam.fr 50

What we need to secure? Security for mobile users Mobile devices are exposed to numerous security threats like malicious codes (e.g., virus) Securing data on Clouds Both mobile users and application developers must be careful regarding data/applications integrity and authentication. samia.bouzefrane@cnam.fr 51

Security for mobile users Security for mobile applications. A simple solution: installing security software such as antivirus programs on mobile devices Cons: mobile devices are not resourceful like PCs. Trusted platforms can be the solution SE TEE and SE TPM and SE samia.bouzefrane@cnam.fr 52

Cloud as a Server The use of a TSM (Trusted Service Management) within the Cloud. Externalize the secure processing on the Cloud (ex. Mobile payment on the Cloud) Security on Demand: allocate a SE from a Cloud of SE (CoSE) samia.bouzefrane@cnam.fr 53

Cloudlet The Cloudlet is an offloading element A TPM can be used on a Cloudlet with a TEE/SE on a mobile device samia.bouzefrane@cnam.fr 54

MCC andiotconvergence samia.bouzefrane@cnam.fr 55

Some scenarios The IoT involves objects such as sensors/actuators Healthcare (bio sensors) Home access (RFID tags) The mobile devices have also sensors Etc. In these applications, the mobile device can be used to process data collected from sensors or transfer data to a Cloud for processing samia.bouzefrane@cnam.fr 56

Trends Smart devices (like mobile devices) Can be partly or completely virtualized on the Cloud The objects (like sensors) interact with resourceful platforms like mobile devices can be virtualized on a Cloud or a Cloudlet samia.bouzefrane@cnam.fr 57

A developed scenario Implemented by two Master students (AmirAttar and Brian Kennedy) from Master of Secure Embedded and Mobile Systems of CNAM samia.bouzefrane@cnam.fr 58

Thanks gfrdsdrfg samia.bouzefrane@cnam.fr 59