Abstract
In order to prevent attacks against smartphones and tablets, dedicated security applications are deployed on the mobile devices themselves. However, these applications may have a significant impact on the device resources. Users may be tempted to uninstall or disable them with the objective of increasing battery lifetime and avoiding configuration operations and updates. In this paper, we propose a new approach for outsourcing mobile security functions as cloud-based services. The outsourced functions are dynamically activated, configured and composed using software-defined networking and virtualization capabilities. We detail also preliminary results and point out future research efforts.
Chapter PDF
Similar content being viewed by others
References
IDC Forecasts Worldwide Tablet Shipments to Surpass Portable PC Shipments in 2013, Total PC Shipments in 2015, http://www.idc.com/getdoc.jsp?containerId=prUS24129713 (last visited in February 2014)
More Smartphones Were Shipped in Q1 2013 Than Feature Phones, An Industry First According to IDC, http://www.idc.com/getdoc.jsp?containerId=prUS24085413 (last visited in February 2014)
The Open Vulnerability and Assessment Language (OVAL), http://oval.mitre.org/ (last visited in February 2014)
Barrère, M., Hurel, G., Badonnel, R., Festor, O.: A Probabilistic Cost-efficient Approach for Mobile Security Assessment. In: Proceedings of the 9th IFIP/IEEE International Conference on Network and Service Management, CNSM 2013 (2013)
Barrère, M., Hurel, G., Badonnel, R., Festor, O.: Ovaldroid: An OVAL-based vulnerability assessment framework for Android. In: Proceedings of the 13th IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), pp. 1074–1075 (2013)
Jin, R., Wang, B.: Malware Detection for Mobile Devices Using Software-Defined Networking. In: Proceedings of the 2nd GENI Research and Educational Experiment Workshop (GREE 2013), pp. 81–88 (2013)
Kilinc, C., Booth, T., Andersson, K.: WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OS. In: Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), pp. 877–883 (2012)
Kim, T., Choi, Y., Han, S., Chung, J.Y., Hyun, J., Li, J., Hong, J.W.: Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure. In: Proceedings of the 12th IEEE/IFIP Network Operations and Management Symposium (NOMS 2012), pp. 1303–1310 (2012)
Li, Q., Clark, G.: Mobile security: A look ahead. IEEE Security and Privacy 11(1), 78–81 (2013)
Oberheide, J., Veeraraghavan, K., Cooke, E., Flinn, J., Jahanian, F.: Virtualized In-Cloud Security Services for Mobile Devices. In: Proceedings of the 1st Workshop on Virtualization in Mobile Computing (MobiVirt 2008), pp. 31–35 (2008)
Percoco, N., Schulte, S.: Adventures in BouncerLand: Failures of Automated Malware Detection within Mobile Application Markets. In: Black Hat USA 2012 (2012), http://media.blackhat.com/ (last visited in February 2014)
Portokalidis, G., Homburg, P., Anagnostakis, K., Bos, H.: Paranoid Android: Versatile Protection for Smartphones. In: Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC 2010), pp. 347–356 (2010)
Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making Middleboxes Someone else’s Problem: Network Processing As a Cloud Service. In: Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp. 13–24. ACM (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 International Federation for Information Processing
About this paper
Cite this paper
Hurel, G., Badonnel, R., Lahmadi, A., Festor, O. (2014). Outsourcing Mobile Security in the Cloud. In: Sperotto, A., Doyen, G., Latré, S., Charalambides, M., Stiller, B. (eds) Monitoring and Securing Virtualized Networks and Services. AIMS 2014. Lecture Notes in Computer Science, vol 8508. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43862-6_9
Download citation
DOI: https://doi.org/10.1007/978-3-662-43862-6_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43861-9
Online ISBN: 978-3-662-43862-6
eBook Packages: Computer ScienceComputer Science (R0)