CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Literature Review of Mobile Applications Testing on Cloud from Information Security Perspective

by Shilpa Bahl, M. M Chaturvedi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 14
Year of Publication: 2013
Authors: Shilpa Bahl, M. M Chaturvedi
10.5120/13809-1799

Shilpa Bahl, M. M Chaturvedi . Literature Review of Mobile Applications Testing on Cloud from Information Security Perspective. International Journal of Computer Applications. 79, 14 ( October 2013), 15-23. DOI=10.5120/13809-1799

@article{ 10.5120/13809-1799,
author = { Shilpa Bahl, M. M Chaturvedi },
title = { Literature Review of Mobile Applications Testing on Cloud from Information Security Perspective },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 14 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 15-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number14/13809-1799/ },
doi = { 10.5120/13809-1799 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:52:59.341385+05:30
%A Shilpa Bahl
%A M. M Chaturvedi
%T Literature Review of Mobile Applications Testing on Cloud from Information Security Perspective
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 14
%P 15-23
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The adoption of mobile application is increasing at enormous rate due to their improved functionality and features. Increased storage and computing power has augmented its utility. However, these mobile applications are still intrinsically limited by a relative lack of bandwidth, computing power, storage and energy compared to desktops. To overcome these limitations, the concept of Mobile Cloud Computing (MCC) providing abundant computing power and sufficient storage space besides large infrastructure has evolved. Cloud computing has its impact on all the stages of Software life cycle, including testing of mobile devices. In this paper we have reviewed Testing as a Service (TaaS) provided by Cloud computing. Testing of mobile application is more complex and time consuming as compared to traditional desktop applications. This paper reviews some published results in two major research fields ie cloud computing and TaaS and discusses architecture of cloud computing and TaaS in terms of necessity, features, emerging trends, benefits and gaps while focussing on security and privacy issues for mobile application. When we run our applications on the cloud, we are sharing our critical data with cloud and, therefore, security and privacy of data is a very serious issue to be considered.

References
  1. AppLabs. " Testing the Cloud". White paper, Internet:http://www. applabs. com/html/TestingtheCloud_786. html.
  2. Bahl Paramvir & Richard Y. Han & Li Erran Li & Mahadev Satyanarayanan. 2012. "Advancing the State of Mobile Cloud Computing". Low Wood Bay, Lake District, UK. MCS'12.
  3. http://www. cisco. com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns1175/Cloud_Index_White_Paper. pdf
  4. Chow C-Y & Mokbel M. F & Aref W. G,(2009). Query processing for location services without compromising privacy. ACM Transactions on Database Systems (TODS), vol. 34, no. 4.
  5. Chow. R&J akobsson. M & Masuoka. R & Molina. J & Niu. Y & Shi. E& Song. Z. (2010). Authentication in the clouds: a framework and its application to mobile users. Proceedings. ACM Cloud Computing Security Workshop, CCSW '10, Chicago, USA.
  6. Hoang T. Dinh & Chonho Lee & Dusit Niyato & Ping Wang. A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches. Wireless Communications and Mobile Computing – Wiley.
  7. Jerry Gao, Ph. D. Professor & W. T. Tsai, Ph. D. Professor, Mobile Testing-as-a-Service, [Power point Presentatio]. 25th June Accessed.
  8. Jerry Gao & Xiaoying Bai & Wei-Tek Tsai . (2011). Cloud Testing- Issues, Challenges, Needs and Practice . Software Engineering : An International Journal (SEIJ), Vol. 1, No. 1.
  9. S. C. Hsueh & J. Y. Lin & M. Y. Lin. (2011) Secure cloud storage for conventional data archive of smart phones. Proceedings 15th IEEE Int. Symposium on Consumer Electronics, ISCE '11.
  10. D. Huang & Z. Zhou & L. Xu & T. Xing & Y. Zhong(2011). "Secure data processing framework for mobilecloud computing". Proc. IEEE INFOCOM Workshop on Cloud Computing, INFOCOM '11, Shanghai, China
  11. W. Itani & A. Kayssi & A. Chehab . (2010). "Energy-efficient incremental integrity for securing storage in mobile cloud computing". Proceedings Int. Conference on Energy Aware Computing, ICEAC '10, Cairo, Egypt.
  12. W. Jia & H. Zhu & Z. Cao & L. Wei & X. Lin. (2011). "Asecure data service mechanism in mobile cloud computing", Proceedings IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS, Shanghai, China.
  13. Abdul Nasir Khana & M. L. Mat Kiah & Samee U. Khanb & Sajjad A. Madanic. (2012). " Towards secure mobile cloud computing": A survey. Future Generation Computer Systems. 08-003,Page no. 1-5.
  14. A. Konstantinidis & C. Costa & G. Larkou & D. Zeinalipour- Yazti. (2012). Demo: "A programming cloud of smartphones" . Proceedings of the 10th international conference on Mobile systems, applications, and services, ACM New York, NY, USA. pp. 465–466.
  15. Vinit B. Mohata1& Dhananjay M. Dakhane & Ravindra L. Pardhi. (2013). "Cloud Based Testing: Need of Testing in Cloud Platform"sInternational Journal of Application or Innovation in Engineering & Management (IJAIEM) Volume 2, Issue 3 .
  16. Henry Muccini & Antonio Di Francesco & Patrizio Esposito. "Software testing of mobile Applications Challenges and future Research Directions".
  17. J. Oberheide & E. Cooke & F. Jahanian. (2008). "CloudAV:N-version antivirus in the network cloud" . Processing of the 17th USENIX Security Symposium.
  18. J. Oberheide & E. Cooke & F. Jahanian. (2007). "Rethinking antivirus: Executable analysis in the network cloud". Proceedings of the 2nd USENIX workshop on hot topics in security (HOTSEC).
  19. K. Priyadarsini & V. Balasubramanian & S. Karthik. (2011). "Cloud Testing as a Service" (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 2, pp173 – 177.
  20. L. Sweeney. (2002). " k-anonymity:A model for protecting privacy". International Journal of Uncertainty Fuzziness and Knowledge-Based Systems.
  21. H. Turner & J. White & J. Reed & J. Galindo & A. Porter & M. Marathe & A. Vullikanti & Gokhale. (2012). "Building a Cloud-Based Mobile Application Test bed". Software Testing in the Cloud: Perspectives on an Emerging Discipline pp. 382–403.
  22. Sergiy Vilkomir. "Cloud Testing-A State of The Art" Review. pp 213-221
  23. Mladen. A. Vouk,(2008). "Cloud computing: Issues, research and implementations". ITI 2008 30th International Conference on Information Technology Interfaces, 16(4):31–40.
  24. S. Wang& X. S. Wang. (2010). In-Device Spatial Cloaking for Mobile User Privacy Assisted by the Cloud. Proceedings of the 11th International Conference on Mobile Data Management (MDM), pp. 381.
  25. B. Wrenn, CISSP, ISSEP. Unisys Secure "Cloud Addressing the Top Threats of Cloud Computing". (white paper). Accessed 25th June.
  26. S. Xiao & W. Gong. (2010). "Mobility can help: protect user identity with dynamic credential". Proceedings. 11th Int. Conference on Mobile Data Management, MDM 10, Missouri, USA.
  27. H. Zhangwei & X. Mingjun. (2010). "A Distributed Spatial Cloaking Protocol for Location Privacy", Proceedings of the 2nd International Conference on Networks Security Wireless Communications and Trusted Computing (NSWCTC), vol. 2, pp. 468.
  28. X. Zhang & J. Schiffman & S. Gibbs & A. Kunjithapatham & S. Jeong. (2009). "Securing elastic applications on mobile devices for cloud computing". Proceedings ACM workshop on Cloud computing security, CCSW '09, Chicago, IL, USA.
  29. Z. Zhou & D. Huang(2011). "Efficient and secure data storage operations for mobile cloud computing". IACR Cryptology ePrint Archive: 185
  30. T. Vengattaraman, P. Dhavachelvan and R. Baskaran (2010). "A Model of Cloud Based Application Environment for Software Testing". (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No.
  31. Fuyang Peng, Bo Deng, and Chao Qi (2012)"CASTE:A Cloud-Based Automatic Software Test Environment". World Academy of Science, Engineering and Technology 71 2012
  32. Oleksii starov and Sergiy Vilkomir (2013). "Integrated TaaS Platform for Mobile Development Architecture solutions".
  33. P. Mell and T. Grance, "Draft nist working definition of cloud computing - v15," 21. Aug 2009, 2009.
  34. A. Konstantinidis, C. Costa,G. Larkou and D. Zeinalipour yazti (2012). "Demo: A Programming Cloud Of Smartphones". In Proceedings of 10th international conference on Mobile Systems ,applications, and services, ACM New York,NY, USA,pp-465-466.
  35. Leah Muthoni Riungu, Ossi Taipale, Kari Smolander. (2010). "Sotware Testing as an Online Service: observations From Practice". Third international conference on software testing, Verification, and Validation Workshop.
  36. Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung Automating Privacy Testing of Smartphone Applications.
  37. Jun-fei Huang ,yun- zhan Gong,(2012). Remote Mobile Test System:A Mobile Phone Cloud for Application Testing.
  38. Peter Gilbert & Byung-Gon,(2011) Chun "Vision: Automated Security Validation of Mobile Apps at App Markets".
  39. Selvam. R&Dr. V. Kartikeyani. (2011). "Mobile Software Testing-Automated Test Caes Design Strategies. International Journal on computer Science and engineering(IJCSE).
  40. Hughes Systique. "Test automation Tools For mobile application :A Brief Survey".
  41. Alexey Markov. "Software Testing Models Against Information Security Reqirements".
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Mobile Cloud Computing (MCC) TaaS Information Security and Privacy.