Mobile Cloud Computing

A Distributed Mobile Cloud Computing Model for Secure Big Data

A Distributed Mobile Cloud Computing Model for

Abstract—Mobile cloud computing provides a novel ecommerce
mode for organizations without any upfront investment.
Since cloud computing uses distributed resources in open
environment, it is important to provide secure keys to share the
data for developing cloud computing applications. To ensure a
correctness of users’ data in the cloud, we propose an effective
and secure distributed model including a Self-Proxy Server (SPS)
with self-created algorithm. The model resolves a communication
bottleneck due to re-encryption of a shared data in the cloud
whenever users are revoked. It offers to reduce security risks and
protect their resources because a distributed SPS dynamically
interacts with Key Manager (KM) when the mobile users take on
cloud services. This paper presents a comprehensive mobile cloud
design which provides an effective and secure cloud computing
services on mobile devices.
Index Terms—mobile cloud computing, self-proxy server, key
manager, distributed cloud computing, mobile cloud provider.

INTRODUCTION
Acloud system is difficult to synchronize login and
authentication data between external clouds and internal
systems without exposing internal security data. The cloud
technologies are rapidly being adopted throughout the
Information Technology (IT) due to their various attractive
properties. In spite of their spread, they has raised a range
of significant security and privacy concerns which interrupt
their adoption in sensitive environments.
The cloud computing technology provides IT services and
resources to the customers through public network such as
internet. The cloud computing services and infrastructure
are mostly owned by a third party called cloud service
providers. Cloud computing provides an innovative model
for the organizations to use software applications, storage
and processing capabilities of cloud without investing on
the infrastructure. As compared to existing IT models, the
cloud computing provides many advantages like scalability,
flexibility, efficiency and non-core activities [1]. Despite these
extraordinary benefits of cloud computing, it is important to
consider the security risks present in a cloud environment in
order to find enough security solutions[ 2, 3].
From mobile user prospective, mobile cloud computing is
a marvelous improvement because it diminishes the mobile
resources issues like limited battery power, slow processing
power, low internet bandwidth, small storage space and less
energy consumption [4].
Mobile cloud computing offers data processing and storage
capabilities in the cloud which the mobile user can access
using mobile device’s web browser. The mobile users do not
need high data processing and storage capabilities services
on their mobile devices because cloud resources are used for
all the data processing and storage. The number of cloud
users are low despite of the advantages which mobile cloud
computing has brought into mobile computing world. The
major reason is the risks in terms of security and privacy of
the data and services [5]. Companies are still concerned about
security when using cloud computing. Users are worried
about the vulnerability to attacks, when information and
critical IT resources are outside the firewall.
The scheme of [6] has provided comprehensive information
regarding the cloud security problems. It has been estimated
the security problem from cloud architecture point of
view, the cloud stakeholders’ point of view and at the end
from cloud services delivery models point of view. From
stakeholder prospective, the security configurations needs to
be organized and each service should be maintained a level at
runtime. From service delivery model prospective, the cloud
management security issues and cloud access method security
issues are also highlighted.
The scheme of [2] has presented details about the security
issues which cloud service providers are facing when they
dig deep for cloud engineering. There are some serious
issues and challenges which cloud computing is facing in
the domain of cyber security. The paper also covers security
management models for the cloud service providers in order
to meet security compliance.
The scheme of [5] has identified the serious threats and risks
related to privacy and security for the mass and corporate
users when they will integrate their mobile hand held devices
with the cloud infrastructure. The paper point out towards
the different motivational factors which are forcing mobile
cloud operators to move their services and operations to
cloud. It conducted a survey that how wireless mobile devices
integrates with the cloud.
The scheme of [7] has explained the security issues related to
private data and mobile cloud applications in detail. Keeping
the security issues and the existing solution limitations in
mind, it proposed a mobile computing applications security
framework to make sure that the security of the data is achieved when it is transmitted between the components of
the same mobile application.
The scheme of [8] has proposed a mechanism for improving
the security application of cloud computing. The mechanism
is based on dynamic intrusion detection system which
dispatches its detectors on the networking system domain
through multi layers and multi stages deployment. It provides
wide range of security protection like protection of web sites
and pages threats, detection of any intrusion, verification of
the database access and security in cloud side, the detection
of system side data leakage and some other issues related
processes. However, in spite of these schemes, there are
still a number of challenges, which are currently addressed
by researchers, academicians and practitioners in the field.
Mobile cloud computing currently faces some serious security
issues and challenges which limits its adoption among the
mobile users.
The remaining sections are as follows: section 2 discusses
cloud computing architecture, section 3 proposes a secure
mobile cloud computing design with Self-Proxy Server,
section 4 presents the conclusion.