Skip to main content

Security Frameworks for Green Mobile Cloud Computing

  • Chapter
  • First Online:
Green Mobile Cloud Computing

Abstract

Number of mobile devices like smart phone, TV, printers, sensors, AC, fridge, light and vehicle are expected to reach 18 billion by 2025 around the globe (https://www.statista.com/statistics/245501/multiple-mobile-device-ownership-worldwide/). Data generation, data processing, and data transmission for the task assigned to those devices take huge energy consumption as well as memory storage is less to store the data. Furthermore, the battery life-time is limited to the mobile devices; therefore, by taking the concept of green mobile network, data has been offloaded to the cloud server for processing and store. Even after these benefits, mobile cloud computing (MCC) still is not widely acquired due to the numerous issues are connected with the security of MCC environment, such as privacy, access control, service level agreements, interoperability, charging models, data security, and much more that must be resolved. The security framework can be categorized into three parts: data security framework, access control framework, and communication framework. The discussion of this chapter is two folds: (a) it provides a detail review of aforementioned frameworks along with the brief discussion on the existing security frameworks for green mobile cloud computing (GMCC), and (b) it also discusses the security challenges of the frameworks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Elminaam, D.S.A., Alanezi, F.T., Hosny, K.M.: SMCACC: developing an efficient dynamic secure framework for mobile capabilities augmentation using cloud computing. In: Proceedings of the IEEE Access, vol. 7, pp. 120214–120237 (2019). https://doi.org/10.1109/ACCESS.2019.2929954

  2. Gao, B., He, L., Lu, X., Chang, C., Li, K., Li, K.: Developing energy aware task allocation schemes in cloud-assisted mobile workflows. In: Proceedings of the IEEE International Conference on Computer Science and Information Technology; Ubiquitous Computing and Communication; Dependable, Autonomic Secure Computing; Pervasive Intelligence and Computing, pp. 1266–1273 (2015)

    Google Scholar 

  3. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. In: Proceedings of the Future Generation Computer Systems, vol. 28(3), pp. 583–592 (2012)

    Google Scholar 

  4. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. In: Proceedings of the Journal of Network and Computer Applications, vol. 34(1), pp. 1–11 (2011)

    Google Scholar 

  5. Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. In: Proceedings of the Future Generation Computer Systems, vol. 25(6), pp. 599–616 (2009)

    Google Scholar 

  6. Khan, A.N., Kiah, M.L.M., Khan, S.U., Madani, S.A.: Towards secure mobile cloud computing: a survey. In: Proceeding of the Future Generation Computer Systems, vol. 29(5), pp. 1278–1299 (2013). https://doi.org/10.1016/j.future.2012.08.003

  7. Diaz, C.O., Guzek, M., Pecero, J.E., Bouvry, P., Khan, S.U.: Scalable and energy efficient scheduling techniques for large-scale systems. In: Proceedings of the 11th IEEE International Conference on Computer and Information Technology, CIT’11, Pafos, Cyprus, September (2011)

    Google Scholar 

  8. Cai, C., Wang, L., Khan, S.U., Tao, J.: Energy-aware high performance computing: a taxonomy study. In: Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, ICPADS’11, Tainan, Taiwan, December (2011)

    Google Scholar 

  9. Goiri, I., Berral, J.L., Fitó, J.O., Julià, F., Nou, R., Guitart, J., Gavaldà, R., Torres, J.: Energy-efficient and multifaceted resource management for profit-driven virtualized data centers. In: Proceedings of the Future Generation Computer Systems, vol. 28(5), pp. 718–731 (2012)

    Google Scholar 

  10. Kliazovich, D., Bouvry, P., Khan, S.U.: DENS: data center energy-efficient network-aware scheduling. In: Proceedings of the ACM/IEEE International Conference on Green Computing and Communications, GreenCom’10, Hangzhou, China, December (2010)

    Google Scholar 

  11. Lindberg, P., Leingang, J., Lysaker, D., Khan, S.U., Li, J.: Comparison and analysis of eight scheduling heuristics for the optimization of energy consumption and make span in large-scale distributed systems. In: Proceedings of the Journal of Supercomputing, vol. 59(1), pp. 323–360 (2012)

    Google Scholar 

  12. Quan, D.M., Mezza, F., Sannenli, D., Giafreda, R.: T-alloc: a practical energy efficient resource allocation algorithm for traditional data centers. In: Proceedings of the Future Generation Computer Systems, vol. 28(5), pp. 791–800 (2012)

    Google Scholar 

  13. Diaz, C.O., Guzek, M., Pecero, J.E., Danoy, G., Bouvry, P., Khan, S.U.: Energy aware fast scheduling heuristics in heterogeneous computing systems. In: Proceedings of the ACM/IEEE/IFIP International Conference on High Performance Computing and Simulation, HPCS’11, Istanbul, Turkey, July (2011)

    Google Scholar 

  14. Khan, S.U., Ardil, C.: A weighted sum technique for the joint optimization of performance and power consumption in data centers. In: Proceeding of the International Journal of Electrical, Computer, and Systems Engineering, vol. 3(1), pp. 35–40 (2009)

    Google Scholar 

  15. Khan, S.U.: A self-adaptive weighted sum technique for the joint optimization of performance and power consumption in data centers. In: Proceedings of the 22nd International Conference on Parallel and Distributed Computing and Communication Systems, PDCCS’09, Louisville, KY, USA, September (2009)

    Google Scholar 

  16. Ren, W., Yu, L., Gao, R., Xiong, F.: Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing. In: Proceedings of the Journal of Tsinghua Science and Technology, vol. 16(5), pp. 520–528 (2011)

