Skip to main content
Erschienen in: The Journal of Supercomputing 2/2014

01.05.2014 | Original Paper

Pirax: framework for application piracy control in mobile cloud environment

verfasst von: Atta ur Rehman Khan, Mazliza Othman, Mazhar Ali, Abdul Nasir Khan, Sajjad Ahmad Madani

Erschienen in: The Journal of Supercomputing | Ausgabe 2/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile cloud computing is an emerging technology that is gaining popularity as a means to extend the capabilities of resource-constrained mobile devices such as a smartphone. Mobile cloud computing requires specialized application development models that support computation offloading from a mobile device to the cloud. The computation offloading is performed by means of offloading application process, application component, entire application, or clone of the smartphone. The offloading of an entire application or clone of the smartphone to cloud may raise application piracy issues, which, unfortunately, have not been addressed in the existing literature. This paper presents a piracy control framework for mobile cloud environment, named Pirax, which prevents mobile applications from executing on unauthenticated devices and cloud resources. Pirax is formally verified using High Level Petri Nets, Satisfiability Modulo Theories Library and Z3 solver. Pirax is implemented on Android platform and analyzed from security and performance perspectives. The performance analysis results show that Pirax is lightweight and easy to integrate into existing mobile cloud application development models.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Khan AN, Kiah MLM, Khan SU, Madani SA (2013) Towards secure mobile cloud computing: a survey. Future Gener Comput Syst 29(5):1278–1299CrossRef Khan AN, Kiah MLM, Khan SU, Madani SA (2013) Towards secure mobile cloud computing: a survey. Future Gener Comput Syst 29(5):1278–1299CrossRef
3.
Zurück zum Zitat Chun B, Ihm S, Maniatis P, Naik M (2010) CloneCloud: Boosting Mobile Device Applications Through Cloud Clone Execution. Computing Research Repository (CoRR) abs/1009.3088 Chun B, Ihm S, Maniatis P, Naik M (2010) CloneCloud: Boosting Mobile Device Applications Through Cloud Clone Execution. Computing Research Repository (CoRR) abs/1009.3088
4.
Zurück zum Zitat Zhang X, Jeong S, Kunjithapatham A, Gibbs S (2010) Towards an elastic application model for augmenting computing capabilities of mobile platforms. In: Proceedings of international ICST conference on mobile wireless middleware, operating systems, and applications, June 2010 Zhang X, Jeong S, Kunjithapatham A, Gibbs S (2010) Towards an elastic application model for augmenting computing capabilities of mobile platforms. In: Proceedings of international ICST conference on mobile wireless middleware, operating systems, and applications, June 2010
5.
Zurück zum Zitat March V, Gu Y, Leonardi E, Goh G, Kirchberg M (2011) Lee BS (2011) \(\mu \) Cloud: towards a new paradigm of rich mobile applications. In: Proceedings of international conference on mobile web information systems (MobiWIS) March V, Gu Y, Leonardi E, Goh G, Kirchberg M (2011) Lee BS (2011) \(\mu \) Cloud: towards a new paradigm of rich mobile applications. In: Proceedings of international conference on mobile web information systems (MobiWIS)
6.
Zurück zum Zitat Cuervo E, Balasubramanian A, Cho DK, Wolman A, Saroiu S, Chandra R, Bahl P (2010) MAUI: making smartphones last longer with code offload. In: 8th International conference on mobile systems, applications and aervices (MobiSys ’10), 2010, pp 49–62 Cuervo E, Balasubramanian A, Cho DK, Wolman A, Saroiu S, Chandra R, Bahl P (2010) MAUI: making smartphones last longer with code offload. In: 8th International conference on mobile systems, applications and aervices (MobiSys ’10), 2010, pp 49–62
7.
