Skip to main content
Top
Published in: Mobile Networks and Applications 3/2014

01-06-2014

Toward Advanced Mobile Cloud Computing for the Internet of Things: Current Issues and Future Direction

Authors: Taeshik Shon, Jaeik Cho, Kyusunk Han, Hyohyun Choi

Published in: Mobile Networks and Applications | Issue 3/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing is the coming new era of information processing and has proved its benefits in high scalability and functional diversity. However, almost all cloud-computing architectures including SaaS, PaaS, and IaaS are vulnerable to serious security issues. Similarly, Mobile Cloud Computing (MCC) is vital to overcoming mobile limited storage and computing capabilities. MCC authentication and authorization issues must be provided on two levels: login password control and the environment from where the cloud is accessed. MCC has overcome the barrier of limited storage by providing remote storage but requires a strict security system that is responsible for retrievability, integrity, and seamless storage access. Elasticity and connectivity are also of major concern in MCC because delays and jitters cause degradation in the user experience. Cloud-computing architecture creates more challenges in maintaining security because of the liberty of users to choose any MCC architecture. Thus in this paper we discuss current cloud computing issues and future directions.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
2.
go back to reference Chen K, Zheng W (2009) Cloud Computing System examples and current research situation [J]. Softw J 5:1337–1348 Chen K, Zheng W (2009) Cloud Computing System examples and current research situation [J]. Softw J 5:1337–1348
3.
go back to reference Chen Q, Deng Q. Cloud Computing and its key techniques. Computing Applications. 100 I - 908 1 (2009) 09 - 2562 - 06 Chen Q, Deng Q. Cloud Computing and its key techniques. Computing Applications. 100 I - 908 1 (2009) 09 - 2562 - 06
4.
go back to reference Armbrust M, Fox A, Griffith R, Joseph A, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I et al (2009) Above the clouds: A Berkeley view of cloud computing. University of California, Berkeley, Tech. Rep Armbrust M, Fox A, Griffith R, Joseph A, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I et al (2009) Above the clouds: A Berkeley view of cloud computing. University of California, Berkeley, Tech. Rep
5.
go back to reference Kang C, WeiMing Z (2009) Cloud computing: system. Instance and current research. J Softw 20(5):1337–1347 Kang C, WeiMing Z (2009) Cloud computing: system. Instance and current research. J Softw 20(5):1337–1347
6.
go back to reference Dietrich K, Winter J. Towards a trustworthy, lightweight cloud computing framework for embedded systems. Proceedings of the 4th international conference on Trust and trustworthy computing, June 22–24, 2011, Pittsburgh, PA Dietrich K, Winter J. Towards a trustworthy, lightweight cloud computing framework for embedded systems. Proceedings of the 4th international conference on Trust and trustworthy computing, June 22–24, 2011, Pittsburgh, PA
7.
go back to reference Sandhu R, Boppana R, Krishnan R, Reich J, Wolff T, Zachry J. Towards a discipline of mission-aware cloud computing, Proceedings of the 2010 ACM workshop on Cloud computing security workshop, October 08-08, 2010, Chicago, Illinois, USA Sandhu R, Boppana R, Krishnan R, Reich J, Wolff T, Zachry J. Towards a discipline of mission-aware cloud computing, Proceedings of the 2010 ACM workshop on Cloud computing security workshop, October 08-08, 2010, Chicago, Illinois, USA
8.
go back to reference Zhang X, Kunjithapatham A, Jeong S, Gibbs S (2011) Towards an elastic application model for augmenting the computing capabilities of mobile devices with Cloud Computing. Mob Netw Appl 16(3):270–284CrossRef Zhang X, Kunjithapatham A, Jeong S, Gibbs S (2011) Towards an elastic application model for augmenting the computing capabilities of mobile devices with Cloud Computing. Mob Netw Appl 16(3):270–284CrossRef
9.
go back to reference Chang F, Dean J, Ghemawat S, Hsieh W, Wallach D, Burrows M, Chandra T, Fikes A, Gruber R (2006) Bigtable: A distributed storage system for structured data. In: Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI’06) Chang F, Dean J, Ghemawat S, Hsieh W, Wallach D, Burrows M, Chandra T, Fikes A, Gruber R (2006) Bigtable: A distributed storage system for structured data. In: Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI’06)
14.
go back to reference Klein A, Mannweiler C, Schneider J, Schotten HD (2010) Access Schemes for Mobile Cloud Computing. In: 2010 Eleventh International Conference on Mobile Data Management, pp 387–392 Klein A, Mannweiler C, Schneider J, Schotten HD (2010) Access Schemes for Mobile Cloud Computing. In: 2010 Eleventh International Conference on Mobile Data Management, pp 387–392
15.
go back to reference Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Shi E, Song Z. Authentication in the Clouds: A Framework and its Application to Mobile Users. CCSW’10, October 8, 2010, Chicago, Illinois, USA Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Shi E, Song Z. Authentication in the Clouds: A Framework and its Application to Mobile Users. CCSW’10, October 8, 2010, Chicago, Illinois, USA
16.
go back to reference Tsai C, Lin U, Chang AY, Chen C (2010) Information security issue of enterprises adopting the application of cloud computing. In: Networked Computing and Advanced Information Management (NCM), 2010 Sixth International Conference on, pp 645–649 Tsai C, Lin U, Chang AY, Chen C (2010) Information security issue of enterprises adopting the application of cloud computing. In: Networked Computing and Advanced Information Management (NCM), 2010 Sixth International Conference on, pp 645–649
17.
go back to reference Bowers KD, Juels A, Oprea A (2009) HAIL: a high-availability and integrity layer for cloud storage. In: CCS ’09: Proceedings of the 16th ACM conference on Computer and communications security Bowers KD, Juels A, Oprea A (2009) HAIL: a high-availability and integrity layer for cloud storage. In: CCS ’09: Proceedings of the 16th ACM conference on Computer and communications security
18.
go back to reference Itani W, Kayssi A, Chehab A (2010) 2010 International Conference on Energy Aware Computing. In: 2010 International Conference on Energy Aware Computing (ICEAC), pp 1–2 Itani W, Kayssi A, Chehab A (2010) 2010 International Conference on Energy Aware Computing. In: 2010 International Conference on Energy Aware Computing (ICEAC), pp 1–2
19.
go back to reference Liu W, Zhang L, Wu C, Cai H, Qin L (2010) A Computing Mode Suitable for Medium and Small-Sized Enterprises Cloud Computing. In: 2010 International Conference on Intelligent Computation Technology and Automation (ICICTA), vol. 1, pp 57–60 Liu W, Zhang L, Wu C, Cai H, Qin L (2010) A Computing Mode Suitable for Medium and Small-Sized Enterprises Cloud Computing. In: 2010 International Conference on Intelligent Computation Technology and Automation (ICICTA), vol. 1, pp 57–60
20.
go back to reference Bessani A, Correia M, Quaresma B, André F, Sousa P (2011) DepSky: dependable and secure storage in a cloud-of-clouds. In: EuroSys ’11: Proceedings of the sixth conference on Computer systems Bessani A, Correia M, Quaresma B, André F, Sousa P (2011) DepSky: dependable and secure storage in a cloud-of-clouds. In: EuroSys ’11: Proceedings of the sixth conference on Computer systems
21.
go back to reference Prasad P, Ojha B, Shahi RR, Lal R, Vaish A, Goel U (2011) 3 dimensional security in cloud computing. In: 2011 3rd International Conference on Computer Research and Development (ICCRD), vol. 3, pp 198–201 Prasad P, Ojha B, Shahi RR, Lal R, Vaish A, Goel U (2011) 3 dimensional security in cloud computing. In: 2011 3rd International Conference on Computer Research and Development (ICCRD), vol. 3, pp 198–201
22.
go back to reference Wang C, Wang Q, Ren K, Lou W. Towards Secure and Dependable Storage Services in Cloud Computing. IEEE Transactions on Services Computing. (Accepted, but not yet published) Wang C, Wang Q, Ren K, Lou W. Towards Secure and Dependable Storage Services in Cloud Computing. IEEE Transactions on Services Computing. (Accepted, but not yet published)
23.
go back to reference Zheng Q, Xu S (2011) Fair and dynamic proofs of retrievability. In: CODASPY ’11: Proceedings of the first ACM conference on Data and application security and privacy Zheng Q, Xu S (2011) Fair and dynamic proofs of retrievability. In: CODASPY ’11: Proceedings of the first ACM conference on Data and application security and privacy
24.
go back to reference Klein A, Mannweiler C, Schneider J, Schotten HD (2010) Access Scheme for Mobile Cloud Computing. Eleventh International Conference on Mobile Data Management, pp 387–392 Klein A, Mannweiler C, Schneider J, Schotten HD (2010) Access Scheme for Mobile Cloud Computing. Eleventh International Conference on Mobile Data Management, pp 387–392
25.
go back to reference Liu Q, Jian X, Hu J, Zhao H, Zhang S (2009) An Optimized Solution for Mobile Environment Using Mobile Cloud Computing. Wireless Communications, Networking and Mobile Computing, pp 1–5 Liu Q, Jian X, Hu J, Zhao H, Zhang S (2009) An Optimized Solution for Mobile Environment Using Mobile Cloud Computing. Wireless Communications, Networking and Mobile Computing, pp 1–5