    Google Scholar 

  17. Khan, A.N., Mat Kiah, M.L., Khan, S.U., Madani, S.A., Khan, A.R.: A study of incremental cryptography for security schemes in mobile cloud computing environments. In: Proceedings of the IEEE Symposium on Wireless Technology and Applications ISWTA (2013)

    Google Scholar 

  18. Khan, A.N., Mat Kiah, M.L., Ali, M., Madani, S.A., Khan, A.R., Shamshirband, S.: BSS: block based sharing scheme for secure data storage services in mobile cloud environment. In: Proceedings of the Journal of Supercomputing (2014)

    Google Scholar 

  19. Patel, C., Chauhan, S.S., Patel, B.: A data security framework for mobile cloud computing. In: Proceedings of International Journal of Advanced Research in Computer and Communication Engineering, vol. 4(2), February (2015)

    Google Scholar 

  20. Jia, W., Zhu, H., Cao, Z., Wei, L., Lin, X.: SDSM: a secure data service mechanism in mobile cloud computing. In: Proceedings IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS, Shanghai, China, April (2011)

    Google Scholar 

  21. Hsueh, S.C., Lin, J.Y., Lin, M.Y.: Secure cloud storage for conventional data archive of smart phones. In: Proceedings of the 15th IEEE International Symposium on Consumer Electronics, ISCE’11, Singapore, June (2011)

    Google Scholar 

  22. Yang, J., Wang, H., Wang, J., Tan, C., Yu, D.: Provable data possession of resource constrained mobile devices in cloud computing. J. Netw. 6(7), 1033–1040 (2011)

    Google Scholar 

  23. Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. IACR Cryptology ePrint Archive: 185 (2011)

    Google Scholar 

  24. Li, F., Rahulamathavan, Y., Conti, M., Rajarajan, M.: Robust access control framework for mobile cloud computing network. In: Proceedings of the Computer Communications, vol. 68, pp. 61–72 (2015). https://doi.org/10.1016/j.comcom.2015.07.005

  25. Zhang, G., Parashar, M.: Context-aware dynamic access control for pervasive applications. In: Proceedings of the Communications Networks and Distributed Systems Modeling and Simulation Conference, pp. 21–30 (2004)

    Google Scholar 

  26. Bonatti, C. Galdi, D.T.: ERBAC: event driven RBAC. In: Proceedings of the 18th ACM Symposium Access Control Models and Technologies. ACM, pp. 125–136 (2013)

    Google Scholar 

  27. Cho, Y.S., Bao, L., Goodrich, M.T.: LAAC: a location-aware access control protocol. In: Proceedings of the IEEE 3rd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 1–7 (2006)

    Google Scholar 

  28. Scott, L., Denning, D.E.: A location based encryption technique and some of its applications. In: Proceedings of the National Technical Meeting of The Institute of Navigation, Anaheim, CA, pp. 734–740 (2003)

    Google Scholar 

  29. Vijayalakshmi, V., Palanivelu, T.G.: Secure localization using elliptic curve cryptography in wireless sensor networks. In: Proceedings of the International Journal of Computer Science and Network Security, vol. 8(6), pp. 255–261 (2008)

    Google Scholar 

  30. Lv, Z., Chi, J., Zhang, M., Feng, D.: Efficiently attribute-based access control for mobile cloud storage system. In: Proceedings of the IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 292–299 (2014). https://doi.org/10.1109/TrustCom.2014.40

  31. Luo, J., Wang, H., Gong, X., Li, T.: A novel role-based access control model in cloud environments. In: Proceedings of International Journal of Computational Intelligence Systems, pp. 1–9 (2016)

    Google Scholar 

  32. Samsung KNOX, http://tinyurl.com/me93jcv. Accessed on 29 Oct 2021

  33. BlackBerry BES12, http://tinyurl.com/ls3yxh8. Accessed on 29 Oct 2021

  34. Raju, N., Saritha, V.: A survey on communication issues in mobile cloud computing. In: Proceedings of Walailak Journal of Science & Technology, vol. 15(1) (2018)

    Google Scholar 

  35. Rudenko, A., Reiher, P., Popek, G.J., Kuenning, G.H.: Saving portable computer battery power through remote process execution. In: Proceedings of the ACM SIGMOBILE Mobile Computing and Communications Review (1998)

    Google Scholar 

  36. Cuervo, A., Balasubramanian, D.K., Cho, A., Wolman, S., Saroiu, R., Chandra, P.B.: MAUI: making smartphones last longer, with code offload. In: Proceedings of the International Conference on Mobile Systems, Applications, and Services (2010)

    Google Scholar 

  37. Zou, C., Wang, Z., Liu, D.B.: Phosphor, “A cloud based DRM scheme with sim card”. In: Proceedings of the Web Conference (2010)

    Google Scholar 

  38. Walker, W., Brisken, J.: Romney, “To lease or not to lease from storage clouds”. In: Proceedings of the Computer (2010)

    Google Scholar 

  39. Ogwara, N.O., Petrova, K., Yang, M.L.: Data security frameworks for mobile cloud computing: a comprehensive review of the literature. In: Proceedings of the 29th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1–4 (2019). https://doi.org/10.1109/ITNAC46935.2019.9078007

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Maitra, T., Chatterjee, P.S., Giri, D. (2022). Security Frameworks for Green Mobile Cloud Computing. In: De, D., Mukherjee, A., Buyya, R. (eds) Green Mobile Cloud Computing. Springer, Cham. https://doi.org/10.1007/978-3-031-08038-8_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-08038-8_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-08037-1

  • Online ISBN: 978-3-031-08038-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics