Skip to main content

Trusted, Heterogeneous, and Autonomic Mobile Cloud

  • Chapter
Secure System Design and Trustable Computing
  • 1507 Accesses

Abstract

Offloading computing to distributed and possibly mobile nodes is increasingly popular thanks to the convenience and availability of cloud resources. However, trusted mobile computing is not presently viable due to a number of issues in both the mobile platform architectures and in the cloud service implementations. The complexity of such systems potentially exposes them to malicious and/or selfish behavior. This chapter describes the state-of-the-art research on theoretical advancements and practical implementations of trusted computing on a mobile cloud. Further, mobile distributed cloud computing security and reliability issues are introduced. Discussed solutions feature different levels of resiliency against malicious and misbehaving nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., Buyya, R.: Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges. IEEE Commun. Surv. Tutorials 16(1), 337–368 (2014)

    Article  Google Scholar 

  2. Agarwal, A., Govindaraj, J., Juneja, N., Naik, V.: Feasibility study of on-device and in-the-cloud virtualization of mobiles. In: Proceedings of the 5th IBM Collaborative Academia Research Exchange Workshop, I-CARE ’13, pp. 5:1–5:4. ACM, New York (2013)

    Google Scholar 

  3. Akyildiz, I.F., Lee, A., Wang, P., Luo, M., Chou, W.: A roadmap for traffic engineering in sdn-openflow networks. Comput. Netw. 71, 1–30 (2014)

    Article  Google Scholar 

  4. Amoretti, M., Lafuente, A.L., Sebastio, S.: A cooperative approach for distributed task execution in autonomic clouds. In: 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing (PDP 2008), pp. 0:274–281 (2013)

    Google Scholar 

  5. Amoretti, M., Zanichelli, F., Conte, G.: Efficient autonomic cloud computing using online discrete event simulation. J. Parallel Distrib. Comput. 73(6), 767–776 (2013)

    Article  Google Scholar 

  6. Arabo, A., Pranggono, B.: Mobile malware and smart device security: Trends, challenges and solutions. In: Proceedings of the 2013 19th International Conference on Control Systems and Computer Science, CSCS ’13, pp. 526–531. IEEE Computer Society, Washington (2013)

    Google Scholar 

  7. ARM: Cortex-a15 processor (2014). http://www.arm.com/products/processors/cortex-a/cortex-a15.php

  8. Arnau, J.-M., Parcerisa, J.-M., Xekalakis, P.: Parallel frame rendering: Trading responsiveness for energy on a mobile gpu. In: Proceedings of the 22Nd International Conference on Parallel Architectures and Compilation Techniques, PACT ’13, pp. 83–92. Piscataway (2013)

    Google Scholar 

  9. Backes, M., Fiore, D., Reischuk, R.M.: Verifiable delegation of computation on outsourced data. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS ’13, pp. 863–874. ACM, New York (2013)

    Google Scholar 

  10. Bahl, P., Han, R.Y., Li, L.E., Satyanarayanan, M.: Advancing the state of mobile cloud computing. In: Proceedings of the Third ACM Workshop on Mobile Cloud Computing and Services, MCS ’12, pp. 21–28. ACM, New York (2012)

    Google Scholar 

  11. Basta, A., Kellerer, W., Hoffmann, M., Morper, H.J., Hoffmann, K.: Applying nfv and sdn to lte mobile core gateways, the functions placement problem. In: Proceedings of the 4th Workshop on All Things Cellular: Operations, Applications, & Challenges, AllThingsCellular ’14, pp. 33–38. ACM, New York (2014)

    Google Scholar 

  12. Belenkiy, M., Chase, M., Erway, C.C., Jannotti, J., Küpçü, A., Lysyanskaya, A.: Incentivizing outsourced computation. In: Proceedings of the 3rd International Workshop on Economics of Networked Systems, NetEcon ’08, pp. 85–90. ACM, New York (2008)

    Google Scholar 

  13. Ben-Sasson, E., Chiesa, A., Genkin, D., Tromer, E.: On the concrete efficiency of probabilistically-checkable proofs. In: Proceedings of the Forty-fifth Annual ACM Symposium on Theory of Computing, STOC ’13, pp. 585–594. ACM, New York (2013)

    Google Scholar 

  14. Bianchi, A., Shoshitaishvili, Y., Kruegel, C., Vigna, G.: Blacksheep: Detecting compromised hosts in homogeneous crowds. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS ’12, pp. 341–352. ACM, New York (2012)

    Google Scholar 

  15. Bruck, J., Gao, J., Jiang, A.: Weighted bloom filter. In: 2006 IEEE International Symposium on Information Theory pp. 2304–2308 (2006)

    Google Scholar 

  16. Bucur, A.: Opencl - opengl es interop: Processing live video streams on a mobile device - case study. In: ACM SIGGRAPH 2013 Mobile, SIGGRAPH ’13, pp. 15:1–15:1. ACM, New York (2013)

    Google Scholar 

  17. Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for Android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM ’11, pp. 15–26. ACM, New York (2011)

    Google Scholar 

  18. Cassady, C., Kutanoglu, E.: Integrating preventive maintenance planning and production scheduling for a single machine. IEEE Trans. Reliab. 54(2), 304–309 (2005)

    Article  Google Scholar 

  19. Chidambaram Nachiappan, N., Yedlapalli, P., Soundararajan, N., Kandemir, M.T., Sivasubramaniam, A., Das, C.R.: Gemdroid: A framework to evaluate mobile platforms. SIGMETRICS Perform. Eval. Rev. 42(1), 355–366, (2014

    Article  Google Scholar 

  20. Cormode, G., Mitzenmacher, M., Thaler, J.: Practical verified computation with streaming interactive proofs. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, ITCS ’12, pp. 90–112. ACM, New York (2012)

    Google Scholar 

  21. Cunsolo, V., Distefano, S., Puliafito, A., Scarpa, M.: Volunteer computing and desktop cloud: The cloud@home paradigm. In: Eighth IEEE International Symposium on Network Computing and Applications, 2009. NCA 2009, pp. 134–139 (2009)

    Google Scholar 

  22. Dall, C., Nieh, J.: Kvm/arm: The design and implementation of the linux arm hypervisor. In: Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS ’14, pp. 333–348. ACM, New York (2014)

    Google Scholar 

  23. Das Sarma, A., Holzer, S., Kor, L., Korman, A., Nanongkai, D., Pandurangan, G., Peleg, D., Wattenhofer, R.: Distributed verification and hardness of distributed approximation. In: Proceedings of the 43rd Annual ACM Symposium on Theory of Computing, STOC ’11, pp. 363–372. ACM, New York (2011)

    Google Scholar 

  24. Dautov, R., Paraskakis,I.: A vision for monitoring cloud application platforms as sensor networks. In: Proceedings of the 2013 ACM Cloud and Autonomic Computing Conference, CAC ’13, pp. 25:1–25:8. ACM, New York (2013)

    Google Scholar 

  25. Denning, T., Borning, A., Friedman, B., Gill, B.T., Kohno, T., Maisel, W.H.: Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’10, pp. 917–926, ACM, New York (2010)

    Google Scholar 

  26. Developers, A.: Renderscript. http://developer.android.com/guide/topics/renderscript/compute.html.

  27. Di Pietro, R., Lombardi, F., Martinelli, F., Sgandurra, D.: Anticheetah: An autonomic multi-round approach for reliable computing. In: Ubiquitous Intelligence and Computing, 2013 IEEE 10th International Conference on and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC), pp. 371–379 (2013). (Best Paper Award)

    Google Scholar 

  28. Di Pietro, R., Lombardi, F., Martinelli, F., Sgandurra, D.: CheR: Cheating Resilience in the Cloud via Smart Resource Allocation. In: Danger, J.L., Debbabi, M., Marion, J.-Y., Garcia-Alfaro, J., Zincir Heywood, N. (eds.), Foundations and Practice of Security, Lecture Notes in Computer Science, pp. 339–352. Springer International Publishing, Switzerland (2014)

    Google Scholar 

  29. Djatmiko, M., Cunche, M., Boreli, R., Seneviratne, A.: Heterogeneous secure multi-party computation. In: Proceedings of the 11th International IFIP TC 6 Conference on Networking - Volume Part II, IFIP’12, pp. 198–210. Springer, Berlin/Heidelberg (2012)

    Google Scholar 

  30. Du, W., Murugesan, M., Jia, J.: Algorithms and Theory of Computation Handbook, Chapter Uncheatable Grid Computing, pp. 30–30. Chapman and Hall/CRC, London (2010)

    Google Scholar 

  31. Duarte, S., Navalho, D., Ferreira, H., Preguiça, N.: Scalable data processing for community sensing applications. Mob. Netw. Appl. 18(3), 357–372 (2013)

    Article  Google Scholar 

  32. Eppstein, D., Goodrich, M.T., Hirschberg, D.S.: Combinatorial pair testing: distinguishing workers from slackers. In: Proceedings of the 13th International Conference on Algorithms and Data Structures, WADS’13, pp. 316–327, Springer, Berlin/Heidelberg (2013)

    Google Scholar 

  33. Felt, A.P., Wang, H.J., Moshchuk, A., Hanna, S., Chin, E.: Permission re-delegation: Attacks and defenses. In: Proceedings of the 20th USENIX Conference on Security, SEC’11, pp. 22–22. USENIX Association, Berkeley (2011)

    Google Scholar 

  34. Ferretti, S., D’Angelo, G.: Mobile online gaming via resource sharing. In: Proceedings of the 5th International ICST Conference on Simulation Tools and Techniques, SIMUTOOLS ’12, pp. 262–269, ICST, Brussels, Belgium (2012) (ICST Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).

    Google Scholar 

  35. Ficco, M., Rak, M., Di Martino, B.: An intrusion detection framework for supporting sla assessment in cloud computing. In: 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN), pp. 244–249 (2012)

    Google Scholar 

  36. Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Proceedings of the 30th Annual Conference on Advances in Cryptology, CRYPTO’10, pp. 465–482. Springer, New York Berlin/Heidelberg (2010)

    Google Scholar 

  37. Gisdakis, S., Giannetsos, T., Papadimitratos, P.: Sppear: Security & privacy-preserving architecture for participatory-sensing applications. In: Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, WiSec ’14, pp. 39–50. ACM, New York (2014)

    Google Scholar 

  38. Golle, P., Mironov, I.: Uncheatable distributed computations. In: Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer’s Track at RSA, CT-RSA 2001, pp. 425–440. Springer, New York (2001)

    Google Scholar 

  39. Goodrich, M.T.: Pipelined algorithms to detect cheating in long-term grid computations. Theor. Comput. Sci. 408(2-3), 199–207 (2008)

    Article  MATH  MathSciNet  Google Scholar 

  40. Google: Android security overview (2014). http://source.android.com/devices/tech/security

  41. Groenwold, A.A.: Positive definite separable quadratic programs for non-convex problems. Struct. Multidiscip. Optim. 46(6), 795–802 (2012)

    Article  MATH  MathSciNet  Google Scholar 

  42. Hariri, S., Eltoweissy, M., Al-Nashif, Y.: Biorac: biologically inspired resilient autonomic cloud. In: Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, CSIIRW ’11, pp. 80:1–80:1. ACM, New York (2011)

    Google Scholar 

  43. Hong, J.: Considering privacy issues in the context of google glass. Commun. ACM 56(11), 10–11 (2013)

    Article  Google Scholar 

  44. Jeon, J., Micinski, K.K., Vaughan, J.A., Fogel, A., Reddy, N., Foster, J.S., Millstein, T.: Dr. android and mr. hide: Fine-grained permissions in android applications. In: Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM ’12, pp. 3–14. ACM, New York (2012)

    Google Scholar 

  45. Joo, Y., Lee, D., Kim, J., Eom, Y.I.: Cgroups-based scheduling scheme for heterogeneous workloads in smart tv systems. In: Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC ’13, pp. 96:1–96:5. ACM, New York (2013)

    Google Scholar 

  46. Kakadia, D., Saripalli, P., Varma, V.: Mecca: Mobile, efficient cloud computing workload adoption framework using scheduler customization and workload migration decisions. In: Proceedings of the First International Workshop on Mobile Cloud Computing & Networking, MobileCloud ’13, pp. 41–46. ACM, New York (2013)

