A new approach to mitigating security risks of phone clone co-location over mobile clouds.

Journal of Network and Computer Applications(2016)

Cited 16|Views16
No score
Abstract
Mobile cloud provides smart phone users with unprecedented opportunities to enjoy the abundant computing and storage resources of cloud computing. One viable scheme is to offload computational intensive applications to a mobile phone׳s agent in the cloud, which could be implemented as a thin virtual machine (VM), also termed as phone clone. Due to shared hardware components among co-resident VMs, a VM is subject to covert channel attacks and may potentially leak information to other VMs located in the same physical host. In this paper, we address two critical problems: how to allocate phone clones to minimize the risk of information leakage and how to migrate phone clones whenever the risk becomes higher than a given threshold. We design SWAP: a security aware provisioning and migration scheme for phone clones. Our solution utilizes the spatial and temporal features of phone clones, and by considering the online social connection of mobile users, we greatly simplify the search space of the optimal solution. Furthermore, we study the tradeoffs among security, cost, and load balancing in phone clone provisioning. We evaluate our solution using Reality Mining and Nodobo dataset. Experimental results indicate that our algorithms are nearly optimal for phone clone allocation and are effective in maintaining low security risk and minimizing the number of phone clone migrations.
More
Translated text
Key words
Mobile cloud,Phone clones,Security
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined