5.0 Types of Security Breaches and Issues
Though there are several advantages in mobile cloud ecosystem, there are some issues and challenges in mobile cloud computing. Some of the major issues in security are
A. Data Ownership
Cloud computing provides the facility to store the personal data and purchased digital media such as e-books, video and audio files remotely. For a user, there is a chance of risk to lose the access to the purchased media data. To avoid these types of risks, the user should be aware of the different rights regarding the purchased media. MCC utilizes the context information such as locations and capabilities of devices and user profiles, which can be used by the mobile cloud server to locally optimize the access management.
B. Privacy
Privacy is one of the biggest challenges in the mobile cloud computing environment. Some applications which hire cloud computing store user’s data remotely. Third party companies may sell this important information to some government agencies without the permission of the user. For example: Mobile devices use location based services which help their friends and other persons to get the updates about the location of the user [6].
C. Data Security and other Security Issues
Mobile devices are famous for malicious code. There are many chances to lose or steal the data because mobile devices are mostly unprotected. An unauthorized person can easily access the information stored on the mobile devices. The top mobile
This article gives a synopsis of threats to the mobile devices and the data existing in them and the available defenses. It classifies seven different types of threats on mobile devices and then it discusses about the precautions that can be taken to avoid these threats. It recommends how to prioritize the different threats and defenses.
Security breaches are occurring at a much more rapid rate in the world today. Major companies and corporations are revealing their breaches and telling the public false information. Many security breaches occur because of exploitation of vulnerabilities, exploits and attacks both internal and external within the system. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. The purpose of this paper is to understand the vulnerabilities, framework, and types of attacks for security requirements and analysis centered on preventing a breach. The framework shows
Mobile devices such as smartphones and tablets have allowed major productivity in the field and in the office and are starting to become an integral part of the business lifestyle. Although their intelligence allows greater productivity, it also makes them vulnerable to attack. A network is only as secure as its weakest link.
Thesis; Along with the efficiency mobile devices render, come along its risks, in which raises substantial security and privacy concerns. It’s important to be aware of the possible threats a mobile can have, along with knowing what and how to secure information, as well as trying to prevent threats from happening.
Cloud computing is revolutionizing many ecosystems by providing organizations with computing resources featuring easy deployment, connectivity, configuration, automation and scalability. This paradigm shift raises a broad range of security and privacy issues that must be taken into consideration. Loss of control, and trust are key challenges in cloud computing environments. This paper will be describing and focusing on cloud security and privacy. In addition to cloud security, the general model of cloud computing is also described where the cloud security and privacy issues can be approached. To preserve such issues, some propositions for cloud security for reference are also proposed along with a brief description for deployment in cloud computing.
Mobile Cloud Computing which helps Mobile preparing and circulated registering, has ended up being one of the business in vogue articulations and an important exchange string in the IT world since 2010. As Mobile Cloud Computing is still toward the starting time of progression, it is critical to understand a thorough perception of the advancement with a true objective to point out the heading of future ask about. With the last point, this paper demonstrates a review on the establishment and manage of Mobile Cloud Computing, characteristics, later investigate work, and future research designs. A short record on the establishment of Mobile Cloud Computing: from versatile figuring to dispersed processing is given and a while later
Abstract—With the increasing trend of technological advancements, the deployment of business applications and processes has greater reliance on the paradigm of cloud computing. The tenants are facilitated on a “pay-as-you-go” approach with respect to the infrastructure, software and platform services. The acceptance of cloud computing model among the consumers is based on its cost-effectiveness in terms of maintenance of the resources along with the flexibility and efficient performance. Nonetheless, certain concerns associated with the data security and credibility of the services are still there that are required to be eradicated for its sustained acceptance within the ICT industry.
Cloud services: The organizations have been highly dependent on the cloud services. The cybercriminals have been seeking ways to exploit corporate security policies for protecting cloud services. The cloud services have been providing immense risk of data being disclosed deliberately or accidentally. The hosting companies have a greater ease of control over the private data and information and can even communicate between the end user and access his user data even without his permission. Therefore this threat has to be placed at the highest priority. Additionally, the cloud providers have the authority to the share information with any of the third parties even without any warrant. All these activities poses privacy concerns as the data can be access on the cloud anywhere and anytime where the information can be deleted, or even altered. All these activities have further left a room for potential unwanted disclosure of data and information on the cloud. Thus using cloud services in an organization poses a threat to exploitation and stealing of confidential data by their competitors, cybercriminals and vigilante justice seekers (Shaikh, F. B., & Haider, S., 2011).
Cloud computing combines a number of computing concepts and technologies in objective to provide secure, quick, convenient data storage and net computing service with all computing resources visualized as services and delivered over the internet. Cloud computing has brought financial benefits and promises to many business and organizations a way to enhance their information technology such as collaboration, agility, scalability and availability without heavy upfront capital costs in servers meanwhile achieving minimal management effort for service providers.
The apps used today often collect data more than needed for its functionality (Li et al. 2016, p.1340). Often these apps track the user location, access the photos, address books, access calendar and track IMEI/UDID without users’ notice (Li et al. 2016, 1340). A report by appthority shows that 24 percent of the top iOS paid apps track users’ location. Whereas, 82 percent of the top Android free apps and 49 percent of the top Android paid apps track users’ location (Li et al. 2016, 1340). Enck et al. (2011, p.28) studied 1,100 Android apps, and found that half of these apps exposed location data to third-party advertisement servers without requiring implicit or explicit user consent.
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
By adopting the Mobile Cloud computing paradigm some research work has been done to address some of the key features of the cloud databases and mobile databases. There are two important features where data management needs to be taken care of:
In this way, mobile computing has brought some major changes to the internet world; some of them include cloud computing, social media services and e-commerce. Cloud computing is a service through which users can compute data, use applications and save their data online on internet. This stored data and applications can be accessed anywhere anytime. For example, if a user saves some data online in cloud from home desktop and then finds a need to access while being on a trip, it can be easily accessed through mobile phone or laptop just by connecting to internet. Similarly, applications can be used while being mobile.
Enhancement in Security and Performance of Mobile Cloud Computing Pankaj Kumar Pandey Computer Science Department IMS Engineering College, Ghaziabad Pankajkpandey04@gmail.com Praveen Kumar Gautam Computer Engineering Department IMS Engineering College, Ghaziabad pkgautam13@gmail.com Vikalp Bhatnagar Computer Engineering Department IMS Engineering College, Ghaziabad vikalpbhatnagar1995@gmail.com Abstract—This paper attempts to describe a literature review of Mobile Cloud Computing (MCC).
2. A mobile application that support privacy and encryption of data that is shared with cloud services.