    Google Scholar 

  47. Kalyon, G., Le Gall, T., Marchand, H., Massart, T.: Symbolic supervisory control of distributed systems with communications. IEEE Trans. Autom. Control 59(2), 396–408 (2014)

    Article  Google Scholar 

  48. Kim, I.-Y., Kim, J.-K.: Enhancing the performance of a distributed mobile computing environment by topology construction. In: Proceedings of the 12th International Conference on Algorithms and Architectures for Parallel Processing - Volume Part II, ICA3PP’12, pp. 21–30. Springer, Heidelberg/Berlin (2012)

    Google Scholar 

  49. Kurkovsky, S., Bhagyavati, M.S., Ray, A.: A collaborative problem-solving framework for mobile devices. In: Proceedings of the 42Nd Annual Southeast Regional Conference, ACM-SE 42, pp. 5–10. ACM, New York (2004)

    Google Scholar 

  50. Lee, K., Lee, J., Yi, Y., Rhee, I., Chong, S.: Mobile data offloading: How much can wifi deliver? IEEE/ACM Trans. Netw. 21(2), 536–550 (2013)

    Article  Google Scholar 

  51. Levitin, G., Dai, Y.: Linear m -consecutive k -out-of- r -from- n:f systems. IEEE Trans. Reliab. 60(3), 640–646 (2011)

    Article  Google Scholar 

  52. Levitin, G., Xing, L., Ben-Haim, H., Dai, Y.: Reliability of series-parallel systems with random failure propagation time. IEEE Trans. Reliab. 62(3), 637–647 (2013)

    Article  Google Scholar 

  53. Liang, W.-Y., Hsieh, Y.-M., Lyu, Z.-Y.: Design of a dynamic distributed mobile computing environment. In: 2007 International Conference on Parallel and Distributed Systems, vol. 2, pp. 1–8 (2007)

    Google Scholar 

  54. Lin, F.X., Wang, Z., Zhong, L.: K2: A mobile operating system for heterogeneous coherence domains. SIGARCH Comput. Archit. News 42(1), 285–300 (2014)

    Google Scholar 

  55. Liu, L., Yan, G., Zhang, X., Chen, S.: Virusmeter: Preventing your cellphone from spies. In: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, RAID ’09, pp. 244–264. Springer, New York, Berlin/Heidelberg (2009)

    Google Scholar 

  56. Liu, S., Kang, L., Chen, L., Ni, L.: How to conduct distributed incomplete pattern matching. IEEE Trans. Parallel Distrib. Syst. 25(4), 982–992 (2014)

    Article  Google Scholar 

  57. Lombardi, F., Di Pietro, R.: CUDACS: securing the cloud with CUDA-enabled secure virtualization. In: Proceedings of the 12th international conference on Information and communications security, ICICS’10, pp. 92–106. Springer, Berlin/Heidelberg (2010)

    Google Scholar 

  58. López-Alt, A., Tromer, E., Vaikuntanathan, V.: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: Proceedings of the 44th Symposium on Theory of Computing, STOC ’12, pp. 1219–1234. ACM, New York (2012)

    Google Scholar 

  59. Luebke, D., Harris, M., Krüger, J., Purcell, T., Govindaraju, N., Buck, I., Woolley, C., Lefohn, A.: Gpgpu: general purpose computation on graphics hardware. In: SIGGRAPH ’04: ACM SIGGRAPH 2004 Course Notes, pp. 33. ACM, New York (2004)

    Google Scholar 

  60. Luo, L., Wu, W., Di, D., Zhang, F., Yan, Y., Mao, Y.: A resource scheduling algorithm of cloud computing based on energy efficient optimization methods. In: Proceedings of the 2012 International Green Computing Conference (IGCC), IGCC ’12, pp. 1–6. IEEE Computer Society, Washington (2012)

    Google Scholar 

  61. Moser, H.: Towards a real-time distributed computing model. Theor. Comput. Sci. 410(6-7), 629–659 (2009)

    Article  MATH  Google Scholar 

  62. Muralidharan, S., Kumar, V.: A novel reputation management system for volunteer clouds. In: 2012 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–5 (2012)

    Google Scholar 

  63. Nadkarni, A., Tendulkar, V., Enck, W.: Nativewrap: Ad hoc smartphone application creation for end users. In: Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, WiSec ’14, pp. 13–24. ACM, New York (2014)

    Google Scholar 

  64. NVIDIA: Cuda for arm platforms is now available. http://devblogs.nvidia.com/parallelforall/cuda-arm-platforms-now-available.

