Security Management in Mobile Cloud Computing: Security and Privacy Issues and Solutions in Mobile Cloud Computing

Security Management in Mobile Cloud Computing: Security and Privacy Issues and Solutions in Mobile Cloud Computing

Basudeo Singh (R. V. College of Engineering, India) and Jasmine K.S. (R. V. College of Engineering, India)
Copyright: © 2017 |Pages: 21
DOI: 10.4018/978-1-5225-0602-7.ch007
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Mobile cloud computing is a technique or model in which mobile applications are built, powered and hosted using cloud computing technology. In Mobile Cloud computing we can store information regarding sender, data and receiver on cloud through mobile application. As we store more and more information on cloud by client, security issue will arise. This chapter presents a review on the mobile cloud computing concepts as well as security issues and vulnerabilities affecting Cloud Systems and the possible solutions available to such issues within the context of cloud computing. It also describes the pros and cons of the existing security strategy and also introduces the existing issues in cloud computing such as data integrity, data segregation, and security.
Chapter Preview
Top

End To End Security Architecture Of Mobile Cloud Computing

Protecting user privacy and data/application secrecy from adversary is a key to establish and maintain consumers’ trust in the mobile platform, especially in MCC. A general architecture in a broader sense was as depicted in Figure1.

Figure 1.

End to end mobile cloud computing security architecture

In the following, the security related issues in MCC are introduced in two categories: the security for mobile users and the security for data.

  • 1.

    Security for Mobile Users: Mobile devices such as cellular phone, PDA, and smartphone are exposed to numerous security threats like malicious codes (e.g., virus, worm, and Trojan horses) and their vulnerability. In addition, with mobile phones integrated global positioning system (GPS) device, they can cause privacy issues for subscribers.

  • 2.

    Securing Data on Clouds: Although both mobile users and application developers benefit from storing a large amount of data/applications on a cloud, they should be careful of dealing with the data/applications in terms of their integrity, authentication, and digital rights.

Top

Types Of Security Breaches And Issues

Data Ownership

Cloud computing provides the facility to store the personal data and purchased digital media such as e-books, video and audio files remotely. For a user, there is a chance of risk to lose the access to the purchased media data. To avoid these types of risks, the user should be aware of the different rights regarding the purchased media. MCC utilizes the context information such as locations and capabilities of devices and user profiles, which can be used by the mobile cloud server to locally optimize the access management.

Complete Chapter List

Search this Book:
Reset