Abstract
Mobile cloud computing (MCC) is introduced as a supporting architecture for mitigating the resources and energy limitations of mobile devices. And security is considered as a key factor which significantly affects MCC’s widely deployment. Thus data protection methods such as encryption were applied to ensure the security of data. However, the complexity increased by data protection methods brings down the performance of transaction processing in MCC. In order to reduce the hurts brought to users’ satisfactory by data protection methods, we firstly carried out some experiments based on the Hadoop cloud computing platform for quantitative analysis. We used the two popular encryption algorithms DES and AES(512), simulated the transaction processing, measured the time consumption, and logged the battery voltage change of mobile terminals. Results show that data protection methods have significance effects on the efficiency of transaction processing and the energy consumption of mobile devices. Furthermore, the degree of these effects is closely related to the complexity of protection methods. Based on the analysis, this paper proposed a framework for dynamic data protection, expecting to balance the security and resource consumption in MCC.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Xu, C.: Mobile Cloud Computing and Applications. ZTE Communications 9(1), 3 (2011)
Chetan, S., Gautam Kumar, K., Dinesh, M.K., Abhimanyu, M.A.: Cloud Computing for Mobile World, chetan.ueuo.com (2010)
Yue, L.: Reviews of Cloud Computing and Research on the Application of Mobile Cloud Computing. Information and Communications Technologies 4(2) (2010)
Wagner, D., Schneier, B.: Analysis of the SSL 3.0 protocol. In: 2nd USENIX Workshop on Electronic Commerce (1996), http://www.cs.berkeley.edu/~daw/ssl3.0.ps (revised version of November 19, 1996)
Chun, B.-G., Maniatis, P.: Augmented Smartphone Applications Through Clone Cloud Execution. In: Proc. of the 8th Workshop on Hot Topics in Operating Systems (HotOS), Monte Verita, Switzerland (May 2009)
Chun, B.-G., Ihm, S., Maniatis, P., Naik, M.: CloneCloud: Boosting Mobile Device Applications Through Cloud Clone Execution (2009)
Cuervo, E., Balasubramanian, A., Cho, D.-K., Wolman, A., Saroiu, S., Chandra, R., Bahl, P.: MAUI: Making Smartphones Last Longer with Code Offload, mobisys (2010)
Cremers, C., Rasmussen, K.B., Capkun, S.: Distance hijacking attacks on distance bounding protocols (2011)
Yang, G.H.: Analysis of Security for Mobile Internet. In: Confernce on Global Mobile Internet 2011 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lu, H., Xia, X., Wang, X. (2013). How to Dynamically Protect Data in Mobile Cloud Computing?. In: Zu, Q., Hu, B., Elçi, A. (eds) Pervasive Computing and the Networked World. ICPCA/SWS 2012. Lecture Notes in Computer Science, vol 7719. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37015-1_30
Download citation
DOI: https://doi.org/10.1007/978-3-642-37015-1_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37014-4
Online ISBN: 978-3-642-37015-1
eBook Packages: Computer ScienceComputer Science (R0)