  65. Parno, B., Gentry, C., Howell, J., Raykova, M.: Pinocchio: Nearly practical verifiable computation. In: Procedings of the 34th IEEE Symposium on Security and Privacy (2013)

    Google Scholar 

  66. Picco, G.P., Julien, C., Murphy, A.L., Musolesi, M., Roman, G.-C.: Software engineering for mobility: Reflecting on the past, peering into the future. In: Proceedings of the on Future of Software Engineering, FOSE 2014, pp. 13–28. ACM, New York (2014)

    Google Scholar 

  67. Quan, D.M., Yang, L.T.: Parallel mapping with time optimization for sla-aware compositional services in the business grid. IEEE Trans. Serv. Comput. 4(3), 196–206 (2011)

    Article  Google Scholar 

  68. Ryoo, J., Kim, H.: Multi-sector multi-range control for self-organizing wireless networks. J. Netw. Comput. Appl. 34(6), 1848–1860 (2011)

    Article  Google Scholar 

  69. Samimi, F.A., McKinley, P.K., Sadjadi, S.M.: Mobile service clouds: A self-managing infrastructure for autonomic mobile computing services. In: Proceedings of the Second IEEE International Conference on Self-Managed Networks, Systems, and Services, SelfMan’06, pp. 130–141. Springer, Berlin, Heidelberg (2006)

    Google Scholar 

  70. Sapio, A., Liao, Y., Baldi, M., Ranjan, G., Risso, F., Tongaonkar, A., Torres, R., Nucci, A.: Per-user policy enforcement on mobile apps through network functions virtualization. In: Proceedings of the 9th ACM Workshop on Mobility in the Evolving Internet Architecture, MobiArch ’14, pp. 37–42. ACM, New York (2014)

    Google Scholar 

  71. Setty, S., Blumberg, A.J., Walfish, M.: Toward practical and unconditional verification of remote computations. In: Proceedings of HotOS XIII. Usenix (2011)

    Google Scholar 

  72. Shen, Z., Li, L., Yan, F., Wu, X.: Cloud computing system based on trusted computing platform. In: 2010 International Conference on Intelligent Computation Technology and Automation (ICICTA), vol. 1, pp. 942–945 (2010)

    Google Scholar 

  73. Shin, S., Yegneswaran, V., Porras, P., Gu, G.: Avant-guard: Scalable and vigilant switch flow management in software-defined networks. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS ’13, pp. 413–424. ACM, New York (2013)

    Google Scholar 

  74. SoC: Qualcomm chipsets vs performance. http://www.insidehardware.it/mobile/smart-phone/2911-htc-one-alternativa-convincente?start=4#.U8zgl3V53UY (2011)

  75. Su, S., Li, J., Huang, Q., Huang, X., Shuang, K., Wang, J.: Cost-efficient task scheduling for executing large programs in the cloud. Parallel Comput. 39(4–5), 177–188 (2013)

    Article  Google Scholar 

  76. Suarez-Tangil, G., Tapiador, J.E., Lombardi, F., Pietro, R.D.: Thwarting obfuscated malware via differential fault analysis. Computer 47(6) 24–31 (2014)

    Article  Google Scholar 

  77. Suarez-Tangil, G., Tapiador, J.E., Peris, P., Ribagorda, A.: Evolution, detection and analysis of malware for smart devices. IEEE Commun. Surv. Tutorials 99, 1–27 (2013)

    Google Scholar 

  78. Sun, M., Tan, G.: Nativeguard: Protecting android applications from third-party native libraries. In: Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, WiSec ’14, pp. 165–176. ACM, New York (2014)

    Google Scholar 

  79. Tilli, A., Bartolini, A., Cacciari, M., Benini, L.: Don’t burn your mobile!: Safe computational re-sprinting via model predictive control. In: Proceedings of the Eighth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS ’12, pp. 373–382. ACM, New York (2012)

    Google Scholar 

  80. Varanasi, P., Heiser, G.: Hardware-supported virtualization on arm. In: Proceedings of the Second Asia-Pacific Workshop on Systems, APSys ’11, pp. 11:1–11:5. ACM, New York (2011)

