Skip to main content

How to Dynamically Protect Data in Mobile Cloud Computing?

  • Conference paper
Pervasive Computing and the Networked World (ICPCA/SWS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 7719))

  • 3991 Accesses

Abstract

Mobile cloud computing (MCC) is introduced as a supporting architecture for mitigating the resources and energy limitations of mobile devices. And security is considered as a key factor which significantly affects MCC’s widely deployment. Thus data protection methods such as encryption were applied to ensure the security of data. However, the complexity increased by data protection methods brings down the performance of transaction processing in MCC. In order to reduce the hurts brought to users’ satisfactory by data protection methods, we firstly carried out some experiments based on the Hadoop cloud computing platform for quantitative analysis. We used the two popular encryption algorithms DES and AES(512), simulated the transaction processing, measured the time consumption, and logged the battery voltage change of mobile terminals. Results show that data protection methods have significance effects on the efficiency of transaction processing and the energy consumption of mobile devices. Furthermore, the degree of these effects is closely related to the complexity of protection methods. Based on the analysis, this paper proposed a framework for dynamic data protection, expecting to balance the security and resource consumption in MCC.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Xu, C.: Mobile Cloud Computing and Applications. ZTE Communications 9(1), 3 (2011)

    Google Scholar 

  2. Chetan, S., Gautam Kumar, K., Dinesh, M.K., Abhimanyu, M.A.: Cloud Computing for Mobile World, chetan.ueuo.com (2010)

    Google Scholar 

  3. Yue, L.: Reviews of Cloud Computing and Research on the Application of Mobile Cloud Computing. Information and Communications Technologies 4(2) (2010)

    Google Scholar 

  4. Wagner, D., Schneier, B.: Analysis of the SSL 3.0 protocol. In: 2nd USENIX Workshop on Electronic Commerce (1996), http://www.cs.berkeley.edu/~daw/ssl3.0.ps (revised version of November 19, 1996)

  5. Chun, B.-G., Maniatis, P.: Augmented Smartphone Applications Through Clone Cloud Execution. In: Proc. of the 8th Workshop on Hot Topics in Operating Systems (HotOS), Monte Verita, Switzerland (May 2009)

    Google Scholar 

  6. Chun, B.-G., Ihm, S., Maniatis, P., Naik, M.: CloneCloud: Boosting Mobile Device Applications Through Cloud Clone Execution (2009)

    Google Scholar 

  7. Cuervo, E., Balasubramanian, A., Cho, D.-K., Wolman, A., Saroiu, S., Chandra, R., Bahl, P.: MAUI: Making Smartphones Last Longer with Code Offload, mobisys (2010)

    Google Scholar 

  8. Cremers, C., Rasmussen, K.B., Capkun, S.: Distance hijacking attacks on distance bounding protocols (2011)

    Google Scholar 

  9. Yang, G.H.: Analysis of Security for Mobile Internet. In: Confernce on Global Mobile Internet 2011 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lu, H., Xia, X., Wang, X. (2013). How to Dynamically Protect Data in Mobile Cloud Computing?. In: Zu, Q., Hu, B., Elçi, A. (eds) Pervasive Computing and the Networked World. ICPCA/SWS 2012. Lecture Notes in Computer Science, vol 7719. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37015-1_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37015-1_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37014-4

  • Online ISBN: 978-3-642-37015-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics