• DocumentCode
    2877896
  • Title

    Paving the Way for Security in Cloud-Based Mobile Augmentation Systems

  • Author

    Reiter, Andreas ; Zefferer, Thomas

  • Author_Institution
    Inst. for Appl. Inf. Process. & Commun. (IAIK), Graz Univ. of Technol., Graz, Austria
  • fYear
    2015
  • fDate
    March 30 2015-April 3 2015
  • Firstpage
    89
  • Lastpage
    98
  • Abstract
    Despite their steadily increasing capabilities, mobile end-user devices such as smart phones often suffer from reduced processing and storage resources. Cloud-based mobile augmentation (CMA) has recently emerged as a potential solution to this problem. CMA combines concepts of cloud computing and surrogate computing in order to offload resource-intensive tasks to external resources. During the past years, different CMA frameworks have been introduced that enable the development and usage of CMA-based applications. Unfortunately, these frameworks have usually not been designed with security in mind but instead mainly focus on efficient offloading and reintegration mechanisms. Hence, reliance on CMA concepts in security-critical fields of application is currently not advisable. To address this problem, this paper surveys currently available CMA frameworks and assesses their suitability and applicability in security-critical fields of application. For this purpose, relevant security requirements are identified and mapped to the surveyed CMA frameworks. Results obtained from this assessment show that none of the surveyed CMA framework is currently able to meet all relevant security requirements. By identifying security limitations of currently available CMA frameworks, this paper represents a first important step towards development of a secure CMA framework and hence paves the way for a use of CMA-based applications in security-critical fields of application.
  • Keywords
    cloud computing; mobile computing; security of data; CMA-based applications; cloud computing; cloud-based mobile augmentation systems; mobile end-user devices; secure CMA framework; security-critical fields; Cloud computing; Mobile communication; Mobile computing; Mobile handsets; Outsourcing; Security; cloud-based mobile augmentation; computational offloading; cyber foraging; security analysis; surrogate computing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015 3rd IEEE International Conference on
  • Conference_Location
    San Francisco, CA
  • Type

    conf

  • DOI
    10.1109/MobileCloud.2015.12
  • Filename
    7130873