Title: Trust delegation-based secure mobile cloud computing framework

Authors: Lo'ai A. Tawalbeh; Fadi Ababneh; Yaser Jararweh; Fahd AlDosari

Addresses: Computer Engineering Department, Umm-AlQura University, Makkah, Saudi Arabia; Faculty of Computer and Information Technology, Jordan University of Science and Technology, Irbid, Jordan ' Faculty of Computer and Information Technology, Jordan University of Science and Technology, Irbid, Jordan ' Faculty of Computer and Information Technology, Jordan University of Science and Technology, Irbid, Jordan ' Computer Engineering Department, Umm-AlQura University, Makkah, Saudi Arabia

Abstract: Mobile devices are used to perform many useful tasks in our daily life. All around the world, many people are using their smart phones to communicate with others, identify their location, and do online shopping. These useful applications involve sharing personal and sensitive information. Also, the smart devices have many weaknesses, such as: limited battery life time, limited processing capacity and security issues. The mobile cloud computing (MCC) can be used to overcome these limitations. Using MCC improved the performance of many applications by conducting the processing at the cloud and sending back the results to the mobile device. But there are still many issues need to be addressed and considered when using MCC specially when dealing with applications that need live interaction and protecting the privacy. In this paper, we will study the main issues associated with mobile cloud computing models that include: security, performance, and quality of service. Then, we will present secure implementation of the cloudlet-based mobile cloud computing framework with its prototype that uses trust delegation technique to provide better security/performance tradeoffs.

Keywords: mobile cloud computing; MCC; cloudlets; cloud security; mobile devices; trust delegation; privacy protection; privacy preservation; performance; QoS; quality of service.

DOI: 10.1504/IJICS.2017.082838

International Journal of Information and Computer Security, 2017 Vol.9 No.1/2, pp.36 - 48

Received: 09 Jan 2016
Accepted: 09 May 2016

Published online: 13 Mar 2017 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article