The Journal of Supercomputing

, Volume 68, Issue 2, pp 753–776

Pirax: framework for application piracy control in mobile cloud environment

  • Atta ur Rehman Khan
  • Mazliza Othman
  • Mazhar Ali
  • Abdul Nasir Khan
  • Sajjad Ahmad Madani
Original Paper

Abstract

Mobile cloud computing is an emerging technology that is gaining popularity as a means to extend the capabilities of resource-constrained mobile devices such as a smartphone. Mobile cloud computing requires specialized application development models that support computation offloading from a mobile device to the cloud. The computation offloading is performed by means of offloading application process, application component, entire application, or clone of the smartphone. The offloading of an entire application or clone of the smartphone to cloud may raise application piracy issues, which, unfortunately, have not been addressed in the existing literature. This paper presents a piracy control framework for mobile cloud environment, named Pirax, which prevents mobile applications from executing on unauthenticated devices and cloud resources. Pirax is formally verified using High Level Petri Nets, Satisfiability Modulo Theories Library and Z3 solver. Pirax is implemented on Android platform and analyzed from security and performance perspectives. The performance analysis results show that Pirax is lightweight and easy to integrate into existing mobile cloud application development models.

Keywords

Mobile cloud computing Mobile cloud application piracy  Application models Mobile cloud piracy control framework Application piracy 

