TAILIEUCHUNG - End-to-End Security in Mobile-Cloud Computing

End-to-End Security in Mobile-Cloud Computing presents about Definition, big picture, and challenges; End to end security challenges; System architecture; Taint analysis and AOP; Prototype evaluation; Security in Mobile Cloud Computing (current efforts). | End-to-End Security in Mobile-Cloud Computing Prof. Bharat Bhargava Department of Computer Science, Purdue University Center for Education and Research in Information Assurance and Security (CERIAS) bbshail@ (765-413-7312) Outline Definition, big picture, and challenges End to end security challenges System architecture Taint analysis and AOP Prototype evaluation Performance and security evaluation Cloud computing evaluation Security in Mobile Cloud Computing (current efforts) MCC architecture Mobile agent for computation offloading Proposed MCC security framework Tamper resistant approach Active Bundle Summary 1 Mobile-Cloud Computing Definition Mobile cloud computing (MCC) at its simplest, refers to an infrastructure where both the data storage and data processing happen outside of the mobile device. [1,2] Mobile cloud applications move the computing power and data storage away from the mobile devices and into powerful and centralized computing platforms located in clouds, which are then accessed over the wireless connection based on a thin native client. 2 Why Mobile-Cloud Computing? Mobile devices face many resource challenges (battery life, storage, bandwidth etc.) Cloud computing offers advantages to users by allowing them to use infrastructure, platforms and software by cloud providers at low cost and elastically in an on-demand fashion. Mobile cloud computing provides mobile users with data storage and processing services in clouds, obviating the need to have a powerful device configuration (. CPU speed, memory capacity etc.), as all resource-intensive computing can be performed in the cloud. 3 The Big Picture: End-to-End Security for MCC Application code to be offloaded to the cloud for execution is bundled in a mobile agent Upon arrival at the destination (cloud host) platform, the bundle enables itself and starts executing its code Guards integrated into the agent code using AOP pointcuts check for tamper during execution (with code .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.