登录 | 注册 | 充值 | 退出 | 公司首页 | 繁体中文 | 满意度调查
综合馆
弹性移动云计算的研究进展与安全性分析
  • 摘要

    弹性移动云计算(elastic mobile cloud computing,EMCC)中,移动设备按照实时需求将部分任务迁移到云端执行,无缝透明的利用云资源增强自身功能.将现有EMCC方案分为雇佣云端完成部分计算密集任务的计算迁移型移动云计算(computing migration-mobile cloud computing,CM-MCC)和通过云端的虚拟移动设备来辅助或代替移动设备完成多种任务的云端代理型移动云计算(cloud agentmobile cloud computing,CA-MCC)两类,分别对CM-MCC,CA-MCC的适用场景、实现流程、关键技术、存在问题及相应解决方法进行研究并指出其发展方向.对EMCC所面临的主要安全威胁,包括用户的错误操作或恶意行为、恶意代码、通信安全以及虚拟系统漏洞、多租户、不安全资源等云安全问题进行分析并研究相应防御方法,指出安全问题将是EMCC研究的重点和难点.

  • 作者

    李鹏伟  傅建明  李拴保  吕少卿  沙乐天  Li Pengwei  Fu Jianming  Li Shuanbao  Lü Shaoqing  Sha Letian 

  • 作者单位

    武汉大学计算机学院 武汉 430072;空天信息安全与可信计算教育部重点实验室(武汉大学) 武汉430072/武汉大学计算机学院 武汉 430072;空天信息安全与可信计算教育部重点实验室(武汉大学) 武汉430072;软件工程国家重点实验室(武汉大学) 武汉430072/综合业务网理论及关键技术国家重点实验室(西安电子科技大学) 西安710071/南京邮电大学计算机学院 南京210046

  • 刊期

    2015年6期 ISTIC EI PKU

  • 关键词

    移动云计算  计算迁移  云端代理  虚拟移动设备  安全威胁  mobile cloud computing (MCC)  computing migration (CM)  cloud agent (CA)  virtual mobile device (VMD)  security threats 

参考文献
  • [1] 孟祥武,王凡,史艳翠,张玉洁. 移动用户需求获取技术及其应用. 软件学报, 2014,3
  • [2] 袁家斌,魏利利,曾青华. 面向移动终端的云计算跨域访问委托模型?. 软件学报, 2013,3
  • [3] 张仕斌,许春香. 基于云模型的信任评估方法研究. 计算机学报, 2013,2
  • [4] 罗军舟,吴文甲,杨明. 移动互联网:终端、网络与服务. 计算机学报, 2011,11
  • [5] 傅颖勋,罗圣美,舒继武. 安全云存储系统与关键技术综述. 计算机研究与发展, 2013,1
  • [6] 吴吉义,沈千里,章剑林,沈忠华,平玲娣. 云计算:从云安全到可信云. 计算机研究与发展, 2011,z1
  • [7] 雷灵光,荆继武,王跃武,张中文. 一种基于行为的Android系统资源访问控制方案. 计算机研究与发展, 2014,5
  • [8] 吴越,李建华,林闯. 机会网络中的安全与信任技术研究进展. 计算机研究与发展, 2013,2
  • [9] 叶可江,吴朝晖,姜晓红,何钦铭. 虚拟化云计算平台的能耗管理. 计算机学报, 2012,6
  • [10] 俞能海,郝卓,徐甲甲,张卫明,张驰. 云安全研究进展综述. 电子学报, 2013,2
  • [11] 刘向宇,王斌,杨晓春. 社会网络数据发布隐私保护技术综述. 软件学报, 2014,3
  • [12] 傅建明,李鹏伟,易乔,黄诗勇. Android组件间通信的安全缺陷静态检测方法. 华中科技大学学报(自然科学版), 2013,z2
  • [13] 冯登国,张敏,张妍,徐震. 云计算安全研究. 软件学报, 2011,1
  • [14] Barbera M V;Kosta S;Mei A. To offload or not to offload? The bandwidth and energy costs of mobile cloud computing. Piscataway,NJ:IEEE, 2013
  • [15] Jana S;Molnar D;Moshchuk A. Enabling finegrained permissions for augmented reality applications with recognizers. Berkeley,CA:USENIX Association, 2013
  • [16] Petitprez N;Rouvoy R;Filip K. Opportunistic offloading of mobile applications in pervasive environments. New York:ACM, 2014
  • [17] Barbera M V;Kosta S;Stefa J. CloudShield:Efficient anti-malware smartphone patching with a P2P network on the cloud. Piscataway,NJ:IEEE, 2012
  • [18] Marforio C;Ritzdorf H;Francillon A. Analysis of the communication between colluding applications on modern smartphones. New York:ACM, 2012
  • [19] Lalande J F;Wendzel S. Hiding privacy leaks in Android applications using low-attention raising covert channels. Piscataway,NJ:IEEE, 2013
  • [20] Ristenpart T;Tromer E;Shacham H. Hey,you,get off of my cloud:Exploring information leakage in thirdparty compute clouds. New York:ACM, 2009
  • [21] Li P;Gao D;Reiter M K. Mitigating access driven timing channels in clouds using StopWatch. Piscataway,NJ:IEEE, 2013
  • [22] De Cristofaro E;Soriente C. Extended capabilities for a privacy-enhanced participatory sensing infrastructure (PEPSI). IEEE Trans on Information Forensics and Security, 2013,12
  • [23] Wang S;Wang X S. In-device spatial cloaking for mobile user privacy assisted by the cloud. Piscataway,NJ:IEEE, 2010
  • [24] Ardagna C A;Conti M;Leone M. Preserving smartphone users' anonymity in cloudy days. Piscataway,NJ:IEEE, 2013
  • [25] Huang D;Zhang X;Kang M. Mobicloud:Building secure cloud framework for mobile computing and communication. Piscataway,NJ:IEEE, 2010
  • [26] Balan R;Flinn J;Satyanarayanan M. The case for cyber foraging. New York:ACM, 2002
  • [27] Barbera M V;Kosta S;Mei A. CDroid:Towards a cloud-integrated mobile operating system. Piscataway,NJ:IEEE, 2013
  • [28] Barbera M V;Kosta S;Mei A. Mobile offloading in the wild:Findings and lessons learned through a real-life experiment with a new cloud-aware system. Piscataway,NJ:IEEE, 2014
  • [29] Huang D;Xing T;Wu H. Mobile cloud computing service models:A user-centric approach. IEEE Network, 2013,5
  • [30] Chen E Y;Itoh M. Virtual smartphone over IP. Piscataway,NJ:IEEE, 2010
  • [31] Izumi M;Horikawa K. Toward practical use of virtual smartphone. Piscataway,NJ:IEEE, 2012
  • [32] Zhao B;Xu Z;Chi C. Mirroring smartphones for good:A feasibility study. Berlin:Springer, 2012
  • [33] Hassan M A;Chen S. An investigation of different computing sources for mobile application outsourcing on the road. Berlin:Springer, 2012
  • [34] Ren K;Wang C;Wang Q. Security challenges for the public cloud. Internet Computing, 2012,1
  • [35] Khan A N;Mat Kiah M L;Khan S U. Towards secure mobile cloud computing:A survey. Future Generation Computer Systems, 2013,5
  • [36] Jana S;Narayanan A;Shmatikov V. A scanner darkly:Protecting user privacy from perceptual applications. Piscataway,NJ:IEEE, 2013
  • [37] Chen E;Ogata S;Horikawa K. Offloading Android applications to the cloud without customizing Android. Piscataway,NJ:IEEE, 2012
  • [38] Han Jin;Yan Qiang;Gao Debin. Comparing mobile privacy protection through cross-platform applications. Reston:Internet Society, 2013
  • [39] Garfinkel T;Rosenblum M. When virtual is harder than real:Security challenges in virtual machine based computing environments. Berkeley,CA:USENIX Association, 2005
  • [40] Gember A;Dragga C;Akella A. ECOS:Practical mobile application offloading for enterprises. Berkeley,CA:USENIX Association, 2012
  • [41] Liang H;Huang D;Cai L X. Resource allocation for security services in mobile cloud computing. Piscataway,NJ:IEEE, 2011
  • [42] March V;Gu Y;Leonardi E. μCloud:Towards a new paradigm of rich mobile applications. Procedia Computer Science, 2011
  • [43] Gordon M S;Jamshidi D A;Mahlke S. Comet:Code offload by migrating execution transparently. Berkeley,CA:USENIX Association, 2012
  • [44] Huerta-Canepa G;Lee D. A virtual cloud computing provider for mobile devices. New York:ACM, 2010
  • [45] Marinelli E E. Hyrax:Cloud computing on mobile devices using MapReduce,CMU-CS-09 164. Pittsburgh,PA:Carnegie Mellon University, 2009
  • [46] De S;De S. Uncoupling of mobile cloud computing services:An architectural perspective. Berlin:Springer, 2014
  • [47] Shu P;Liu F;Jin H. ETime:Energy-efficient transmission between cloud and mobile devices. Piscataway,NJ:IEEE, 2013
  • [48] Zhang X;Kunjithapatham A;Jeong S. Towards an elastic application model for augmenting the computing capabilities of mobile devices with cloud computing. Mobile Networks and Applications, 2011,3
  • [49] Gkatzikis L;Koutsopoulos I. Migrate or not? Exploiting dynamic task migration in mobile cloud computing systems. IEEE Wireless Communications, 2013,3
  • [50] Park J S;Yu H C;Chung K S. Markov chain based monitoring service for fault tolerance in mobile cloud computing. Piscataway,NJ:IEEE, 2011
  • [51] Gennaro R;Gentry C;Parno B. Non-interactive verifiable computing:Outsourcing computation to untrusted workers. Berlin:Springer, 2010
  • [52] Xu G;Amariucai G;Guan Y. A lightweight argument system with efficient verifier. Piscataway,NJ:IEEE, 2013
  • [53] Rahimi M R;Ren J;Liu C H. Mobile cloud computing:A survey,state of art and future directions. Mobile Networks and Applications, 2014,2
  • [54] Kaewpuang R;Niyato D;Wang P. A framework for cooperative resource management in mobile cloud computing. IEEE Journal on Selected Areas in Communications, 2013,12
  • [55] Kemp R;Palmer N;Kielmann T. Cuckoo:A computation offloading framework for smartphones. Berlin:Springer, 2012
  • [56] Ma X;Zhao Y;Zhang L. When mobile terminals meet the cloud:Computation offloading as the bridge. IEEE Network, 2013,5
  • [57] Yoon C;Kim D;Jung W. Appscope:Application energy metering framework for Android smartphone using kernel activity monitoring. Berkeley,CA:USENIX Association, 2012
  • [58] Chun B G;Maniatis P. Dynamically partitioning applications between weak devices and clouds. New York:ACM, 2010
  • [59] Zhang L;Tiwana B;Qian Z. Accurate online power estimation and automatic battery behavior based power model generation for smartphones. New York:ACM, 2010
  • [60] Giurgiu I;Riva O;Juric D. Calling the cloud:Enabling mobile phones as interfaces to cloud applications. Berlin:Springer, 2009
  • [61] Huber F;Srirama S. Adaptive code offloading for mobile cloud applications:Exploiting fuzzy sets and evidence-based learning. New York:ACM, 2013
  • [62] Gu Q;Guirguis M. Secure mobile cloud computing and security issues. Berlin:Springer, 2014
  • [63] Satyanarayanan M;Bahl P;Caceres R. The case for vm-based cloudlets in mobile computing. IEEE Pervasive Computing, 2009,4
  • [64] Shiraz M;Ahmed E;Gani A. Investigation on runtime partitioning of elastic mobile applications for mobile cloud computing. The Journal of Supercomputing, 2014,1
  • [65] Mansfield-Devine S. Paranoid Android:Just how insecure is the most popular mobile platform. Network Security, 2012,9
  • [66] Bousquet A;Briffaut J;Clévy L. Mandatory access control for the Android dalvik virtual machine. Berkeley,CA:USENIX Association, 2013
  • [67] Smalley S;Craig R. Security enhanced (SE) Android:Bringing flexible MAC to Android. Reston:Internet Society, 2013
  • [68] Kosta S;Aucinas A;Hui P. Thinkair:Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. Piscataway,NJ:IEEE, 2012
  • [69] Conti M;Nguyen V T N;Crispo B. CRePE:Contextrelated policy enforcement for Android. Berlin:Springer, 2011
  • [70] Kim H J;Kim J Y;Kim J H. A study on mobile cloud anomaly detection model. Berlin:Springer, 2012
  • [71] Gilbert P;Chun B G;Cox L P. Vision:Automated security validation of mobile apps at app markets. New York:ACM, 2011
  • [72] Kim M;Park S O. Trust management on user behavioral patterns for a mobile cloud computing. Cluster Computing, 2013,4
  • [73] Gomez L;Neamtiu I;Azim T. RERAN:Timing-and touch-sensitive record and replay for Android. Piscataway,NJ:IEEE, 2013
  • [74] Huang D;Zhou Z;Xu L. Secure data processing framework for mobile cloud computing. Piscataway,NJ:IEEE, 2011
  • [75] Flinn J;Mao Z M. Can deterministic replay be an enabling tool for mobile computing. New York:ACM, 2011
  • [76] Chun B G;Ihm S;Maniatis P. Clonecloud:Elastic execution between mobile device and cloud. New York:ACM, 2011
  • [77] Oberheide J;Veeraraghavan K;Cooke E. Virtualized in-cloud security services for mobile devices. New York:ACM, 2008
  • [78] Khan A N;Kiah M L M;Madani S A. Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. The Journal of Supercomputing, 2013,3
  • [79] Zou P;Wang C;Liu Z. A cloud based SIM DRM scheme for the mobile Internet. New York:ACM, 2010
  • [80] Lai Y;Yang C;Lin C. Design and implementation of mobile forensic tool for Android smart phone through cloud computing. Berlin:Springer, 2011
  • [81] Chow R;Jakobsson M;Masuoka R. Authentication in the clouds:A framework and its application to mobile users. New York:ACM, 2010
  • [82] Zonouz S;Houmansadr A;Berthier R. Secloud:A cloud-based comprehensive and lightweight security solution for smartphones. Computers & Security, 2013
  • [83] Kosta S;Perta V C;Stefa J. Clone2Clone(C2C):Peerto-Peer networking of smartphones on the cloud. Berkeley,CA:USENIX Association, 2013
  • [84] Modi C;Patel D;Borisaniya B. A survey on security issues and solutions at different layers of cloud computing. The Journal of Supercomputing, 2013,2
  • [85] Felt A P;Ha E;Egelman S. Android permissions:User attention,comprehension,and behavior. New York:ACM, 2012
  • [86] Bleikertz S;Schunter M;Probst C W. Security audits of multi-tier virtual infrastructures in public infrastructure clouds. New York:ACM, 2010
  • [87] Yang L;Cao J;Yuan Y. A framework for partitioning and execution of data stream applications in mobile cloud computing. ACM SIGMETRICS Performance Evaluation Review, 2013,4
  • [88] Wei J;Zhang X;Ammons G. Managing security of virtual machine images in a cloud environment. New York:ACM, 2009
  • [89] Hornyack P;Han S;Jung J. These aren't the droids you're looking for:Retrofitting Android to protect data from imperious applications. New York:ACM, 2011
  • [90] Au K W Y;Zhou Y F;Huang Z. Pscout:Analyzing the Android permission specification. New York:ACM, 2012
  • [91] Furnell S;Clarke N;Karatzouni S. Beyond the pin:Enhancing user authentication for mobile devices. Computer Fraud & Security, 2008,8
  • [92] Al Ridhawi Y;Al Ridhawi I;Karmouch A. A context-aware and location prediction framework for dynamic environments. Piscataway,NJ:IEEE, 2011
  • [93] Wu L;Grace M;Zhou Y. The impact of vendor customizations on Android security. New York:ACM, 2013
  • [94] Zhou X;Demetriou S;He D. Identity,location,disease and more:Inferring your secrets from Android public resources. New York:ACM, 2013
  • [95] Wang R;Xing L;Wang X F. Unauthorized origin crossing on mobile platforms:Threats and mitigation. New York:ACM, 2013
  • [96] Kim S H;Han D;Lee D H. Predictability of Android OpenSSL's pseudo random number generator. New York:ACM, 2013
  • [97] Chin E;Felt A P;Greenwood K. Analyzing interapplication communication in Android. New York:ACM, 2011
  • [98] Rellermeyer J S;Riva O;Alonso G. AlfredO:An architecture for flexible interaction with electronic devices. Berlin:Springer, 2008
  • [99] Enck W;Ongtang M;McDaniel P. On lightweight mobile phone application certification. New York:ACM, 2009
  • [100] Enck W;Gilbert P;Chun B G. TaintDroid:An information flow tracking system for real-time privacy monitoring on smartphones. Communications of the ACM, 2014,3
  • [101] Roesner F;Kohno T;Moshchuk A. User-driven access control:Rethinking permission granting in modern operating systems. Piscataway,NJ:IEEE, 2012
  • [102] Geneiatakis D;Kounelis I;Loeschner J. Security and privacy in mobile cloud under a citizen's perspective. Berlin:Springer, 2013
  • [103] Pelechrinis K;Iliofotou M;Krishnamurthy S V. Denial of service attacks in wireless networks:The case of jammers. Communications Surveys & Tutorials, 2011,2
  • [104] Dantu R;Cangussu J W;Patwardhan S. Fast worm containment using feedback control. IEEE Trans on Dependable and Secure Computing, 2007,2
  • [105] Kosta S;Perta V C;Stefa J. CloneDoc:Exploiting the cloud to leverage secure group collaboration mechanisms for smartphones. Piscataway,NJ:IEEE, 2013
  • [106] Zhang H;Wen Y;Yu N. Privacy-preserving computation for location based information survey via mobile cloud computing. Piscataway,NJ:IEEE, 2013
  • [107] Lu Y;Li S;Shen H. Virtualized screen:A third element for cloud. MultiMedia, 2011,2
  • [108] Nguyen T D;Huynh C T;Lee H W. An Efficient Video Hooking in Android x86 to Reduce Server Overhead in Virtual Desktop Infrastructure. Berlin:Springer, 2014
  • [109] He S;Guo L;Guo Y. Elastic application container. Piscataway,NJ:IEEE, 2011
  • [110] Cuervo E;Balasubramanian A;Cho D. MAUI:Making smartphones last longer with code offload. New York:ACM, 2010
  • [111] Shiraz M;Abolfazli S;Sanaei Z. A study on virtual machine deployment for application outsourcing in mobile cloud computing. The Journal of Supercomputing, 2013,3
  • [112] Fernando N;Loke S W;Rahayu W. Mobile cloud computing:A survey. Future Generation Computer Systems, 2013,1
  • [113] Khan A;Othman M;Madani S. A survey of mobile cloud computing application models. IEEE Communications Surveys & Tutorials, 2013,1
  • [114] Dinh H T;Lee C;Niyato D. A survey of mobile cloud computing:architecture,applications,and approaches. Wireless Communications and Mobile Computing, 2013,18
查看更多︾
相似文献 查看更多>>
3.233.217.242