Abstract
Number of mobile devices like smart phone, TV, printers, sensors, AC, fridge, light and vehicle are expected to reach 18 billion by 2025 around the globe (https://www.statista.com/statistics/245501/multiple-mobile-device-ownership-worldwide/). Data generation, data processing, and data transmission for the task assigned to those devices take huge energy consumption as well as memory storage is less to store the data. Furthermore, the battery life-time is limited to the mobile devices; therefore, by taking the concept of green mobile network, data has been offloaded to the cloud server for processing and store. Even after these benefits, mobile cloud computing (MCC) still is not widely acquired due to the numerous issues are connected with the security of MCC environment, such as privacy, access control, service level agreements, interoperability, charging models, data security, and much more that must be resolved. The security framework can be categorized into three parts: data security framework, access control framework, and communication framework. The discussion of this chapter is two folds: (a) it provides a detail review of aforementioned frameworks along with the brief discussion on the existing security frameworks for green mobile cloud computing (GMCC), and (b) it also discusses the security challenges of the frameworks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Elminaam, D.S.A., Alanezi, F.T., Hosny, K.M.: SMCACC: developing an efficient dynamic secure framework for mobile capabilities augmentation using cloud computing. In: Proceedings of the IEEE Access, vol. 7, pp. 120214–120237 (2019). https://doi.org/10.1109/ACCESS.2019.2929954
Gao, B., He, L., Lu, X., Chang, C., Li, K., Li, K.: Developing energy aware task allocation schemes in cloud-assisted mobile workflows. In: Proceedings of the IEEE International Conference on Computer Science and Information Technology; Ubiquitous Computing and Communication; Dependable, Autonomic Secure Computing; Pervasive Intelligence and Computing, pp. 1266–1273 (2015)
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. In: Proceedings of the Future Generation Computer Systems, vol. 28(3), pp. 583–592 (2012)
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. In: Proceedings of the Journal of Network and Computer Applications, vol. 34(1), pp. 1–11 (2011)
Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. In: Proceedings of the Future Generation Computer Systems, vol. 25(6), pp. 599–616 (2009)
Khan, A.N., Kiah, M.L.M., Khan, S.U., Madani, S.A.: Towards secure mobile cloud computing: a survey. In: Proceeding of the Future Generation Computer Systems, vol. 29(5), pp. 1278–1299 (2013). https://doi.org/10.1016/j.future.2012.08.003
Diaz, C.O., Guzek, M., Pecero, J.E., Bouvry, P., Khan, S.U.: Scalable and energy efficient scheduling techniques for large-scale systems. In: Proceedings of the 11th IEEE International Conference on Computer and Information Technology, CIT’11, Pafos, Cyprus, September (2011)
Cai, C., Wang, L., Khan, S.U., Tao, J.: Energy-aware high performance computing: a taxonomy study. In: Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, ICPADS’11, Tainan, Taiwan, December (2011)
Goiri, I., Berral, J.L., Fitó, J.O., Julià, F., Nou, R., Guitart, J., Gavaldà, R., Torres, J.: Energy-efficient and multifaceted resource management for profit-driven virtualized data centers. In: Proceedings of the Future Generation Computer Systems, vol. 28(5), pp. 718–731 (2012)
Kliazovich, D., Bouvry, P., Khan, S.U.: DENS: data center energy-efficient network-aware scheduling. In: Proceedings of the ACM/IEEE International Conference on Green Computing and Communications, GreenCom’10, Hangzhou, China, December (2010)
Lindberg, P., Leingang, J., Lysaker, D., Khan, S.U., Li, J.: Comparison and analysis of eight scheduling heuristics for the optimization of energy consumption and make span in large-scale distributed systems. In: Proceedings of the Journal of Supercomputing, vol. 59(1), pp. 323–360 (2012)
Quan, D.M., Mezza, F., Sannenli, D., Giafreda, R.: T-alloc: a practical energy efficient resource allocation algorithm for traditional data centers. In: Proceedings of the Future Generation Computer Systems, vol. 28(5), pp. 791–800 (2012)
Diaz, C.O., Guzek, M., Pecero, J.E., Danoy, G., Bouvry, P., Khan, S.U.: Energy aware fast scheduling heuristics in heterogeneous computing systems. In: Proceedings of the ACM/IEEE/IFIP International Conference on High Performance Computing and Simulation, HPCS’11, Istanbul, Turkey, July (2011)
Khan, S.U., Ardil, C.: A weighted sum technique for the joint optimization of performance and power consumption in data centers. In: Proceeding of the International Journal of Electrical, Computer, and Systems Engineering, vol. 3(1), pp. 35–40 (2009)
Khan, S.U.: A self-adaptive weighted sum technique for the joint optimization of performance and power consumption in data centers. In: Proceedings of the 22nd International Conference on Parallel and Distributed Computing and Communication Systems, PDCCS’09, Louisville, KY, USA, September (2009)
