top of page

What's the problem? Why is it important?

    According to researches in recent years, Mobile Cloud Computing(MCC) has become a potential technology as the phenomenal growth of mobile applications and mobile consumers. Mobile Cloud Computing is an infrastructure that has data processing and storage away from mobile devices as mobile devices may not be able to have sufficient security protection due to the lack of resources. In this way, the data security issue of MCC becomes more and more urgent and important.

What has been done? Why are they not sufficient? Including any of your previous, other and ongoing projects too.

    According to our research, several different models of MCC security frameworks have been proposed in recent years, however, there are only two to three papers that summarized these models and there is only one [1] that comes from 2019 and the other two are before 2016. The sole 2019 paper, only briefly summarizes these models but lacks a multiperspective evaluation and analysis.

What's your approach? Why can it do better or differently?

    First, we will gather several different approaches of data security in MCC from recent years(2016 - 2020), and instead of a summary, we will pick three to four approaches that we think are typical and compare them more comprehensively. For example, we will compare them based on the CIA triad of data security, which is data confidentiality integrity and availability. Besides that, we will also consider Multi-tenancy, network security and other factors. Then we will also provide a deep evaluation from architecture, implementation and performance level.

● Compare the recent security research on different layers in MCC.

​○ MCUL - Mobile Cloud User Layer

■ Federated cyber defence system, applied method and techniques

■ Using machine learning techniques to assure user data privacy and confidentiality

○ MCCL - Mobile Communication Channel Layer

■ Security enhancement through physical layer authentication

■ Secure access to MCC using cooperating relays

○ CSPL - Cloud Service Provider Layer

■ Attribute-Based Encryption (ABE) in MCC

■ Analysis on Dynamic Encryption Key Security Schema

● Discussion on the first specialized framework for controlling application piracy in MCC, Pirax

○ Architecture

○ Components and high-level design

■ Implementation

■ Security analysis

○ Future research and discussions

bottom of page