    Google Scholar 

  81. Vemulapalli, C., Madria, S.K., Linderman, M.: Pre-distribution scheme for data sharing in mobile cloud computing. In: Proceedings of the First International Workshop on Mobile Cloud Computing & Networking, MobileCloud ’13, pp. 11–18. ACM, New York (2013)

    Google Scholar 

  82. Vidas, T., Christin, N.: Sweetening android lemon markets: Measuring and combating malware in application marketplaces. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, CODASPY ’13, pp. 197–208. ACM, New York (2013)

    Google Scholar 

  83. Viswanathan, H., Lee, E.K., Rodero, I., Pompili, D.: An autonomic resource provisioning framework for mobile computing grids. In: Proceedings of the 9th International Conference on Autonomic Computing, ICAC ’12, pp. 79–84. ACM, New York (2012)

    Google Scholar 

  84. Vu, V., Setty, S., Blumberg, A., Walfish, M.: A hybrid architecture for interactive verifiable computation. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 223–237 (2013)

    Google Scholar 

  85. Walfish, M.: Verifying the correctness of remote executions: From wild implausibility to near practicality. In: Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, HotDep ’13, pp. 7:1–7:1. ACM, New York (2013)

    Google Scholar 

  86. Wan, J., Yang, L.T., Li, Y., Xu, X., Xiong, N.: An adaptive management mechanism for resource scheduling in multiple virtual machine system. In: Calero, J., Yang, L., Màrmol, F., Garcìa Villalba, L., Li, A., Wang, Y. (eds.) Autonomic and Trusted Computing, vol. 6906 of Lecture Notes in Computer Science, pp. 60–74. Springer, Berlin/Heidelberg (2011)

    Google Scholar 

  87. Wang, Y.-C., Donyanavard, B., Cheng, K.-T.T.: Energy-aware real-time face recognition system on mobile cpu-gpu platform. In: Proceedings of the 11th European Conference on Trends and Topics in Computer Vision - Volume Part II, ECCV’10, pp. 411–422. Springer, Berlin/Heidelberg (2012)

    Google Scholar 

  88. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V.: Security and privacy for storage and computation in cloud computing. Inform. Sci. 258, 371–386 (2014)

    Article  Google Scholar 

  89. Wilfinger, D., Murer, M., Baumgartner, A., Döttlinger, C., Meschtscherjakov, A., Tscheligi, M.: The car data toolkit: Smartphone supported automotive hci research. In: Proceedings of the 5th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, AutomotiveUI ’13, pp. 168–175. ACM, New York (2013)

    Google Scholar 

  90. Wu, X., Zhang, H., Shen, Z.: Integrity measurement enhanced security for mobile agent based on trusted computing platform. In: WiCOM ’08. 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008, pp. 1–4 (2008)

    Google Scholar 

  91. Xu, Y., Stojanovic, N., Stojanovic, L., Kostic, D.: An approach for dynamic personal monitoring based on mobile complex event processing. In: Proceedings of International Conference on Advances in Mobile Computing & Multimedia, MoMM ’13, pp. 464:464–464:473. ACM, New York (2013)

    Google Scholar 

  92. Zeng, L., Veeravalli, B., Li, X.: Scalestar: Budget conscious scheduling precedence-constrained many-task workflow applications in cloud. In: Proceedings of the 2012 IEEE 26th International Conference on Advanced Information Networking and Applications, AINA ’12, pp. 534–541. IEEE Computer Society, Washington (2012)

    Google Scholar 

  93. Zhao, Z., Hwang, K., Villeta, J.: Game cloud design with virtualized cpu/gpu servers and initial performance results. In: Proceedings of the 3rd Workshop on Scientific Cloud Computing Date, ScienceCloud ’12, pp. 23–30. ACM, New York (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Flavio Lombardi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Lombardi, F., Di Pietro, R. (2016). Trusted, Heterogeneous, and Autonomic Mobile Cloud. In: Chang, CH., Potkonjak, M. (eds) Secure System Design and Trustable Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-14971-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14971-4_14

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14970-7

  • Online ISBN: 978-3-319-14971-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics