Highly Secure Mobile Devices Assisted with Trusted Cloud Computing Environments

被引:10
|
作者
Oh, Doohwan [1 ]
Kim, Ilkyu [2 ]
Kim, Keunsoo [1 ]
Lee, Sang-Min [3 ]
Ro, Won Woo [1 ]
机构
[1] Yonsei Univ, Sch Elect & Elect Engn, Seoul 120749, South Korea
[2] LG Elect, DTV SoC Dev Dept, Seoul, South Korea
[3] ETRI, Broadcasting & Telecommun Media Res Lab, Taejon, South Korea
关键词
Mobile security; offloading computing; cloud computing; pattern matching; Wu-Manber;
D O I
10.4218/etrij.15.0114.0397
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile devices have been widespread and become very popular with connectivity to the Internet, and a lot of desktop PC applications are now aggressively ported to them. Unfortunately, mobile devices are often vulnerable to malicious attacks due to their common usage and connectivity to the Internet. Therefore, the demands on the development of mobile security systems increase in accordance with advances in mobile computing. However, it is very hard to run a security program on a mobile device all of the time due the device's limited computational power and battery life. To overcome these problems, we propose a novel mobile security scheme that migrates heavy computations on mobile devices to cloud servers. An efficient data transmission scheme for reducing data traffic between devices and servers over networks is introduced. We have evaluated the proposed scheme with a mobile device in a cloud environment, whereby it achieved a maximum speedup of 13.4 compared to a traditional algorithm.
引用
收藏
页码:348 / 358
页数:11
相关论文
共 50 条
  • [1] Trusted Platforms to secure Mobile Cloud Computing
    Thinh Le Vinh
    Bouzefrane, Samia
    2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 1068 - 1075
  • [2] Secure VPNs for Trusted Computing Environments
    Schulz, Steffen
    Sadeghi, Ahmad-Reza
    TRUSTED COMPUTING, PROCEEDINGS, 2009, 5471 : 197 - +
  • [3] Offloading Service Provisioning on Mobile Devices in Mobile Cloud Computing Environments
    Conti, Marco
    Mascitti, Davide
    Passarella, Andrea
    EURO-PAR 2015: PARALLEL PROCESSING WORKSHOPS, 2015, 9523 : 299 - 310
  • [4] Secure Mobile Payment via Trusted Computing
    Li, Qi
    Zhang, Xinwen
    Seifer, Jean-Pierre
    Zhong, Hulin
    APTC 2008: THIRD ASIA-PACIFIC TRUSTED INFRASTRUCTURE TECHNOLOGIES CONFERENCE, PROCEEDINGS, 2008, : 98 - +
  • [5] Secure mobile cloud computing
    Kolodziej, Joanna
    Jaatun, Martin Gilje
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (18):
  • [6] An efficient and secure data sharing scheme for mobile devices in cloud computing
    Xiuqing Lu
    Zhenkuan Pan
    Hequn Xian
    Journal of Cloud Computing, 9
  • [7] Secure Index for Resource-Constraint Mobile Devices in Cloud Computing
    Yao, Hanbing
    Xing, Nana
    Zhou, Junwei
    Xia, Zhe
    IEEE ACCESS, 2016, 4 : 9119 - 9128
  • [8] An efficient and secure data sharing scheme for mobile devices in cloud computing
    Lu, Xiuqing
    Pan, Zhenkuan
    Xian, Hequn
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2020, 9 (01):
  • [9] Trusted secure model for data services in cloud computing
    Xu, Zheng-Quan, 1600, Editorial Board of Journal on Communications (35):
  • [10] Trusted Cloud Computing with Secure Resources and Data Coloring
    Hwang, Kai
    Li, Deyi
    IEEE INTERNET COMPUTING, 2010, 14 (05) : 14 - 22