26.
go back to reference Park J, Yu H, Chung K, Lee E (2011) Markov Chain Based Monitoring Service for Fault Tolerance in Mobile Cloud Computing. Advanced Information Networking and Applications (WAINA), pp 520–525 Park J, Yu H, Chung K, Lee E (2011) Markov Chain Based Monitoring Service for Fault Tolerance in Mobile Cloud Computing. Advanced Information Networking and Applications (WAINA), pp 520–525
27.
go back to reference Giurgiu I, Riva O, Juric D, Krivulev I, Alonso G (2009) Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications. ACM/IFIP/USENIX International Conference on Middleware (Middleware ’09), pp 1–20 Giurgiu I, Riva O, Juric D, Krivulev I, Alonso G (2009) Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications. ACM/IFIP/USENIX International Conference on Middleware (Middleware ’09), pp 1–20
28.
go back to reference Zhang X, Schiffman J, Gibbs S, Kunjithapatham A, Jeong S (2009) Securing elastic applications on mobile devices for cloud computing. ACM workshop on Cloud computing security (CCSW ’09), pp 127–134 Zhang X, Schiffman J, Gibbs S, Kunjithapatham A, Jeong S (2009) Securing elastic applications on mobile devices for cloud computing. ACM workshop on Cloud computing security (CCSW ’09), pp 127–134
29.
go back to reference Satyanarayanan M, Bahl V, Caceres R, Davies N (2009) The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput 8(4):14–28CrossRef Satyanarayanan M, Bahl V, Caceres R, Davies N (2009) The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput 8(4):14–28CrossRef
30.
go back to reference Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. Cloud Security Alliance. December 2009 Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. Cloud Security Alliance. December 2009
31.
go back to reference Cloud Architecture Reference Models: A Survey. NIST, NIST CCRATWG 004 v2, January 25, 2011 Cloud Architecture Reference Models: A Survey. NIST, NIST CCRATWG 004 v2, January 25, 2011
32.
go back to reference Interoperable Clouds: A White Paper from the Open Cloud Standards Incubator. DMTF, DSP-ISO101, November 11, 2009 Interoperable Clouds: A White Paper from the Open Cloud Standards Incubator. DMTF, DSP-ISO101, November 11, 2009
33.
go back to reference Cloud computing Use Cases White Paper Version 4.0. Cloud Computing Use Case Discussion Group, July 2, 2010 Cloud computing Use Cases White Paper Version 4.0. Cloud Computing Use Case Discussion Group, July 2, 2010
34.
go back to reference IBM Smart Analytics Cloud. IBM, September 2010 IBM Smart Analytics Cloud. IBM, September 2010
35.
go back to reference Cisco Cloud Computing Data Center Strategy, Architecture, and Solutions. Cisco, 2009 Cisco Cloud Computing Data Center Strategy, Architecture, and Solutions. Cisco, 2009
36.
go back to reference Romano SP, Amirante A, Castaldi T, Miniero L, Buono A. IETF internet-draft, Cloud Reference Framework. IETF, July 2011 Romano SP, Amirante A, Castaldi T, Miniero L, Buono A. IETF internet-draft, Cloud Reference Framework. IETF, July 2011
38.
go back to reference Cloud Computing Initiative: May 6, 2009 Summit Briefing Book. GSA, May 13, 2009 Cloud Computing Initiative: May 6, 2009 Summit Briefing Book. GSA, May 13, 2009
39.
go back to reference Cloud Ready Data Center Reference Architecture. Jupiter Networks, February 2011 Cloud Ready Data Center Reference Architecture. Jupiter Networks, February 2011
40.
go back to reference Cloud Storage for Cloud Computing. SNIA (Advancing storage & information technology), September 2009 Cloud Storage for Cloud Computing. SNIA (Advancing storage & information technology), September 2009
41.
go back to reference Charlton S (2008) Cloud Computing and the Next Generation of Enterprise Architecture. Elastra Charlton S (2008) Cloud Computing and the Next Generation of Enterprise Architecture. Elastra
42.
go back to reference Top Threats to Cloud Computing V1.0. Cloud Security Alliance, March 2010. Top Threats to Cloud Computing V1.0. Cloud Security Alliance, March 2010.
Metadata
Title
Toward Advanced Mobile Cloud Computing for the Internet of Things: Current Issues and Future Direction
Authors
Taeshik Shon
Jaeik Cho
Kyusunk Han
Hyohyun Choi
Publication date
01-06-2014
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 3/2014
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-014-0509-8

Other articles of this Issue 3/2014

Mobile Networks and Applications 3/2014 Go to the issue