Ren, W., Yu, L., Gao, R., Xiong, F.: Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing. In: Proceedings of the Journal of Tsinghua Science and Technology, vol. 16(5), pp. 520–528 (2011)
Khan, A.N., Mat Kiah, M.L., Khan, S.U., Madani, S.A., Khan, A.R.: A study of incremental cryptography for security schemes in mobile cloud computing environments. In: Proceedings of the IEEE Symposium on Wireless Technology and Applications ISWTA (2013)
Khan, A.N., Mat Kiah, M.L., Ali, M., Madani, S.A., Khan, A.R., Shamshirband, S.: BSS: block based sharing scheme for secure data storage services in mobile cloud environment. In: Proceedings of the Journal of Supercomputing (2014)
Patel, C., Chauhan, S.S., Patel, B.: A data security framework for mobile cloud computing. In: Proceedings of International Journal of Advanced Research in Computer and Communication Engineering, vol. 4(2), February (2015)
Jia, W., Zhu, H., Cao, Z., Wei, L., Lin, X.: SDSM: a secure data service mechanism in mobile cloud computing. In: Proceedings IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS, Shanghai, China, April (2011)
Hsueh, S.C., Lin, J.Y., Lin, M.Y.: Secure cloud storage for conventional data archive of smart phones. In: Proceedings of the 15th IEEE International Symposium on Consumer Electronics, ISCE’11, Singapore, June (2011)
Yang, J., Wang, H., Wang, J., Tan, C., Yu, D.: Provable data possession of resource constrained mobile devices in cloud computing. J. Netw. 6(7), 1033–1040 (2011)
Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. IACR Cryptology ePrint Archive: 185 (2011)
Li, F., Rahulamathavan, Y., Conti, M., Rajarajan, M.: Robust access control framework for mobile cloud computing network. In: Proceedings of the Computer Communications, vol. 68, pp. 61–72 (2015). https://doi.org/10.1016/j.comcom.2015.07.005
Zhang, G., Parashar, M.: Context-aware dynamic access control for pervasive applications. In: Proceedings of the Communications Networks and Distributed Systems Modeling and Simulation Conference, pp. 21–30 (2004)
Bonatti, C. Galdi, D.T.: ERBAC: event driven RBAC. In: Proceedings of the 18th ACM Symposium Access Control Models and Technologies. ACM, pp. 125–136 (2013)
Cho, Y.S., Bao, L., Goodrich, M.T.: LAAC: a location-aware access control protocol. In: Proceedings of the IEEE 3rd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 1–7 (2006)
Scott, L., Denning, D.E.: A location based encryption technique and some of its applications. In: Proceedings of the National Technical Meeting of The Institute of Navigation, Anaheim, CA, pp. 734–740 (2003)
Vijayalakshmi, V., Palanivelu, T.G.: Secure localization using elliptic curve cryptography in wireless sensor networks. In: Proceedings of the International Journal of Computer Science and Network Security, vol. 8(6), pp. 255–261 (2008)
Lv, Z., Chi, J., Zhang, M., Feng, D.: Efficiently attribute-based access control for mobile cloud storage system. In: Proceedings of the IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 292–299 (2014). https://doi.org/10.1109/TrustCom.2014.40
Luo, J., Wang, H., Gong, X., Li, T.: A novel role-based access control model in cloud environments. In: Proceedings of International Journal of Computational Intelligence Systems, pp. 1–9 (2016)
Samsung KNOX, http://tinyurl.com/me93jcv. Accessed on 29 Oct 2021
BlackBerry BES12, http://tinyurl.com/ls3yxh8. Accessed on 29 Oct 2021
Raju, N., Saritha, V.: A survey on communication issues in mobile cloud computing. In: Proceedings of Walailak Journal of Science & Technology, vol. 15(1) (2018)
Rudenko, A., Reiher, P., Popek, G.J., Kuenning, G.H.: Saving portable computer battery power through remote process execution. In: Proceedings of the ACM SIGMOBILE Mobile Computing and Communications Review (1998)
Cuervo, A., Balasubramanian, D.K., Cho, A., Wolman, S., Saroiu, R., Chandra, P.B.: MAUI: making smartphones last longer, with code offload. In: Proceedings of the International Conference on Mobile Systems, Applications, and Services (2010)
Zou, C., Wang, Z., Liu, D.B.: Phosphor, “A cloud based DRM scheme with sim card”. In: Proceedings of the Web Conference (2010)
Walker, W., Brisken, J.: Romney, “To lease or not to lease from storage clouds”. In: Proceedings of the Computer (2010)
Ogwara, N.O., Petrova, K., Yang, M.L.: Data security frameworks for mobile cloud computing: a comprehensive review of the literature. In: Proceedings of the 29th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1–4 (2019). https://doi.org/10.1109/ITNAC46935.2019.9078007
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Maitra, T., Chatterjee, P.S., Giri, D. (2022). Security Frameworks for Green Mobile Cloud Computing. In: De, D., Mukherjee, A., Buyya, R. (eds) Green Mobile Cloud Computing. Springer, Cham. https://doi.org/10.1007/978-3-031-08038-8_6
Download citation
DOI: https://doi.org/10.1007/978-3-031-08038-8_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-08037-1
Online ISBN: 978-3-031-08038-8
eBook Packages: Computer ScienceComputer Science (R0)