(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Computer Research (IJACR)

ISSN (Print):2249-7277    ISSN (Online):2277-7970
Volume-10 Issue-51 November-2020
Full-Text PDF
Paper Title : Research gaps based virtualization in mobile cloud computing
Author Name : Boubakeur Annane, Adel Alti and Osman Ghazali
Abstract :

Recently, mobile computing is known as a fast-growing utilization of people's daily life. However, the main challenge that faced this rapid advancement is the limited mobile devices’ resources such as processing capability, storage space and battery life. With the development of cloud computing, mobile devices’ resources are improved with the help of cloud services, which resulted an emerged technology named Mobile Cloud Computing (MCC). Although the MCC has several advantages for mobile users, it is also challenged by many critical issues like security and privacy of the mobile user's data that offloaded on the cloud’ servers and processed on the virtual machines (VMs). In virtualization, various investigations showed that malicious users are able to break down the cloud security methods by spreading their VMs in order to alter or violate the user sensitive data that executed on cloud’ VMs. This paper deeply analyzes the recent MCC based virtualization approaches and methods by criticizing them. We found out that no approach protects the data from being stolen while distributed VMs that deployed on different cloud servers exchanging data. Hence, the paper provides practical gaps related to virtualization in MCC and future perspectives.

Keywords : Security and privacy, Mobile cloud computing, Virtualization, Co-location, Hypervisor, Distributed attacks.
Cite this article : Annane B, Alti A, Ghazali O. Research gaps based virtualization in mobile cloud computing. International Journal of Advanced Computer Research. 2020; 10(51):212-222. DOI:10.19101/IJACR.2020.1048101.
References :
[1]Moorthy V, Venkataraman R, Rao TR. Security and privacy attacks during data communication in software defined mobile clouds. Computer Communications. 2020; 153:515-26.
[Crossref] [Google Scholar]
[2]Shakarami A, Ghobaei-Arani M, Masdari M, Hosseinzadeh M. A survey on the computation offloading approaches in mobile edge/cloud computing environment: a stochastic-based perspective. Journal of Grid Computing. 2020:1-33.
[Crossref] [Google Scholar]
[3]Tabrizchi H, Rafsanjani MK. A survey on security challenges in cloud computing: issues, threats, and solutions. The Journal of Supercomputing. 2020:1-40.
[Crossref] [Google Scholar]
[4]https://flexiscale.com/. Accessed 20 June 2020.
[5]https://aws.amazon.com/fr/ec2/. Accessed 20 June 2020.
[6]https://aws.amazon.com/fr/s3/. Accessed 20 June 2020.
[7]Noor TH, Zeadally S, Alfazi A, Sheng QZ. Mobile cloud computing: challenges and future research directions. Journal of Network and Computer Applications. 2018; 115:70-85.
[Crossref] [Google Scholar]
[8]Asvija B, Eswari R, Bijoy MB. Security in hardware assisted virtualization for cloud computing—State of the art issues and challenges. Computer Networks. 2019; 151:68-92.
[Crossref] [Google Scholar]
[9]Compastié M, Badonnel R, Festor O, He R. From virtualization security issues to cloud protection opportunities: an in-depth analysis of system virtualization models. Computers & Security. 2020.
[Crossref] [Google Scholar]
[10]Sgandurra D, Lupu E. Evolution of attacks, threat models, and solutions for virtualized systems. ACM Computing Surveys. 2016; 48(3):1-38.
[Crossref] [Google Scholar]
[11]Han Y, Chan J, Alpcan T, Leckie C. Virtual machine allocation policies against co-resident attacks in cloud computing. In international conference on communications 2014 (pp. 786-92). IEEE.
[Crossref] [Google Scholar]
[12]Han Y, Alpcan T, Chan J, Leckie C. Security games for virtual machine allocation in cloud computing. In international conference on decision and game theory for security 2013 (pp. 99-118). Springer, Cham.
[Crossref] [Google Scholar]
[13]Aliyu A, Abdullah AH, Kaiwartya O, Hussain Madni SH, Joda UM, Ado A, et al. Mobile cloud computing: taxonomy and challenges. Journal of Computer Networks and Communications. 2020.
[Crossref] [Google Scholar]
[14]Zhang J, Chen B, Zhao Y, Cheng X, Hu F. Data security and privacy-preserving in edge computing paradigm: Survey and Open Issues. IEEE Access. 2018; 6:18209-37.
[Crossref] [Google Scholar]
[15]Dixit P, Gupta AK, Trivedi MC, Yadav VK. Traditional and hybrid encryption techniques: a survey. In networking communication and data knowledge engineering 2018 (pp. 239-48). Springer, Singapore.
[Crossref] [Google Scholar]
[16]Mollah MB, Azad MA, Vasilakos A. Security and privacy challenges in mobile cloud computing: survey and way ahead. Journal of Network and Computer Applications. 2017; 84:38-54.
[Crossref] [Google Scholar]
[17]Fan Y, Lin X, Tan G, Zhang Y, Dong W, Lei J. One secure data integrity verification scheme for cloud storage. Future Generation Computer Systems. 2019; 96:376-85.
[Crossref] [Google Scholar]
[18]Dinh HT, Lee C, Niyato D, Wang P. A survey of mobile cloud computing: architecture, applications, and approaches. Wireless Communications and Mobile Computing. 2013; 13(18):1587-611.
[Crossref] [Google Scholar]
[19]Veerabathiran VK, Mani D, Kuppusamy S, Subramaniam B, Velayutham P, Sengan S, et al. Improving secured ID-based authentication for cloud computing through novel hybrid fuzzy-based homomorphic proxy re-encryption. Soft Computing. 2020:1-6.
[Crossref] [Google Scholar]
[20]Agrawal N, Tapaswi S. A trustworthy agent-based encrypted access control method for mobile cloud computing environment. Pervasive and Mobile Computing. 2019; 52:13-28.
[Crossref] [Google Scholar]
[21]Perez-Botero D, Szefer J, Lee RB. Characterizing hypervisor vulnerabilities in cloud computing servers. In proceedings of the 2013 international workshop on security in cloud computing 2013 (pp. 3-10).
[Crossref] [Google Scholar]
[22]Li SW, Koh JS, Nieh J. Protecting cloud virtual machines from hypervisor and host operating system exploits. In {USENIX} security symposium ({USENIX} security 19) 2019 (pp. 1357-74)
[Google Scholar]
[23]Annane B, Alti A, Ghazali O. Secnetworkcloudsim: an extensible simulation tool for secure distributed mobile applications. International Journal of Communication Networks and Information Security. 2020.
[Google Scholar]
[24]Azar Y, Kamara S, Menache I, Raykova M, Shepard B. Co-location-resistant clouds. In proceedings of the 6th edition of the ACM workshop on cloud computing security 2014 (pp. 9-20).
[Crossref] [Google Scholar]
[25]Li M, Zhang Y, Bai K, Zang W, Yu M, He X. Improving cloud survivability through dependency based virtual machine placement. In SECRYPT 2012 (pp. 321-6).
[Crossref] [Google Scholar]
[26]He L, Huang F, Zhang J, Liu B, Chen C, Zhang Z, et al. Dynamic secure interconnection for security enhancement in cloud computing. International Journal of Computers Communications & Control. 2016; 11(3):348-57.
[Crossref] [Google Scholar]
[27]Somula R, Anilkumar C, Venkatesh B, Karrothu A, Kumar CP, Sasikala R. Cloudlet services for healthcare applications in mobile cloud computing. In proceedings of the international conference on data engineering and communication technology 2019 (pp. 535-43). Springer, Singapore.
[Crossref] [Google Scholar]
[28]Jegadeesan S, Azees M, Kumar PM, Manogaran G, Chilamkurti N, Varatharajan R, et al. An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications. Sustainable Cities and Society. 2019; 49:101522.
[Crossref] [Google Scholar]
[29]Sridhar S, Smys S. Hybrid RSAECC based secure communication in mobile cloud environment. Wireless Personal Communications. 2020; 111(1):429-42.
[Crossref] [Google Scholar]
[30]Han Y, Chan J, Alpcan T, Leckie C. Using virtual machine allocation policies to defend against co-resident attacks in cloud computing. IEEE Transactions on Dependable and Secure Computing. 2015; 14(1):95-108.
[Crossref] [Google Scholar]
[31]Hao Z, Tang Y, Zhang Y, Novak E, Carter N, Li Q. SMOC: a secure mobile cloud computing platform. In conference on computer communications 2015 (pp. 2668-76). IEEE.
[Crossref] [Google Scholar]