Skip to main content

A Privacy-Enabled Mobile Computing Model Using Intelligent Cloud-Based Services

  • Conference paper
  • First Online:
SmartData

Abstract

Protecting the user’s digital privacy in today’s increasingly mobile world is a significant challenge. As mobile applications grow in complexity they will exceed the computational capabilities and power limitations of the mobile devices on which they run. To overcome the inherent limitations of mobile devices, mobile application designers are turning to the cloud for solutions. The primary rationale is that by off-loading computationally demanding tasks, mobile applications can provide users with sophisticated features that exceed the device’s capabilities. This research analyzes two impactful mobile computing trends from a privacy-protection perspective: (1) mobile applications are increasingly relying on cloud-based services; and (2) cloud-based services will eventually specialize beyond the expertise of mobile application developers. From a privacy perspective, this increased reliance on cloud computing poses additional challenges. In this research, we propose a model that aims to support mobile users to decide if, when, and how a cloud-based service or resource could be used in a way that protects their privacy. In this paper, we present (1) the model describing the roles of two collaborating components: a mobile device agent and a privacy service mediator, (2) use cases and design considerations, and (3) future work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Beach A, Gartrell M, Han R Solutions to Security and Privacy Issues in Mobile Social Networking. In: International Conference on Computational Science and Engineering, 2009. pp 1036 – 1042

    Google Scholar 

  2. Bilton N (2012) Girls Around Me: An App Takes Creepy to a New Level New York Times.http://bits.blogs.nytimes.com/2012/03/30/girls-around-me-ios-app-takes-creepy-to-a-new-level/ Accessed July 10, 2012

  3. Cox P, A. (2011) Mobile cloud computing: Devices, trends, issues, and the enabling technologies. IBM

    Google Scholar 

  4. Duhigg C (2012) How Companies Learn Your Secrets. New York Times. http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html?_r=2&pagewanted=1&hp Accessed July 20, 2012

  5. Kakousis K, Paspallis N, Papadopoulos GA (2010) A survey of software adaptation in mobile and ubiquitous computing. Enterprise Information Systems 4 (4):355–389

    Article  Google Scholar 

  6. Poolsappasit N, Ray I (2009) Towards Achieving Personalized Privacy for Location-Based Services. Transactions on Data Privacy 2 (1):77–99

    MathSciNet  Google Scholar 

  7. Satyanarayanan M (2011) Mobile Computing: the Next Decade. Paper presented at the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond

    Google Scholar 

  8. Steel E (2010) A Web Pioneer Profiles Users by Name Wall Street Journal. http://online.wsj.com/article/SB10001424052702304410504575560243259416072.html. Accessed June 24, 2012

  9. Tomko G, Borrett D, Kwan H, Steffan G (2010) SmartData: Make the Data “Think” for Itself. Identity in the Information Society 3 (2):343–362

    Article  Google Scholar 

  10. Yu WD, Yuan H (2011) An Approach to Explore Mobile Software Engineering Advances in Cloud Computing Environment. Paper presented at the IEEE 35th Annual Conference on Computer Software and Applications Conference Workshops

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Edward R. Sykes .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Sykes, E.R., Pham, H., Stoica, M., Mahmud, K., Stacey, D. (2013). A Privacy-Enabled Mobile Computing Model Using Intelligent Cloud-Based Services. In: Harvey, I., Cavoukian, A., Tomko, G., Borrett, D., Kwan, H., Hatzinakos, D. (eds) SmartData. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6409-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-6409-9_10

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-6408-2

  • Online ISBN: 978-1-4614-6409-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics