A survey of mobile cloud computing: architecture, applications, and approaches
partitioning to be highly dynamic. The authors
Download 1.54 Mb. Pdf ko'rish
|
dinh2011
partitioning to be highly dynamic. The authors find that MAUI can maximize the potential for energy savings through the fine-grained code offloading while minimizing the changes required to applications. (2) Security. Protecting user privacy and data/application secrecy from adversary is a key to establish and maintain consumers’ trust in the mobile platform, especially in MCC. In the following, the security- related issues in MCC are introduced in two categories: the security for mobile users and the security for data. Also, some solutions to address these issues are reviewed. (a) Security for mobile users. Mobile devices such as cellular phone, personal digital assis- tant (PDA), and smartphone are exposed to numerous security threats like malicious codes (e.g., virus, worm, and Trojan horses) and their vulnerability. In addition, with mobile phones integrated global positioning system (GPS) device, they can cause privacy issues for subscribers. Two main issues are as follows: Security for mobile applications. Installing and running security softwares such as Kaspersky, McAfee, and AVG antivirus programs on mobile devices are the sim- plest ways to detect security threats (e.g., virus, worms, and malicious codes) on the devices. However, mobile devices are con- strained in their processing and power; protecting them from the threats is more difficult than that for resourceful device (e.g., PC). For example, it is impossi- ble to keep running the virus detection software on mobile devices. Oberheide et al.[31] presents an approach to move the threat detection capabilities to clouds. This paradigm is an extension of the exist- ing cloud AV platform that provides an in- cloud service for malware detection. The platform consists of host agent and net- work service components [82,83]. Host agent is a lightweight process that runs on mobile devices, and its function is to inspect the file activity on a system (i.e., it is similar to the function of antivirus software). If an identified file is not avail- able in a cache of previous analyzed files, this file will be sent to the in-cloud net- work service for verification. The second major component of CloudAV is a network service that is responsible for file veri- fication. The network service will deter- mine whether a file is malicious or not. The most advantage of this solution is that moving the detection capabilities to a net- work service enables the use of multiple antivirus engines in parallel by hosting them in virtualized containers. However, to apply CloudAV platform for the mobile environment, a mobile agent should be improved and customized to fit in the mobile devices. Oberheide et al. [31] builds a mobile agent to interact with the CloudAV network service for the Linux- based Maemo platform implemented on a Nokia N800 mobile device. The mobile agent is deployed in Python and uses the Dazuko [84] framework to interpose on the system events. In particular, the mobile agent requires only 170 lines of code. As a result, it is suitable with resource-limited mobile devices. To demonstrate the effi- ciency of using CC for detecting malicious Download 1.54 Mb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling