skip to main content
10.1145/1655008.1655026acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Securing elastic applications on mobile devices for cloud computing

Authors Info & Claims
Published:13 November 2009Publication History

ABSTRACT

Cloud computing provides elastic computing infrastructure and resources which enable resource-on-demand and pay-as-you-go utility computing models. We believe that new applications can leverage these models to achieve new features that are not available for legacy applications. In our project we aim to build elastic applications which augment resource-constrained platforms, such as mobile phones, with elastic computing resources from clouds. An elastic application consists of one or more weblets, each of which can be launched on a device or cloud, and can be migrated between them according to dynamic changes of the computing environment or user preferences on the device. This paper overviews the general concept of this new application model, analyzes its unique security requirements, and presents our design considerations to build secure elastic applications. As first steps we propose a solution for authentication and secure session management between weblets running device side and those on the cloud. We then propose secure migration and how to authorize cloud weblets to access sensitive user data such as via external web services. We believe some principles in our solution can be applied in other cloud computing scenarios such as application integration between private and public clouds in an enterprise environment.

References

  1. Amazon EC2, http://aws.amazon.com/ec2/.Google ScholarGoogle Scholar
  2. Mcafee mobile security report 2009, http://www.mcafee.com/us/local_content/reports/mobile_security_report_2009.pdf.Google ScholarGoogle Scholar
  3. Oauth, http://oauth.net.Google ScholarGoogle Scholar
  4. Tcg mobile reference architecture specification, https://www.trustedcomputinggroup.org/specs/mobilephone/tcgmobile-reference-architecture-1.0.pdf.Google ScholarGoogle Scholar
  5. TCG Specification Architecture Overview. https://www.trustedcomputinggroup.org.Google ScholarGoogle Scholar
  6. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. Above the clouds: A berkeley view of cloud computing. Technical Report UCB/EECS-2009-28, 2009.Google ScholarGoogle Scholar
  7. R. K. Balan, M. Satyanarayanan, S. Park, and T. Okoshi. Tactics-based remote execution for mobile computing. In Proc. of MobiSys, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. B.-G. Chun and P. Maniatis. Augmented smartphone applications through clone cloud execution. In USENIX HotOS XII, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. L. S. Clair, J. Schiffman, T. Jaeger, and P. McDaniel. Establishing and sustaining system integrity via root of trust installation. In Proc. of ACSAC, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  10. S. Goyal and J. Carter. A lightweight secure cyber foraging infrastructure for resource-constrained devices. In Proc. of the IEEE Workshop on Mobile Computing Systems and Applications. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. G. C. Hunt, M. L. Scott, G. C. Hunt, and M. L. Scott. The coign automatic distributed partitioning system. In Proc. of OSDI, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Hypponen. State of cell phone malware in 2007, http://www.usenix.org/events/sec07/tech/hypponen.pdf.Google ScholarGoogle Scholar
  13. J. McCune, S. Berger, R. Caceres, T. Jaeger, and R. Sailer. Shamon: A system for distributed mandatory access control. In Proc. of ACSAC, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Messer, I. Greenberg, P. Bernadat, D. Milojicic, D. Chen, T. Giuli, and X. Gu. Towards a distributed platform for resource-constrained devices. Technical Report HPL-2002-26, HP Laboratories, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  15. C. Pautasso, O. Zimmermann, and F. Leymann. Restful web services vs. big web services: Making the right architectural decision. In Proc. of WWW, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. R. Sailer, T. Jaeger, X. Zhang, and L. van Doorn. Attestation-based policy enforcement for remote access. In Proc. of ACM CCS, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. N. Santos, K. P. Gummadi, and R. Rodrigues. Towards trusted cloud computing. In USENIX HotCloud, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. E. Shi, A. Perrig, and L. V. Doorn. Bind: a fine-grained attestation service for secure distributed systems. In Proc. of IEEE Symposium on Security and Privacy, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Securing elastic applications on mobile devices for cloud computing

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCSW '09: Proceedings of the 2009 ACM workshop on Cloud computing security
      November 2009
      144 pages
      ISBN:9781605587844
      DOI:10.1145/1655008
      • Program Chairs:
      • Radu Sion,
      • Dawn Song

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 November 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate37of108submissions,34%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader