Abstract
Offloading computing to distributed and possibly mobile nodes is increasingly popular thanks to the convenience and availability of cloud resources. However, trusted mobile computing is not presently viable due to a number of issues in both the mobile platform architectures and in the cloud service implementations. The complexity of such systems potentially exposes them to malicious and/or selfish behavior. This chapter describes the state-of-the-art research on theoretical advancements and practical implementations of trusted computing on a mobile cloud. Further, mobile distributed cloud computing security and reliability issues are introduced. Discussed solutions feature different levels of resiliency against malicious and misbehaving nodes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., Buyya, R.: Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges. IEEE Commun. Surv. Tutorials 16(1), 337–368 (2014)
Agarwal, A., Govindaraj, J., Juneja, N., Naik, V.: Feasibility study of on-device and in-the-cloud virtualization of mobiles. In: Proceedings of the 5th IBM Collaborative Academia Research Exchange Workshop, I-CARE ’13, pp. 5:1–5:4. ACM, New York (2013)
Akyildiz, I.F., Lee, A., Wang, P., Luo, M., Chou, W.: A roadmap for traffic engineering in sdn-openflow networks. Comput. Netw. 71, 1–30 (2014)
Amoretti, M., Lafuente, A.L., Sebastio, S.: A cooperative approach for distributed task execution in autonomic clouds. In: 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing (PDP 2008), pp. 0:274–281 (2013)
Amoretti, M., Zanichelli, F., Conte, G.: Efficient autonomic cloud computing using online discrete event simulation. J. Parallel Distrib. Comput. 73(6), 767–776 (2013)
Arabo, A., Pranggono, B.: Mobile malware and smart device security: Trends, challenges and solutions. In: Proceedings of the 2013 19th International Conference on Control Systems and Computer Science, CSCS ’13, pp. 526–531. IEEE Computer Society, Washington (2013)
ARM: Cortex-a15 processor (2014). http://www.arm.com/products/processors/cortex-a/cortex-a15.php
Arnau, J.-M., Parcerisa, J.-M., Xekalakis, P.: Parallel frame rendering: Trading responsiveness for energy on a mobile gpu. In: Proceedings of the 22Nd International Conference on Parallel Architectures and Compilation Techniques, PACT ’13, pp. 83–92. Piscataway (2013)
Backes, M., Fiore, D., Reischuk, R.M.: Verifiable delegation of computation on outsourced data. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS ’13, pp. 863–874. ACM, New York (2013)
Bahl, P., Han, R.Y., Li, L.E., Satyanarayanan, M.: Advancing the state of mobile cloud computing. In: Proceedings of the Third ACM Workshop on Mobile Cloud Computing and Services, MCS ’12, pp. 21–28. ACM, New York (2012)
Basta, A., Kellerer, W., Hoffmann, M., Morper, H.J., Hoffmann, K.: Applying nfv and sdn to lte mobile core gateways, the functions placement problem. In: Proceedings of the 4th Workshop on All Things Cellular: Operations, Applications, & Challenges, AllThingsCellular ’14, pp. 33–38. ACM, New York (2014)
Belenkiy, M., Chase, M., Erway, C.C., Jannotti, J., Küpçü, A., Lysyanskaya, A.: Incentivizing outsourced computation. In: Proceedings of the 3rd International Workshop on Economics of Networked Systems, NetEcon ’08, pp. 85–90. ACM, New York (2008)
Ben-Sasson, E., Chiesa, A., Genkin, D., Tromer, E.: On the concrete efficiency of probabilistically-checkable proofs. In: Proceedings of the Forty-fifth Annual ACM Symposium on Theory of Computing, STOC ’13, pp. 585–594. ACM, New York (2013)
Bianchi, A., Shoshitaishvili, Y., Kruegel, C., Vigna, G.: Blacksheep: Detecting compromised hosts in homogeneous crowds. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS ’12, pp. 341–352. ACM, New York (2012)
Bruck, J., Gao, J., Jiang, A.: Weighted bloom filter. In: 2006 IEEE International Symposium on Information Theory pp. 2304–2308 (2006)
Bucur, A.: Opencl - opengl es interop: Processing live video streams on a mobile device - case study. In: ACM SIGGRAPH 2013 Mobile, SIGGRAPH ’13, pp. 15:1–15:1. ACM, New York (2013)
Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for Android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM ’11, pp. 15–26. ACM, New York (2011)
Cassady, C., Kutanoglu, E.: Integrating preventive maintenance planning and production scheduling for a single machine. IEEE Trans. Reliab. 54(2), 304–309 (2005)
Chidambaram Nachiappan, N., Yedlapalli, P., Soundararajan, N., Kandemir, M.T., Sivasubramaniam, A., Das, C.R.: Gemdroid: A framework to evaluate mobile platforms. SIGMETRICS Perform. Eval. Rev. 42(1), 355–366, (2014
Cormode, G., Mitzenmacher, M., Thaler, J.: Practical verified computation with streaming interactive proofs. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, ITCS ’12, pp. 90–112. ACM, New York (2012)
Cunsolo, V., Distefano, S., Puliafito, A., Scarpa, M.: Volunteer computing and desktop cloud: The cloud@home paradigm. In: Eighth IEEE International Symposium on Network Computing and Applications, 2009. NCA 2009, pp. 134–139 (2009)
Dall, C., Nieh, J.: Kvm/arm: The design and implementation of the linux arm hypervisor. In: Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS ’14, pp. 333–348. ACM, New York (2014)
Das Sarma, A., Holzer, S., Kor, L., Korman, A., Nanongkai, D., Pandurangan, G., Peleg, D., Wattenhofer, R.: Distributed verification and hardness of distributed approximation. In: Proceedings of the 43rd Annual ACM Symposium on Theory of Computing, STOC ’11, pp. 363–372. ACM, New York (2011)
Dautov, R., Paraskakis,I.: A vision for monitoring cloud application platforms as sensor networks. In: Proceedings of the 2013 ACM Cloud and Autonomic Computing Conference, CAC ’13, pp. 25:1–25:8. ACM, New York (2013)
Denning, T., Borning, A., Friedman, B., Gill, B.T., Kohno, T., Maisel, W.H.: Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’10, pp. 917–926, ACM, New York (2010)
Developers, A.: Renderscript. http://developer.android.com/guide/topics/renderscript/compute.html.
Di Pietro, R., Lombardi, F., Martinelli, F., Sgandurra, D.: Anticheetah: An autonomic multi-round approach for reliable computing. In: Ubiquitous Intelligence and Computing, 2013 IEEE 10th International Conference on and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC), pp. 371–379 (2013). (Best Paper Award)
Di Pietro, R., Lombardi, F., Martinelli, F., Sgandurra, D.: CheR: Cheating Resilience in the Cloud via Smart Resource Allocation. In: Danger, J.L., Debbabi, M., Marion, J.-Y., Garcia-Alfaro, J., Zincir Heywood, N. (eds.), Foundations and Practice of Security, Lecture Notes in Computer Science, pp. 339–352. Springer International Publishing, Switzerland (2014)
Djatmiko, M., Cunche, M., Boreli, R., Seneviratne, A.: Heterogeneous secure multi-party computation. In: Proceedings of the 11th International IFIP TC 6 Conference on Networking - Volume Part II, IFIP’12, pp. 198–210. Springer, Berlin/Heidelberg (2012)
Du, W., Murugesan, M., Jia, J.: Algorithms and Theory of Computation Handbook, Chapter Uncheatable Grid Computing, pp. 30–30. Chapman and Hall/CRC, London (2010)
Duarte, S., Navalho, D., Ferreira, H., Preguiça, N.: Scalable data processing for community sensing applications. Mob. Netw. Appl. 18(3), 357–372 (2013)
Eppstein, D., Goodrich, M.T., Hirschberg, D.S.: Combinatorial pair testing: distinguishing workers from slackers. In: Proceedings of the 13th International Conference on Algorithms and Data Structures, WADS’13, pp. 316–327, Springer, Berlin/Heidelberg (2013)
Felt, A.P., Wang, H.J., Moshchuk, A., Hanna, S., Chin, E.: Permission re-delegation: Attacks and defenses. In: Proceedings of the 20th USENIX Conference on Security, SEC’11, pp. 22–22. USENIX Association, Berkeley (2011)
Ferretti, S., D’Angelo, G.: Mobile online gaming via resource sharing. In: Proceedings of the 5th International ICST Conference on Simulation Tools and Techniques, SIMUTOOLS ’12, pp. 262–269, ICST, Brussels, Belgium (2012) (ICST Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
Ficco, M., Rak, M., Di Martino, B.: An intrusion detection framework for supporting sla assessment in cloud computing. In: 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN), pp. 244–249 (2012)
Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Proceedings of the 30th Annual Conference on Advances in Cryptology, CRYPTO’10, pp. 465–482. Springer, New York Berlin/Heidelberg (2010)
Gisdakis, S., Giannetsos, T., Papadimitratos, P.: Sppear: Security & privacy-preserving architecture for participatory-sensing applications. In: Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, WiSec ’14, pp. 39–50. ACM, New York (2014)
Golle, P., Mironov, I.: Uncheatable distributed computations. In: Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer’s Track at RSA, CT-RSA 2001, pp. 425–440. Springer, New York (2001)
Goodrich, M.T.: Pipelined algorithms to detect cheating in long-term grid computations. Theor. Comput. Sci. 408(2-3), 199–207 (2008)
Google: Android security overview (2014). http://source.android.com/devices/tech/security
Groenwold, A.A.: Positive definite separable quadratic programs for non-convex problems. Struct. Multidiscip. Optim. 46(6), 795–802 (2012)
Hariri, S., Eltoweissy, M., Al-Nashif, Y.: Biorac: biologically inspired resilient autonomic cloud. In: Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, CSIIRW ’11, pp. 80:1–80:1. ACM, New York (2011)
Hong, J.: Considering privacy issues in the context of google glass. Commun. ACM 56(11), 10–11 (2013)
Jeon, J., Micinski, K.K., Vaughan, J.A., Fogel, A., Reddy, N., Foster, J.S., Millstein, T.: Dr. android and mr. hide: Fine-grained permissions in android applications. In: Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM ’12, pp. 3–14. ACM, New York (2012)
Joo, Y., Lee, D., Kim, J., Eom, Y.I.: Cgroups-based scheduling scheme for heterogeneous workloads in smart tv systems. In: Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC ’13, pp. 96:1–96:5. ACM, New York (2013)
Kakadia, D., Saripalli, P., Varma, V.: Mecca: Mobile, efficient cloud computing workload adoption framework using scheduler customization and workload migration decisions. In: Proceedings of the First International Workshop on Mobile Cloud Computing & Networking, MobileCloud ’13, pp. 41–46. ACM, New York (2013)
Kalyon, G., Le Gall, T., Marchand, H., Massart, T.: Symbolic supervisory control of distributed systems with communications. IEEE Trans. Autom. Control 59(2), 396–408 (2014)
Kim, I.-Y., Kim, J.-K.: Enhancing the performance of a distributed mobile computing environment by topology construction. In: Proceedings of the 12th International Conference on Algorithms and Architectures for Parallel Processing - Volume Part II, ICA3PP’12, pp. 21–30. Springer, Heidelberg/Berlin (2012)
Kurkovsky, S., Bhagyavati, M.S., Ray, A.: A collaborative problem-solving framework for mobile devices. In: Proceedings of the 42Nd Annual Southeast Regional Conference, ACM-SE 42, pp. 5–10. ACM, New York (2004)
Lee, K., Lee, J., Yi, Y., Rhee, I., Chong, S.: Mobile data offloading: How much can wifi deliver? IEEE/ACM Trans. Netw. 21(2), 536–550 (2013)
Levitin, G., Dai, Y.: Linear m -consecutive k -out-of- r -from- n:f systems. IEEE Trans. Reliab. 60(3), 640–646 (2011)
Levitin, G., Xing, L., Ben-Haim, H., Dai, Y.: Reliability of series-parallel systems with random failure propagation time. IEEE Trans. Reliab. 62(3), 637–647 (2013)
Liang, W.-Y., Hsieh, Y.-M., Lyu, Z.-Y.: Design of a dynamic distributed mobile computing environment. In: 2007 International Conference on Parallel and Distributed Systems, vol. 2, pp. 1–8 (2007)
Lin, F.X., Wang, Z., Zhong, L.: K2: A mobile operating system for heterogeneous coherence domains. SIGARCH Comput. Archit. News 42(1), 285–300 (2014)
Liu, L., Yan, G., Zhang, X., Chen, S.: Virusmeter: Preventing your cellphone from spies. In: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, RAID ’09, pp. 244–264. Springer, New York, Berlin/Heidelberg (2009)
Liu, S., Kang, L., Chen, L., Ni, L.: How to conduct distributed incomplete pattern matching. IEEE Trans. Parallel Distrib. Syst. 25(4), 982–992 (2014)
Lombardi, F., Di Pietro, R.: CUDACS: securing the cloud with CUDA-enabled secure virtualization. In: Proceedings of the 12th international conference on Information and communications security, ICICS’10, pp. 92–106. Springer, Berlin/Heidelberg (2010)
López-Alt, A., Tromer, E., Vaikuntanathan, V.: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: Proceedings of the 44th Symposium on Theory of Computing, STOC ’12, pp. 1219–1234. ACM, New York (2012)
Luebke, D., Harris, M., Krüger, J., Purcell, T., Govindaraju, N., Buck, I., Woolley, C., Lefohn, A.: Gpgpu: general purpose computation on graphics hardware. In: SIGGRAPH ’04: ACM SIGGRAPH 2004 Course Notes, pp. 33. ACM, New York (2004)
Luo, L., Wu, W., Di, D., Zhang, F., Yan, Y., Mao, Y.: A resource scheduling algorithm of cloud computing based on energy efficient optimization methods. In: Proceedings of the 2012 International Green Computing Conference (IGCC), IGCC ’12, pp. 1–6. IEEE Computer Society, Washington (2012)
Moser, H.: Towards a real-time distributed computing model. Theor. Comput. Sci. 410(6-7), 629–659 (2009)
Muralidharan, S., Kumar, V.: A novel reputation management system for volunteer clouds. In: 2012 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–5 (2012)
Nadkarni, A., Tendulkar, V., Enck, W.: Nativewrap: Ad hoc smartphone application creation for end users. In: Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, WiSec ’14, pp. 13–24. ACM, New York (2014)
NVIDIA: Cuda for arm platforms is now available. http://devblogs.nvidia.com/parallelforall/cuda-arm-platforms-now-available.
Parno, B., Gentry, C., Howell, J., Raykova, M.: Pinocchio: Nearly practical verifiable computation. In: Procedings of the 34th IEEE Symposium on Security and Privacy (2013)
Picco, G.P., Julien, C., Murphy, A.L., Musolesi, M., Roman, G.-C.: Software engineering for mobility: Reflecting on the past, peering into the future. In: Proceedings of the on Future of Software Engineering, FOSE 2014, pp. 13–28. ACM, New York (2014)
Quan, D.M., Yang, L.T.: Parallel mapping with time optimization for sla-aware compositional services in the business grid. IEEE Trans. Serv. Comput. 4(3), 196–206 (2011)
Ryoo, J., Kim, H.: Multi-sector multi-range control for self-organizing wireless networks. J. Netw. Comput. Appl. 34(6), 1848–1860 (2011)
Samimi, F.A., McKinley, P.K., Sadjadi, S.M.: Mobile service clouds: A self-managing infrastructure for autonomic mobile computing services. In: Proceedings of the Second IEEE International Conference on Self-Managed Networks, Systems, and Services, SelfMan’06, pp. 130–141. Springer, Berlin, Heidelberg (2006)
Sapio, A., Liao, Y., Baldi, M., Ranjan, G., Risso, F., Tongaonkar, A., Torres, R., Nucci, A.: Per-user policy enforcement on mobile apps through network functions virtualization. In: Proceedings of the 9th ACM Workshop on Mobility in the Evolving Internet Architecture, MobiArch ’14, pp. 37–42. ACM, New York (2014)
Setty, S., Blumberg, A.J., Walfish, M.: Toward practical and unconditional verification of remote computations. In: Proceedings of HotOS XIII. Usenix (2011)
Shen, Z., Li, L., Yan, F., Wu, X.: Cloud computing system based on trusted computing platform. In: 2010 International Conference on Intelligent Computation Technology and Automation (ICICTA), vol. 1, pp. 942–945 (2010)
Shin, S., Yegneswaran, V., Porras, P., Gu, G.: Avant-guard: Scalable and vigilant switch flow management in software-defined networks. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS ’13, pp. 413–424. ACM, New York (2013)
SoC: Qualcomm chipsets vs performance. http://www.insidehardware.it/mobile/smart-phone/2911-htc-one-alternativa-convincente?start=4#.U8zgl3V53UY (2011)
Su, S., Li, J., Huang, Q., Huang, X., Shuang, K., Wang, J.: Cost-efficient task scheduling for executing large programs in the cloud. Parallel Comput. 39(4–5), 177–188 (2013)
Suarez-Tangil, G., Tapiador, J.E., Lombardi, F., Pietro, R.D.: Thwarting obfuscated malware via differential fault analysis. Computer 47(6) 24–31 (2014)
Suarez-Tangil, G., Tapiador, J.E., Peris, P., Ribagorda, A.: Evolution, detection and analysis of malware for smart devices. IEEE Commun. Surv. Tutorials 99, 1–27 (2013)
Sun, M., Tan, G.: Nativeguard: Protecting android applications from third-party native libraries. In: Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, WiSec ’14, pp. 165–176. ACM, New York (2014)
