Skip to main content

Towards Mobile Cloud Computing with Single Sign-on Access


The low computing power of mobile devices impedes the development of mobile applications with a heavy computing load. Mobile Cloud Computing (MCC) has emerged as the solution to this by connecting mobile devices with the “infinite” computing power of the Cloud. As mobile devices typically communicate over untrusted networks, it becomes necessary to secure the communications to avoid privacy-sensitive data breaches. This paper presents work on implementing MCC applications with secure communications. For that purpose, we built on COMPSs-Mobile, a redesigned implementation of the COMP Superscalar (COMPSs) framework aiming to MCC platorms. COMPSs-Mobile automatically exploits the parallelism inherent in an application and orchestrates its execution on loosely-coupled distributed environment. To avoid a vendor lock-in, this extension leverages on the Generic Security Services Application Program Interface (GSSAPI) (RFC2743) as a generic way to access security services to provide communications with authentication, secrecy and integrity. Besides, GSSAPI allows applications to take profit of more advanced features, such as Federated Identity or Single Sign-On, which the underlying security framework could provide. To validate the practicality of the proposal, we use Kerberos as the security services provider to implement SSO; however, applications do not authenticate themselves and require users to obtain and place the credentials beforehand. To evaluate the performance, we conducted some tests running an application on a smartphone offloading tasks to a private cloud. Our results show that the overhead of securing the communications is acceptable.

This is a preview of subscription content, access via your institution.


  1. Heterogeneous Secure Multi-level Remote Acceleration Service for Low-Power Integrated Systems and Devices (RAPID).

  2. Java Programming Assistant (javassist).

  3. MIT Kerberos Consortium.

  4. OASIS Web services business process execution language.

  5. Cloud Security Alliance: The treacherous 12 cloud computing top threats in 2016. Security, 1–34., (2016)

  6. Globus Toolkit. (2017)

  7. Allen, G., et al.: The grid application toolkit: toward generic and easy application programming interfaces for the grid. Proc. IEEE 93(3), 534–550 (2005)

    Article  Google Scholar 

  8. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D. A., Rabkin, A., Stoica, I., et al.: Above the clouds: a Berkeley view of cloud computing. University of California, Berkeley, Tech. Rep. UCB 7–13 (2009). ISBN:UCB/EECS-2009-28

    Article  Google Scholar 

  9. Astalos, J., Cecchini, R., Coghlan, B., Cowles, R., Epting, U., Genovese, T., Gomes, J., Groep, D., Gug, M., Hanushevsky, A., Helm, M., Jensen, J., Kanellopoulos , C., Kelsey, D., Marco, R., Neilson, I., Nicoud, S., O’Callaghan, D., Quesnel, D., Schaeffner, I., Shamardin, L., Skow, D., Sova, M., Wäänänen, A., Wolniewicz, P., Xing, W.: International grid CA interworking, peer review and policy management through the European DataGrid Certification Authority Coordination Group. Lect. Notes Comput. Sci. 3470, 285–295 (2005). ISBN:3-540-26918-5

    Article  Google Scholar 

  10. Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Futur. Gener. Comput. Syst. 25(6), 599–616 (2009). ISBN: 3-540-26918-5

    Article  Google Scholar 

  11. Chen, H., Zhu, X., Qiu, D., Liu, L., Du, Z.: Scheduling for workflows with security-sensitive intermediate data by selective tasks duplication in clouds. IEEE Trans. Parallel Distrib. Syst. 28(9), 2674–2688 (2017). ISSN:1045-9219

    Article  Google Scholar 

  12. Chun, B. G., Ihm, S., Maniatis, P., Naik, M., Patti, A.: Clonecloud: elastic execution between mobile device and cloud. In: Proceedings of the Sixth Conference on Computer Systems, EuroSys ’11 pp 301–314. ACM, New York, NY, USA (2011).

  13. Chun, B. G., Maniatis, P.: Augmented smartphone applications through clone cloud execution. In: Proceedings of the 12th Conference on Hot Topics in Operating Systems, HotOS’09, pp 8–8. USENIX Association, Berkeley, CA, USA (2009).

