DocumentCode :
2877896
Title :
Paving the Way for Security in Cloud-Based Mobile Augmentation Systems
Author :
Reiter, Andreas ; Zefferer, Thomas
Author_Institution :
Inst. for Appl. Inf. Process. & Commun. (IAIK), Graz Univ. of Technol., Graz, Austria
fYear :
2015
fDate :
March 30 2015-April 3 2015
Firstpage :
89
Lastpage :
98
Abstract :
Despite their steadily increasing capabilities, mobile end-user devices such as smart phones often suffer from reduced processing and storage resources. Cloud-based mobile augmentation (CMA) has recently emerged as a potential solution to this problem. CMA combines concepts of cloud computing and surrogate computing in order to offload resource-intensive tasks to external resources. During the past years, different CMA frameworks have been introduced that enable the development and usage of CMA-based applications. Unfortunately, these frameworks have usually not been designed with security in mind but instead mainly focus on efficient offloading and reintegration mechanisms. Hence, reliance on CMA concepts in security-critical fields of application is currently not advisable. To address this problem, this paper surveys currently available CMA frameworks and assesses their suitability and applicability in security-critical fields of application. For this purpose, relevant security requirements are identified and mapped to the surveyed CMA frameworks. Results obtained from this assessment show that none of the surveyed CMA framework is currently able to meet all relevant security requirements. By identifying security limitations of currently available CMA frameworks, this paper represents a first important step towards development of a secure CMA framework and hence paves the way for a use of CMA-based applications in security-critical fields of application.
Keywords :
cloud computing; mobile computing; security of data; CMA-based applications; cloud computing; cloud-based mobile augmentation systems; mobile end-user devices; secure CMA framework; security-critical fields; Cloud computing; Mobile communication; Mobile computing; Mobile handsets; Outsourcing; Security; cloud-based mobile augmentation; computational offloading; cyber foraging; security analysis; surrogate computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015 3rd IEEE International Conference on
Conference_Location :
San Francisco, CA
Type :
conf
DOI :
10.1109/MobileCloud.2015.12
Filename :
7130873
Link To Document :
بازگشت