Tilli, A., Bartolini, A., Cacciari, M., Benini, L.: Don’t burn your mobile!: Safe computational re-sprinting via model predictive control. In: Proceedings of the Eighth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS ’12, pp. 373–382. ACM, New York (2012)
Varanasi, P., Heiser, G.: Hardware-supported virtualization on arm. In: Proceedings of the Second Asia-Pacific Workshop on Systems, APSys ’11, pp. 11:1–11:5. ACM, New York (2011)
Vemulapalli, C., Madria, S.K., Linderman, M.: Pre-distribution scheme for data sharing in mobile cloud computing. In: Proceedings of the First International Workshop on Mobile Cloud Computing & Networking, MobileCloud ’13, pp. 11–18. ACM, New York (2013)
Vidas, T., Christin, N.: Sweetening android lemon markets: Measuring and combating malware in application marketplaces. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, CODASPY ’13, pp. 197–208. ACM, New York (2013)
Viswanathan, H., Lee, E.K., Rodero, I., Pompili, D.: An autonomic resource provisioning framework for mobile computing grids. In: Proceedings of the 9th International Conference on Autonomic Computing, ICAC ’12, pp. 79–84. ACM, New York (2012)
Vu, V., Setty, S., Blumberg, A., Walfish, M.: A hybrid architecture for interactive verifiable computation. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 223–237 (2013)
Walfish, M.: Verifying the correctness of remote executions: From wild implausibility to near practicality. In: Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, HotDep ’13, pp. 7:1–7:1. ACM, New York (2013)
Wan, J., Yang, L.T., Li, Y., Xu, X., Xiong, N.: An adaptive management mechanism for resource scheduling in multiple virtual machine system. In: Calero, J., Yang, L., Mà rmol, F., Garcìa Villalba, L., Li, A., Wang, Y. (eds.) Autonomic and Trusted Computing, vol. 6906 of Lecture Notes in Computer Science, pp. 60–74. Springer, Berlin/Heidelberg (2011)
Wang, Y.-C., Donyanavard, B., Cheng, K.-T.T.: Energy-aware real-time face recognition system on mobile cpu-gpu platform. In: Proceedings of the 11th European Conference on Trends and Topics in Computer Vision - Volume Part II, ECCV’10, pp. 411–422. Springer, Berlin/Heidelberg (2012)
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V.: Security and privacy for storage and computation in cloud computing. Inform. Sci. 258, 371–386 (2014)
Wilfinger, D., Murer, M., Baumgartner, A., Döttlinger, C., Meschtscherjakov, A., Tscheligi, M.: The car data toolkit: Smartphone supported automotive hci research. In: Proceedings of the 5th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, AutomotiveUI ’13, pp. 168–175. ACM, New York (2013)
Wu, X., Zhang, H., Shen, Z.: Integrity measurement enhanced security for mobile agent based on trusted computing platform. In: WiCOM ’08. 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008, pp. 1–4 (2008)
Xu, Y., Stojanovic, N., Stojanovic, L., Kostic, D.: An approach for dynamic personal monitoring based on mobile complex event processing. In: Proceedings of International Conference on Advances in Mobile Computing & Multimedia, MoMM ’13, pp. 464:464–464:473. ACM, New York (2013)
Zeng, L., Veeravalli, B., Li, X.: Scalestar: Budget conscious scheduling precedence-constrained many-task workflow applications in cloud. In: Proceedings of the 2012 IEEE 26th International Conference on Advanced Information Networking and Applications, AINA ’12, pp. 534–541. IEEE Computer Society, Washington (2012)
Zhao, Z., Hwang, K., Villeta, J.: Game cloud design with virtualized cpu/gpu servers and initial performance results. In: Proceedings of the 3rd Workshop on Scientific Cloud Computing Date, ScienceCloud ’12, pp. 23–30. ACM, New York (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Lombardi, F., Di Pietro, R. (2016). Trusted, Heterogeneous, and Autonomic Mobile Cloud. In: Chang, CH., Potkonjak, M. (eds) Secure System Design and Trustable Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-14971-4_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-14971-4_14
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-14970-7
Online ISBN: 978-3-319-14971-4
eBook Packages: EngineeringEngineering (R0)