International Journal of Advanced Computer Research (IJACR) ISSN (P): 2249-7277 ISSN (O): 2277-7970 Vol - 10, Issue - 51, November 2020
  1. 1
    Google Scholar
  2. 4
    Impact Factor
Research gaps based virtualization in mobile cloud computing

Boubakeur Annane, Adel Alti and Osman Ghazali

Abstract

Recently, mobile computing is known as a fast-growing utilization of people's daily life. However, the main challenge that faced this rapid advancement is the limited mobile devices’ resources such as processing capability, storage space and battery life. With the development of cloud computing, mobile devices’ resources are improved with the help of cloud services, which resulted an emerged technology named Mobile Cloud Computing (MCC). Although the MCC has several advantages for mobile users, it is also challenged by many critical issues like security and privacy of the mobile user's data that offloaded on the cloud’ servers and processed on the virtual machines (VMs). In virtualization, various investigations showed that malicious users are able to break down the cloud security methods by spreading their VMs in order to alter or violate the user sensitive data that executed on cloud’ VMs. This paper deeply analyzes the recent MCC based virtualization approaches and methods by criticizing them. We found out that no approach protects the data from being stolen while distributed VMs that deployed on different cloud servers exchanging data. Hence, the paper provides practical gaps related to virtualization in MCC and future perspectives.

Keyword

Security and privacy, Mobile cloud computing, Virtualization, Co-location, Hypervisor, Distributed attacks.

Cite this article

Annane B, Alti A, Ghazali O

Refference

[1][1]Moorthy V, Venkataraman R, Rao TR. Security and privacy attacks during data communication in software defined mobile clouds. Computer Communications. 2020; 153:515-26.

[2][2]Shakarami A, Ghobaei-Arani M, Masdari M, Hosseinzadeh M. A survey on the computation offloading approaches in mobile edge/cloud computing environment: a stochastic-based perspective. Journal of Grid Computing. 2020:1-33.

[3][3]Tabrizchi H, Rafsanjani MK. A survey on security challenges in cloud computing: issues, threats, and solutions. The Journal of Supercomputing. 2020:1-40.

[4][4]https://flexiscale.com/. Accessed 20 June 2020.

[5][5]https://aws.amazon.com/fr/ec2/. Accessed 20 June 2020.

[6][6]https://aws.amazon.com/fr/s3/. Accessed 20 June 2020.

[7][7]Noor TH, Zeadally S, Alfazi A, Sheng QZ. Mobile cloud computing: challenges and future research directions. Journal of Network and Computer Applications. 2018; 115:70-85.

[8][8]Asvija B, Eswari R, Bijoy MB. Security in hardware assisted virtualization for cloud computing—State of the art issues and challenges. Computer Networks. 2019; 151:68-92.

[9][9]Compastié M, Badonnel R, Festor O, He R. From virtualization security issues to cloud protection opportunities: an in-depth analysis of system virtualization models. Computers & Security. 2020.

[10][10]Sgandurra D, Lupu E. Evolution of attacks, threat models, and solutions for virtualized systems. ACM Computing Surveys. 2016; 48(3):1-38.

[11][11]Han Y, Chan J, Alpcan T, Leckie C. Virtual machine allocation policies against co-resident attacks in cloud computing. In international conference on communications 2014 (pp. 786-92). IEEE.

[12][12]Han Y, Alpcan T, Chan J, Leckie C. Security games for virtual machine allocation in cloud computing. In international conference on decision and game theory for security 2013 (pp. 99-118). Springer, Cham.

[13][13]Aliyu A, Abdullah AH, Kaiwartya O, Hussain Madni SH, Joda UM, Ado A, et al. Mobile cloud computing: taxonomy and challenges. Journal of Computer Networks and Communications. 2020.

[14][14]Zhang J, Chen B, Zhao Y, Cheng X, Hu F. Data security and privacy-preserving in edge computing paradigm: Survey and Open Issues. IEEE Access. 2018; 6:18209-37.

[15][15]Dixit P, Gupta AK, Trivedi MC, Yadav VK. Traditional and hybrid encryption techniques: a survey. In networking communication and data knowledge engineering 2018 (pp. 239-48). Springer, Singapore.

[16][16]Mollah MB, Azad MA, Vasilakos A. Security and privacy challenges in mobile cloud computing: survey and way ahead. Journal of Network and Computer Applications. 2017; 84:38-54.

[17][17]Fan Y, Lin X, Tan G, Zhang Y, Dong W, Lei J. One secure data integrity verification scheme for cloud storage. Future Generation Computer Systems. 2019; 96:376-85.

[18][18]Dinh HT, Lee C, Niyato D, Wang P. A survey of mobile cloud computing: architecture, applications, and approaches. Wireless Communications and Mobile Computing. 2013; 13(18):1587-611.

[19][19]Veerabathiran VK, Mani D, Kuppusamy S, Subramaniam B, Velayutham P, Sengan S, et al. Improving secured ID-based authentication for cloud computing through novel hybrid fuzzy-based homomorphic proxy re-encryption. Soft Computing. 2020:1-6.

[20][20]Agrawal N, Tapaswi S. A trustworthy agent-based encrypted access control method for mobile cloud computing environment. Pervasive and Mobile Computing. 2019; 52:13-28.

[21][21]Perez-Botero D, Szefer J, Lee RB. Characterizing hypervisor vulnerabilities in cloud computing servers. In proceedings of the 2013 international workshop on security in cloud computing 2013 (pp. 3-10).

[22][22]Li SW, Koh JS, Nieh J. Protecting cloud virtual machines from hypervisor and host operating system exploits. In {USENIX} security symposium ({USENIX} security 19) 2019 (pp. 1357-74)

[23][23]Annane B, Alti A, Ghazali O. Secnetworkcloudsim: an extensible simulation tool for secure distributed mobile applications. International Journal of Communication Networks and Information Security. 2020.

[24][24]Azar Y, Kamara S, Menache I, Raykova M, Shepard B. Co-location-resistant clouds. In proceedings of the 6th edition of the ACM workshop on cloud computing security 2014 (pp. 9-20).

[25][25]Li M, Zhang Y, Bai K, Zang W, Yu M, He X. Improving cloud survivability through dependency based virtual machine placement. In SECRYPT 2012 (pp. 321-6).

[26][26]He L, Huang F, Zhang J, Liu B, Chen C, Zhang Z, et al. Dynamic secure interconnection for security enhancement in cloud computing. International Journal of Computers Communications & Control. 2016; 11(3):348-57.

[27][27]Somula R, Anilkumar C, Venkatesh B, Karrothu A, Kumar CP, Sasikala R. Cloudlet services for healthcare applications in mobile cloud computing. In proceedings of the international conference on data engineering and communication technology 2019 (pp. 535-43). Springer, Singapore.

[28][28]Jegadeesan S, Azees M, Kumar PM, Manogaran G, Chilamkurti N, Varatharajan R, et al. An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications. Sustainable Cities and Society. 2019; 49:101522.

[29][29]Sridhar S, Smys S. Hybrid RSAECC based secure communication in mobile cloud environment. Wireless Personal Communications. 2020; 111(1):429-42.

[30][30]Han Y, Chan J, Alpcan T, Leckie C. Using virtual machine allocation policies to defend against co-resident attacks in cloud computing. IEEE Transactions on Dependable and Secure Computing. 2015; 14(1):95-108.

[31][31]Hao Z, Tang Y, Zhang Y, Novak E, Carter N, Li Q. SMOC: a secure mobile cloud computing platform. In conference on computer communications 2015 (pp. 2668-76). IEEE.