Call for Paper - August 2019 Edition
IJCA solicits original research papers for the August 2019 Edition. Last date of manuscript submission is July 20, 2019. Read More

Privacy and Control in Mobile Cloud Systems

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 113 - Number 1
Year of Publication: 2015
Authors:
Tariq Alwada'n
Omar Al-zitawi
Sufian Khawaldeh
Mohammed Almasarweh
10.5120/19789-1170

Tariq Alwada'n, Omar Al-zitawi, Sufian Khawaldeh and Mohammed Almasarweh. Article: Privacy and Control in Mobile Cloud Systems. International Journal of Computer Applications 113(1):12-15, March 2015. Full text available. BibTeX

@article{key:article,
	author = {Tariq Alwada'n and Omar Al-zitawi and Sufian Khawaldeh and Mohammed Almasarweh},
	title = {Article: Privacy and Control in Mobile Cloud Systems},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {113},
	number = {1},
	pages = {12-15},
	month = {March},
	note = {Full text available}
}

Abstract

Cloud computing is a huge amount of distributed and dynamic sharing resources that are provided on request to clients over the Internet instead of having a local server or personal devices to deal with applications. Usually, cloud servers don't work at full power; means there's some processing power will be unused. To make use of this wasted power, it's possible to use the mobility which is used to migrate application software, data or jobs among cloud servers. The problem with such technology is the privacy. In this paper we proposed a policy management framework to protect the privacy while applying the mobility method in the cloud environment.

References

  • Alwada'n, T. : Mobile cloud systems. CIT 19(1) (2014)
  • Armbrust, M. , Fox, A. , Griffith, R. , Joseph, A. D. , Katz, R. , Konwinski, A. , Lee, G. , Patterson, D. , Rabkin, A. , Stoica, I. , Zaharia, M. : A view of cloud computing. Commun. ACM 53(4), 50–58 (Apr 2010), http://doi. acm. org/10. 1145/1721654. 1721672
  • The Office of the Privacy Commissioner of Canada, O. : Introduction to cloud computing (October 2011), http://www. priv. gc. ca/resource/fs-fi/02_05_d_51_cc_e. asp
  • Cardelli, L. : Secure internet programming. chap. Abstractions for mobile computations, pp. 51–94. Springer-Verlag, London, UK (1999), http://portal. acm. org/citation. cfm?id=380171. 380179
  • De Chaves, S. A. , Uriarte, R. B. , Westphall, C. B. : Toward an architecture for monitoring private clouds. IEEE Communications Magazine 49(12), 130–137 (2011), http://dblp. uni-trier. de/db/journals/cm/cm49. html#ChavesUW11
  • De Chaves, S. A. , Westphall, C. B. , Lamin, F. R. : Sla perspective in security management for cloud computing. In: Proceedings of the 2010 Sixth International Conference on Networking and Services. pp. 212–217. ICNS '10, IEEE Computer Society, Washington, DC, USA (2010), http://dx. doi. org/10. 1109/ICNS. 2010. 36
  • Chen, Y. , Paxson, V. , Katz, R. H. : Whats new about cloud computing security?Tech. Rep. UCB/EECS-2010-5, EECS Department, University of California, Berkeley (Jan 2010), http://www. eecs. berkeley. edu/Pubs/TechRpts/2010/EECS-2010-5. html
  • DELANEY, K. J. , VARA, V. : Google plans service to store users' data (NOVEMBER 27, 2007), http://online. wsj. com/article/SB119612660573504716. html
  • Foster, I. , Zhao, Y. , Raicu, I. , Lu, S. : Cloud computing and grid computing 360-degree compared. 2008 Grid Computing Environments Workshop abs/0901. 0(5), 1–10 (2008), http://arxiv. org/abs/0901. 0131
  • Foster, I. , Zhao, Y. , Raicu, I. , Lu, S. : Cloud computing and grid computing 360-degree compared. 2008 Grid Computing Environments Workshop abs/0901. 0(5), 1–10 (2008), http://arxiv. org/abs/0901. 0131
  • Heyman, T. , Scandariato, R. , Huygens, C. , Joosen, W. : Using security patterns to combine security metrics. In: Proceedings of the 2008 Third International Conference on Availability, Reliability and Security. pp. 1156–1163. IEEE Computer Society, Washington, DC, USA (2008), http://dl. acm. org/citation. cfm?id=1371602. 1371977
  • Huth, A. , Cebula, J. : The basics of cloud computing (2011), carnegie Mellon University. Produced for US-CERT, a government organiztion
  • Jaeger, P. , Lin, J. , Grimes, J. : Cloud computing and information policy: Computing in a policy cloud? Journal of Information Technology Politics 5(3), 269–283 (2008), http://www. informaworld. com/openurl?genre=article&doi=10. 1080/19331680802425479&magic=crossref
  • Leavitt, N. : Is cloud computing really ready for prime time? Computer 42, 15–20 (January 2009), http://dx. doi. org/10. 1109/MC. 2009. 20
  • Mei, L. , Chan, W. K. , Tse, T. H. : A tale of clouds: Paradigm comparisons and some thoughts on research issues. In: Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference. pp. 464–469. IEEE Computer Society, Washington, DC, USA (2008), http: //dl. acm. org/citation. cfm?id=1487739. 1487898
  • Mell, P. , Grance, T. : The nist definition of cloud computing ( draft ) recommendations of the national institute of standards and technology. Nist Special Publication 145(6), 7 (2011), http://csrc. nist. gov/publications/drafts/800-145/Draft-SP-800-145_cloud-definition. pdf
  • Services, A. W. : Aws economics center (May 2012), http://aws. amazon. com/economics/
  • Singh, R. : Cloud computing from the home (December 2012), http://www. tutorialspoint. com/shorttutorials/cloud-computing-from-the-home
  • Sotomayor, B. , Montero, R. S. , Llorente, I. M. , Foster, I. : Virtual infrastructure management in private and hybrid clouds. IEEE Internet Computing 13, 14–22 (September 2009), http: //dl. acm. org/citation. cfm?id=1638588. 1638692
  • Strickland, J. : How cloud computing works (April 2008), http://computerhowstuffworks. com/cloud-computing/cloud-computing4. htm
  • Tariq Alwada'n, Adel Hamdan Mohammad, H. A. : Privacy in cloud systems. CIT 19(1) (2014).