1. Security and Privacy in Mobile
Cloud Computing
Ganesh Arkalgud(1RV11IS021)
Ram Kumar K R(1RV11IS042)
Mohammed Ehab(1RV11IS032)
Original paper by:
Hui Suo
Zhuohua Liu
JiafuWan
Keliang Zhou
2. Introduction
• Advantages of cloud computing
1. On-demand self service
2. Extendibility
• What is mobile cloud computing?
5. Factors affecting growth of mobile cloud segment
• Battery life dependencies.
• Limited resources of mobile devices.
• Wireless bandwidth and delay.
• Security of mobile cloud devices.
• Limited calculation speed.
8. Mobile terminal security issues
• Mobile Terminal.
1. Open source OS
2. Third party software
3. Malware
• Software vulnerabilities
1. Data transfer with phone and
computer using FTP.
• Mis-operation without knowledge.
10. Mobile Cloud
• Platform Reliability
susceptible to being attacked with DOS
• Data and Privacy Protection
ownership and management of the users' data
To protect the sensitive data, the single means is not enough. We need
a complete security solution to protect the data security and privacy of
users.
12. Aiming at Mobile Terminal Security
• Anti-malware
Ex: Cloud AV
• Software vulnerabilities
• Regulating Users' Behavior
13. Aiming at Mobile Network Security
• Encryption
• Security Protocol
14. Aiming at Mobile Cloud Security
• Protection to Platform Reliability
• Data Encryption and Key Management
• Authentication and Access Control
• Privacy Protection