A Cognitive Access Framework for Security and Privacy Protection in Mobile Cloud Computing

A Cognitive Access Framework for Security and Privacy Protection in Mobile Cloud Computing

Gianmarco Baldini, Pasquale Stirparo
ISBN13: 9781466665392|ISBN10: 1466665394|EISBN13: 9781466665408
DOI: 10.4018/978-1-4666-6539-2.ch024
Cite Chapter Cite Chapter

MLA

Baldini, Gianmarco, and Pasquale Stirparo. "A Cognitive Access Framework for Security and Privacy Protection in Mobile Cloud Computing." Cloud Technology: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2015, pp. 517-542. https://doi.org/10.4018/978-1-4666-6539-2.ch024

APA

Baldini, G. & Stirparo, P. (2015). A Cognitive Access Framework for Security and Privacy Protection in Mobile Cloud Computing. In I. Management Association (Ed.), Cloud Technology: Concepts, Methodologies, Tools, and Applications (pp. 517-542). IGI Global. https://doi.org/10.4018/978-1-4666-6539-2.ch024

Chicago

Baldini, Gianmarco, and Pasquale Stirparo. "A Cognitive Access Framework for Security and Privacy Protection in Mobile Cloud Computing." In Cloud Technology: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 517-542. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-6539-2.ch024

Export Reference

Mendeley
Favorite

Abstract

Information systems and wireless communications are becoming increasingly present in the everyday life of citizens both from a personal and business point of view. A recent development in this context is Mobile Cloud Computing (MCC), which is the combination of Cloud Computing and pervasive mobile networks. Ensuring the preservation of privacy can be difficult in MCC. Therefore, this chapter provides an overview of the main challenges in ensuring privacy in MCC and surveys the most significant contributions from the research community. The second objective of the chapter is to introduce and describe a new framework for privacy protection based on the concepts of Virtual Object (VO) and Composite Virtual Object (CVO), where data are encapsulated and protected using a sticky policy approach and a role-based access model. The proposed iCore framework is compared to the privacy challenges described in the first objective.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.