References

  1. 1.
    Khan AR, Othman M, Madani SA, Khan SU (2013), A survey of mobile cloud computing application models. IEEE Commun Surv Tut 99(PP):1–21. doi: 10.1109/SURV.2013.062613.00160 Google Scholar
  2. 2.
    Khan AN, Kiah MLM, Khan SU, Madani SA (2013) Towards secure mobile cloud computing: a survey. Future Gener Comput Syst 29(5):1278–1299CrossRefGoogle Scholar
  3. 3.
    Chun B, Ihm S, Maniatis P, Naik M (2010) CloneCloud: Boosting Mobile Device Applications Through Cloud Clone Execution. Computing Research Repository (CoRR) abs/1009.3088Google Scholar
  4. 4.
    Zhang X, Jeong S, Kunjithapatham A, Gibbs S (2010) Towards an elastic application model for augmenting computing capabilities of mobile platforms. In: Proceedings of international ICST conference on mobile wireless middleware, operating systems, and applications, June 2010Google Scholar
  5. 5.
    March V, Gu Y, Leonardi E, Goh G, Kirchberg M (2011) Lee BS (2011) \(\mu \) Cloud: towards a new paradigm of rich mobile applications. In: Proceedings of international conference on mobile web information systems (MobiWIS)Google Scholar
  6. 6.
    Cuervo E, Balasubramanian A, Cho DK, Wolman A, Saroiu S, Chandra R, Bahl P (2010) MAUI: making smartphones last longer with code offload. In: 8th International conference on mobile systems, applications and aervices (MobiSys ’10), 2010, pp 49–62Google Scholar
  7. 7.
    Ma RKK, King LT, Cho-li W (2011) eXCloud: Transparent runtime support for scaling mobile applications in cloud. In: Proceedings of international conference on cloud and service computing (CSC), Dec 2011Google Scholar
  8. 8.
    Kosta S, Aucinas A, Hui P, Mortier R, Zhang X (2011) Unleashing the power of mobile cloud computing using ThinkAir. Computing Research Repository (CoRR) abs/1105.3232Google Scholar
  9. 9.
    Kemp R, Palmer NP, Kielmann T, Bal HE (2010) Cuckoo: a computation offloading framework for smartphones. In: Proceedings of international conference on mobile computing, applications, and services (MobiCASE’2010), Oct 2010Google Scholar
  10. 10.
  11. 11.
    International Data Corporation (2013) http://www.idc.com/getdoc.jsp?containerId=prUS23028711. 21 Jan 2013
  12. 12.
    Application Piracy (2013) http://www.rascal.co.il/smartphones.html. 3 Mar 2013
  13. 13.
    Mobile cloud computing - Devices, trends, issues, and the enabling technologies (2013) http://public.dhe.ibm.com/software/dw/cloud/library/cl-mobilecloudcomputing-pdf.pdf. 3 Jan 2013
  14. 14.
    Android App Market reaches 500,000 submissions (2013) http://www.informationweek.com/news/personal-tech/mobile-apps/231901537. 2 Jan 2013
  15. 15.
  16. 16.
    App Anti-Piracy (2013) http://www.mtiks.com. 7 Jan 2013
  17. 17.
  18. 18.
    Android (2013) http://www.android.com. 10 Jan 2013
  19. 19.
    Apple iOS5 (2013) http://www.apple.com/ios. 10 Jan 2013
  20. 20.
    Nokia Symbian (2013) http://symbian.nokia.com. 10 Jan 2013
  21. 21.
  22. 22.
    BlackBerry 7 OS (2012) http://www.rim.com/products/blackberry_os7.shtml. 15 July 2012
  23. 23.
    The Piracy Problem In Chinas Mobile Game Market (2013) http://micgadget.com/18949/the-piracy-problem-in-chinas-mobile-game-market. 15 Jan 2013
  24. 24.
  25. 25.
    Tendulkar V, Snyder R, Pletcher J, Butler K, Shashidharan A, Enck W (2012) Abusing cloud-based browsers for fun and profit. In: Proceedings of 28th annual computer security applications conference (ACSAC), Orlando, FL, December 2012Google Scholar
  26. 26.
    Node-locked License model (2013) http://idlastro.gsfc.nasa.gov/idl_html_help/Licensing_Methods.html, 10 Jan 2013
  27. 27.
    GSMA association—IMEI allocation and approval guidelines (2011) http://www.gsma.com/documents/ts-06-6-0-imei-allocation-and-approval-guidelines/20164/. 5 Jan 2013
  28. 28.
    Changing or keeping a UUID for a moved virtual machine (2013) http://kb.vmware.com/selfservice/microsites/search.do?cmd=displayKC&externalId=1541. 5 Jan 2013
  29. 29.
    Virtualbox (2013) http://www.virtualbox.org. 15 Feb 2013
  30. 30.
    VMware (2013) http://www.vmware.com. 15 Feb 2013
  31. 31.
    Michel D (2013) Petri nets: fundamental models, verification and applications. Wiley-ISTE, New York, 2013Google Scholar
  32. 32.
    Moura L, Bjrner N (2009), Satisfiability modulo theories: an appetizer. In: Oliveira MVM, Woodcock J (eds), Lecture notes in computer science, vol 5902. Springer, Berlin, pp 23–36Google Scholar
  33. 33.
  34. 34.
    Malik SUR, Srinivasan SK, Khan SU, Wang L (2012) A methodology for OSPF routing protocol verification. In: Proceedings of international conference on scalable computing and communications (ScalCom), Changzhou, China, Dec 2012Google Scholar
  35. 35.
    Android SDK (2013) http://developer.android.com/sdk/index.html. 13 Jan 2013
  36. 36.
    RSA Cryptography Standard (2012) PKCS# 1 v2.2 RSA Laboratories. 27 Oct 2012Google Scholar
  37. 37.
    FIB PUB (2008) Secure Hath Standard (SHS). Federal Information Processing Standards PublicationGoogle Scholar
  38. 38.
    RSA Laboratories (2013) http://www.rsa.com/rsalabs/node.asp?id=2004. 2 Jan 2013
  39. 39.
    Khan AN, Kiah MLM, Madani SA, Khan AR, Ali M (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Super Comput. doi: 10.1007/s11227-013-0967-y

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Atta ur Rehman Khan
    • 1
  • Mazliza Othman
    • 1
  • Mazhar Ali
    • 2
  • Abdul Nasir Khan
    • 1
  • Sajjad Ahmad Madani
    • 3
  1. 1.Faculty of Computer Science and Information TechnologyUniversity of MalayaKuala LumpurMalaysia
  2. 2.Department of Electrical and Computer EngineeringNorth Dakota State UniversityFargoUSA
  3. 3.Department of Computer ScienceCOMSATS Institute of Information TechnologyAbbottabadPakistan

Personalised recommendations