Zurück zum Zitat Ma RKK, King LT, Cho-li W (2011) eXCloud: Transparent runtime support for scaling mobile applications in cloud. In: Proceedings of international conference on cloud and service computing (CSC), Dec 2011 Ma RKK, King LT, Cho-li W (2011) eXCloud: Transparent runtime support for scaling mobile applications in cloud. In: Proceedings of international conference on cloud and service computing (CSC), Dec 2011
8.
Zurück zum Zitat Kosta S, Aucinas A, Hui P, Mortier R, Zhang X (2011) Unleashing the power of mobile cloud computing using ThinkAir. Computing Research Repository (CoRR) abs/1105.3232 Kosta S, Aucinas A, Hui P, Mortier R, Zhang X (2011) Unleashing the power of mobile cloud computing using ThinkAir. Computing Research Repository (CoRR) abs/1105.3232
9.
Zurück zum Zitat Kemp R, Palmer NP, Kielmann T, Bal HE (2010) Cuckoo: a computation offloading framework for smartphones. In: Proceedings of international conference on mobile computing, applications, and services (MobiCASE’2010), Oct 2010 Kemp R, Palmer NP, Kielmann T, Bal HE (2010) Cuckoo: a computation offloading framework for smartphones. In: Proceedings of international conference on mobile computing, applications, and services (MobiCASE’2010), Oct 2010
25.
Zurück zum Zitat Tendulkar V, Snyder R, Pletcher J, Butler K, Shashidharan A, Enck W (2012) Abusing cloud-based browsers for fun and profit. In: Proceedings of 28th annual computer security applications conference (ACSAC), Orlando, FL, December 2012 Tendulkar V, Snyder R, Pletcher J, Butler K, Shashidharan A, Enck W (2012) Abusing cloud-based browsers for fun and profit. In: Proceedings of 28th annual computer security applications conference (ACSAC), Orlando, FL, December 2012
31.
Zurück zum Zitat Michel D (2013) Petri nets: fundamental models, verification and applications. Wiley-ISTE, New York, 2013 Michel D (2013) Petri nets: fundamental models, verification and applications. Wiley-ISTE, New York, 2013
32.
Zurück zum Zitat Moura L, Bjrner N (2009), Satisfiability modulo theories: an appetizer. In: Oliveira MVM, Woodcock J (eds), Lecture notes in computer science, vol 5902. Springer, Berlin, pp 23–36 Moura L, Bjrner N (2009), Satisfiability modulo theories: an appetizer. In: Oliveira MVM, Woodcock J (eds), Lecture notes in computer science, vol 5902. Springer, Berlin, pp 23–36
34.
Zurück zum Zitat Malik SUR, Srinivasan SK, Khan SU, Wang L (2012) A methodology for OSPF routing protocol verification. In: Proceedings of international conference on scalable computing and communications (ScalCom), Changzhou, China, Dec 2012 Malik SUR, Srinivasan SK, Khan SU, Wang L (2012) A methodology for OSPF routing protocol verification. In: Proceedings of international conference on scalable computing and communications (ScalCom), Changzhou, China, Dec 2012
36.
Zurück zum Zitat RSA Cryptography Standard (2012) PKCS# 1 v2.2 RSA Laboratories. 27 Oct 2012 RSA Cryptography Standard (2012) PKCS# 1 v2.2 RSA Laboratories. 27 Oct 2012
37.
Zurück zum Zitat FIB PUB (2008) Secure Hath Standard (SHS). Federal Information Processing Standards Publication FIB PUB (2008) Secure Hath Standard (SHS). Federal Information Processing Standards Publication
39.
Zurück zum Zitat Khan AN, Kiah MLM, Madani SA, Khan AR, Ali M (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Super Comput. doi: 10.1007/s11227-013-0967-y Khan AN, Kiah MLM, Madani SA, Khan AR, Ali M (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Super Comput. doi: 10.​1007/​s11227-013-0967-y
Metadaten
Titel
Pirax: framework for application piracy control in mobile cloud environment
verfasst von
Atta ur Rehman Khan
Mazliza Othman
Mazhar Ali
Abdul Nasir Khan
Sajjad Ahmad Madani
Publikationsdatum
01.05.2014
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 2/2014
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-013-1061-1

Weitere Artikel der Ausgabe 2/2014

The Journal of Supercomputing 2/2014 Zur Ausgabe

Premium Partner