DocumentCode
680155
Title
Policy-based security channels for protecting network communication in mobile cloud computing
Author
Itani, Wassim ; Kayssi, Ayman ; Chehab, Ali
Author_Institution
Department of Electrical and Computer Engineering, American University of Beirut, Lebanon
fYear
2011
fDate
18-21 July 2011
Firstpage
450
Lastpage
456
Abstract
In this paper we present a set of policy-driven security protocols for ensuring the confidentiality and integrity of enterprise data in mobile cloud computing environments. The proposed protocols leverage trusted authority entities and the “elastic” virtualized nature of the cloud computing model to provide energy-efficient key management mechanisms and policy-driven data protection techniques that support the secure interaction of the mobile client with an assortment of cloud software and storage services. The main contribution lies in: (1) Offloading the intensive asymmetric key agreement mechanisms from the mobile client and delegating them to resource-lucrative trusted authority sites. This is achieved by aggregating the security associations, required to agree on symmetric keys between the client and the cloud services, in a single security association between the client and the trusted authority. The aggregation concept results in major energy savings especially when the client consumes a relatively large set of services as is the case in cloud computing today. (2) Designing a customizable policy-based security architecture that considers the sensitivity of cloud data to provide multi-level and fine-grained data protection methodologies that suit the energy-limited mobile devices and the low-bandwidth wireless networks characterizing current mobile cloud computing models. The system is implemented in a real cloud computing environment and the savings in terms of energy consumption and execution time are analyzed.
Keywords
Cloud computing; Coils; Computational modeling; Cryptography; Protocols; System analysis and design; TV; Cloud computing security; Customizable security protocols; Energy-efficient security; Mobile cloud computing; Policy-driven security;
fLanguage
English
Publisher
ieee
Conference_Titel
Security and Cryptography (SECRYPT), 2011 Proceedings of the International Conference on
Conference_Location
Seville, Spain
Type
conf
Filename
6732435
Link To Document