  14. Cuervo, E., Balasubramanian, A., Cho, D.K., Wolman, A., Saroiu, S., Chandra, R., Bahl, P.: Maui: making smartphones last longer with code offload. In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services, Mobisys ’10, pp 49–62. ACM, New York, NY, USA (2010).

  15. Dean, J., Ghemawat, S.: Mapreduce: simplified data processing on large clusters. In: Proceedings of the 6th Conference on Symposium on Opearting Systems Design and Implementation - vol. 6, OSDI’04, pp 10–10. USENIX Association, Berkeley, CA, USA (2004).

  16. Dhinesh Babu, L. D., Venkata Krishna, P.: Honey bee behavior inspired load balancing of tasks in cloud computing environments. Applied Soft Computing Journal 13(5), 2292–2303 (2013).

    Article  Google Scholar 

  17. Fernando, N., Loke, S. W., Rahayu, W.: Mobile cloud computing: a survey. Futur. Gener. Comput. Syst. 29(1), 84–106 (2013)

    Article  Google Scholar 

  18. Galante, G., Erpen De Bona, L. C., Mury, A. R., Schulze, B., da Rosa Righi, R.: An analysis of public clouds elasticity in the execution of scientific applications: a survey. Journal of Grid Computing 14(2), 193–216 (2016).

    Article  Google Scholar 

  19. Gupta, M. K.: Akka Essentials. Packt publishing (2012)

  20. Hardt, M., Kannelopoulos, C.E.: Djra1.2 blueprint architectures. (2017)

  21. Howlett, J., Hartman, S., Tschofenig, H., Schaad, J.: Application bridging for federated access beyond web (ABFAB) architecture, no. 7831. RFC Editor. ISSN:2070-1721 (2016)

  22. Humphrey, M., Thompson, M.: Security implications of typical grid computing usage scenarios. (2000)

  23. Isard, M., Budiu, M., Yu, Y., Birrell, A., Fetterly, D.: Dryad: distributed data-parallel programs from sequential building blocks. SIGOPS Oper. Syst. Rev. 41(3), 59–72 (2007).

    Article  Google Scholar 

  24. Kemp, R., Palmer, N., Kielmann, T., Bal, H.: Cuckoo: a computation offloading framework for smartphones. In: Gris M., Yang G. (eds) MobiCASE. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 76. Springer, pp 59–79. ISBN:978-3-642-29335-1. (2010)

  25. Khan, A. N., Kiah, M. M., Khan, S. U., Madani, S. A.: Towards secure mobile cloud computing: a survey. Futur. Gener. Comput. Syst. 29(5), 1278–1299 (2013)

    Article  Google Scholar 

  26. Kosta, S., Aucinas, A., Hui, P., Mortier, R., Zhang, X.: Unleashing the power of mobile cloud computing using thinkair. (2011). arXiv:1105.3232.

  27. Kosta, S., Aucinas, A., Hui, P., Mortier, R., Zhang, X.: Thinkair: dynamic resource allocation and parallel execution in the cloud for mobile code offloading. In: INFOCOM, 2012 Proceedings IEEE, pp 945–953. IEEE (2012)

  28. Lineback, R.: Cellphone ic sales will top total personal computing in 2017.

  29. Linn, J.: Generic security service application programming interface, version 2, update 1, no. 2743. RFC Editor. ISSN:2070-1721 (2000)

  30. Lordan, F., Badia, R.M.: COMPSS-Mobile: parallel programming for mobile cloud computing. Journal of Grid Computing, (2017). (to appear)

    Article  Google Scholar 

  31. Lordan, F., Tejedor, E., Ejarque, J., Rafanell, R., Álvarez, J., Marozzo, F., Lezzi, D., Sirvent, R., Talia, D., Badia, R. M.: Servicess: an interoperable programming framework for the cloud. Journal of Grid Computing 12(1), 67–91 (2014).

    Article  Google Scholar 

  32. Missier, P., Soiland-Reyes, S., Owen, S., Tan, W., Nenadic, A., Dunlop, I., Williams, A., Oinn, T., Goble, C.: Taverna, reloaded. In: Gertz, M., Hey, T., Ludaescher, B. (eds.) SSDBM 2010. Heidelberg, Germany (2010).

    Google Scholar 

  33. Montesi, F., Guidi, C., Lucchi, R., Zavattaro, G.: Jolie: a java orchestration language interpreter engine. Electron. Notes Theor. Comput. Sci. 181, 19–33 (2007)

    Article  Google Scholar 

  34. Pashalidis, A., Mitchell, C.: A taxonomy of single sign-on systems. In: Information Security and Privacy, pp 219–219. Springer (2003)

  35. Rescorla, E.: HTTP Over TLS. RFC 2818 (Informational). Updated by RFCs 5785, 7230 (2000)

  36. Rivest, R. L., Adleman, L., Dertouzos, M. L.: On data banks and privacy homomorphisms. Foundations of secure computation 4(11), 169–180 (1978)

    MathSciNet  Google Scholar 

  37. Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N.: The case for vm-based cloudlets in mobile computing. IEEE Pervasive Comput. 8(4), 14–23 (2009).

    Article  Google Scholar 

  38. Singh, S., Chana, I.: A survey on resource scheduling in cloud computing: issues and challenges (2016).

    Article  Google Scholar 

  39. Solagna, P., Kannelopoulos, C., Liampotis, N., Hardt, M., Sallé, M., Paetow, S., Malavolti, M., Van Dijk, N., Jensen, J., Liabotis, I., Jankowski, M., Memon, S., Prochazka, M., Oshrin, B., Monticini, B., Short, H., Stevanovich, U.: Existing AAI and available technologies for federated access AARC project. (2015)

  40. Tilevich, E., Smaragdakis, Y.: J-orchestra: Automatic java application partitioning. Ecoop 178–204 (2002).,

    Article  Google Scholar 

  41. Tuecke, S., Welch, V., Engert, D., Pearlman, L., Thompson, M.: Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile RFC 3820 (Proposed Standard). (2004)

  42. Vecchiola, C., Chu, X., Buyya, R.: Aneka: a software platform cloud computing. (2009) arXiv:0907.4622

  43. Virding, R., Wikström, C., Williams, M.: Concurrent Programming in ERLANG, 2nd edn. Prentice Hall International (UK) Ltd., Hertfordshire, UK (1996)

    MATH  Google Scholar 

  44. Wilde, M., Hategan, M., Wozniak, J. M., Clifford, B., Katz, D. S., Foster, I.: Swift: a language for distributed parallel scripting. Parallel Comput. 37(9), 633–652 (2011).

    Article  Google Scholar 

  45. Williams, N., Johansson, L., Hartman, S., Josefsson, S.: Generic security service application programming interface (GSS-API) naming extensions, no. 6680. RFC Editor. ISSN:2070-1271 (2012)

  46. Xie, T., Qin, X.: Security-aware resource allocation for real-time parallel jobs on homogeneous and heterogeneous clusters. IEEE Trans. Parallel Distrib. Syst. 682–697 (2008).

    Article  Google Scholar 

  47. Zhan, Z.H., Liu, X.F., Gong, Y.J., Zhang, J., Chung, H.S.H., Li, Y.: Cloud computing resource scheduling and a survey of its evolutionary approaches. ACM Comput. Surv. 47(4), 1–33 (2015).

    Article  Google Scholar 

  48. Zhu, L., Leach, P., Jaganathan, K., Ingersoll W.: The simple and protected generic security service application program interface (GSSAPI) negotiation mechanism, no. 4178. RFC Editor. ISSN:2070-1721 (2005)

Download references


This work has been supported by the Spanish Government (contracts TIN2012-34557, TIN2015-65316-P and grants BES-2013-067167, EEBB-I-15-09808 of the Research Training Program and SEV-2011-00067 of Severo Ochoa Program), by Generalitat de Catalunya (contract 2014-SGR-1051) and by the European Commission (ASCETiC project, FP7-ICT-2013.1.2 contract 610874). The second author was partially supported by the European Commission’s Horizon2020 program under grant agreement 653965 (AARC).

Author information

Authors and Affiliations


Corresponding author

Correspondence to F. Lordan.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Lordan, F., Jensen, J. & Badia, R.M. Towards Mobile Cloud Computing with Single Sign-on Access. J Grid Computing 16, 627–646 (2018).

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI:


  • Distributed computing
  • High performance computing
  • Mobile computing
  • Authentication
  • Data security