ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2015, Vol. 52 ›› Issue (6): 1362-1377.doi: 10.7544/issn1000-1239.2015.20140227

Previous Articles     Next Articles

Elastic Mobile Cloud Computing:State of the Art and Security Analysis

Li Pengwei1,2,Fu Jianming1,2,3,Li Shuanbao1,2, Lü Shaoqing4, Sha Letian5   

  1. 1(Computer School, Wuhan University, Wuhan 430072);2(Key Laboratory of Aerospace Information Security and Trusted Computing(Wuhan University), Ministry of Education, Wuhan 430072);3(State Key Laboratory of Software Engineering(Wuhan University), Wuhan 430072);4(State Key Laboratory of Integrated Services Networks(Xidian University), Xi’an 710071);5(School of Compter Science & Technology , Nanjing University of Posts and Telecommunications, Nanjing 210046)
  • Online:2015-06-01

Abstract: Elastic mobile cloud computing (EMCC) enables the seamless and transparent use of cloud resource to augment the capability of mobile devices by off-loading parts of mobile devices’ tasks to cloud according to the real-time user requirement. By summarizing the service providing models of EMCC, we divide existing EMCC models into two categories: computing migration-mobile cloud computing(CM-MCC), in which the mobile devices employ the cloud to perform the parts of their computing intensive tasks; and cloud agent-mobile cloud computing(CA-MCC), in which the cloud maintains one or more virtual mobile devices for each mobile device and these virtual mobile devices are synchronized with the mobile device to complete various tasks such as computing, storage, security and communication instead of the mobile device. Then the applicable scenarios, the implementation method, the key issues, and the future research of EMCC models in each category are studied. After that, we analyze the critical security threats of EMCC, including users’ error operations or malicious actions, malicious applications, communications security problems, and cloud computing security issues such as the vulnerabilities of virtual system, multi-tenant problems, malicious cloud service providers. The corresponding defenses of these threats are discussed. At last, we point out that security is a key issue for EMCC.

Key words: mobile cloud computing (MCC), computing migration (CM), cloud agent (CA), virtual mobile device (VMD), security threats

CLC Number: