Title :
Management of security and privacy issues of application development in mobile cloud environment: A survey
Author :
Jana, D. ; Bandyopadhyay, Debasis
Author_Institution :
BIT Mesra Kolkata Centre, TEOCO Software Pvt Ltd., Kolkata, India
Abstract :
The widespread adoption of programmable smart mobile devices like smart phones or Tablet and connecting to public domain of Internet as well as cloud service providers provide newer privacy as well as security challenges across enterprises. Mobile cloud computing has become extremely popular among mobile users and developers who can see a direct benefit albeit resource limitations in mobile devices including battery life, memory space or processing power. Data loss from stolen or decommissioned mobile devices, unsecured information exchange through rouge access points and access of vulnerable network fetch privacy as well as security threats of mobile cloud computing. Data breaches, account hijacking, insecure API exposure, denial of services, malicious insider attacks, loss of encryption key, virtual machine isolation bring forth some of the additional security and privacy threats. In this paper, we have attempted to enumerate several privacy plus security threats and put forth best practices and recommendations as preventive as well counter measures on incidence. We have evaluated the secure coding practices and code offloading frameworks. We have also analyzed the occurrence of software flaws in applications which were developed for payment application domain for last two years and effort put on tokenization to achieve higher level of security using cloud computing.
Keywords :
authorisation; cloud computing; computer crime; cryptography; data privacy; mobile computing; mobile radio; telecommunication security; Internet; account hijacking; application development; battery life; cloud service providers; code offloading frameworks; data breaches; data loss; decommissioned mobile devices; denial of services; encryption key loss; enterprises; insecure API exposure; malicious insider attacks; memory space; mobile cloud computing; mobile cloud environment; payment application domain; privacy threats; processing power; programmable smart mobile devices; resource limitations; rouge access points; secure coding practices; security threats; smart phones; software flaws; stolen mobile devices; tablet; tokenization; unsecured information exchange; virtual machine isolation; Adaptation models; Computational modeling; Cryptography; Databases; HTML; Mobile communication; AAA Vulnerabilities; Cloud Computing; Mobile Cloud Computing; STRIDE;
Conference_Titel :
Recent Advances and Innovations in Engineering (ICRAIE), 2014
Conference_Location :
Jaipur
Print_ISBN :
978-1-4799-4041-7
DOI :
10.1109/ICRAIE.2014.6909296