Abstract
Security issues of the mobile application using cloud computation services are discussed in this paper. Communication between smart phone as a client on the one side and cloud server on the other is described. Security analyse for proposed solution of the health monitoring application is introduced as well. Data about health of the person are one of the most confidential thus need to be secured against different types of threats. Proposed solution is based on the smartphone as a client gathering data and the cloud servers as a computational platform for data storage and analysing. The sensors embedded in the smart phone measure data about monitored person then are partly processed and sent to the server by the internet connection for the deeper analysis.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Hřebíček, J., et al.: Scientific computing in mathematical biology, MU (2012), http://www.iba.muni.cz/res/file/ucebnice/hrebicek-vedecke-vypocty.pdf
Bureš, V., Otčenášková, T., Čech, P., Antoš, K.: A Proposal for a Computer-Based Framework of Support for Public Health in the Management of Biological Incidents: the Czech Republic Experience. Perspectives in Public Health 132(6), 292–298 (2012), doi:10.1177/1757913912444260, ISSN 1757-9139
Allan, R.: Cloud and Web 2.0 resources for supporting research (2012), http://tyne.dl.ac.uk/NWGrid/Clouds/
Bureš, V., Brunet-Thornton, R.: Knowledge Management: The Czech Situation, Possible Solutions and the Necessity for Further Research. In: Proceedings of the 6th International Conference on Intellectual Capital and Knowledge Management, McGill University, Montréal, Canada, pp. 95–102 (2009) ISBN 978-1-906638-45-0
Chirag, M., Dhiren, P., Bhavesh, B., Avi, P., Muttukrishnan, R.: A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing 63(2), 561–592 (2013), doi:10.1007/s11227-012-0831-5, ISSN 0920-8542
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34(1), 1–11 (2011), http://dx.doi.org/10.1016/j.jnca.2010.07.006 , ISSN 1084-8045
Keiko, H., Rosado, D.G., Fernández-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. Journal of Internet Services and Applications 4(5) (2013), doi:10.1186/1869-0238-4-5, ISSN 1867-4828
Fernandes, D.A.B., Soares, L.F.B., Gomes, J.V., Freire, M.M., Inácio, P.R.M.: Security issues in cloud environments: a survey. International Journal of Information Security (2013), doi:10.1007/s10207-013-0208-7, ISSN 1615-5262
Lee, H., Kim, J., Lee, Y., Won, D.: Security Issues and Threats According to the Attribute of Cloud Computing. In: Kim, T.-H., Stoica, A., Fang, W.-C., Vasilakos, T., Villalba, J.G., Arnett, K.P., Khan, M.K., Kang, B.-H. (eds.) SecTech, CA, CES3 2012. CCIS, vol. 339, pp. 101–108. Springer, Heidelberg (2012)
Jia, W., Sun, S.: Research on the Security Issues of Cloud Computing. In: Du, Z. (ed.) Intelligence Computation and Evolutionary Computation. AISC, vol. 180, pp. 845–848. Springer, Heidelberg (2013)
Mouratidis, H., Islam, S., Kalloniatis, C., Gritzalis, S.: A framework to support selection of cloud providers based on security and privacy requirements. Journal of Systems and Software 86(9), 2276–2293 (2013), http://dx.doi.org/10.1016/j.jss.2013.03.011 , ISSN 0164-1212
Sujithra, M., Padmavathi, G.: Mobile device security: A survey on mobile device threats, vulnerabilities and their defensive mechanism. International Journal of Computer Applications 56(14) (2012), doi: http://dx.doi.org/10.5120/8960-3163 , ISSN: 09758887
Cagalaban, G., Kim, S., Kim, M.: A mobile device-based virtualization technique for M2M communication in cloud computing security. In: Kim, T.-H., Stoica, A., Fang, W.-C., Vasilakos, T., Villalba, J.G., Arnett, K.P., Khan, M.K., Kang, B.-H. (eds.) SecTech, CA, CES3 2012. CCIS, vol. 339, pp. 160–167. Springer, Heidelberg (2012)
Singhal, M., Chandrasekhar, S., Ge, S.R., Krishnan, R., Ahn, G.J., Bertino, E.: Collaboration in Multicloud Computing Environments: Framework and Security Issues. Computer 46(2), 76–84 (2013) ISSN: 0018-9162, WOS:000314943300019
Popa, D., Boudaoud, K., Borda, M.: Secure mobile-cloud framework - implementation on the mobile device. Acta Technica Napocensis 54(4), 7–12 (2013) ISSN: 12216542
Wood, J., Aboba, B.: RFC 3539 - Authentication, Authorization and Accounting (AAA) Transport Profile (2003), http://tools.ietf.org/html/rfc3539
Singhal, M., Chandrasekhar, S., Ge, S.R., Krishnan, R., Ahn, G.J., Bertino, E.: Collaboration in Multicloud Computing Environments: Framework and Security Issues. Computer 46(2), 76–84 (2013) ISSN: 0018-9162, WOS:000314943300019
Gejibo, S., Mancini, F., Mughal, K.A., Valvik, R., Klungsøyr, J.: Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings. In: Barthe, G., Livshits, B., Scandariato, R., et al. (eds.) ESSoS 2012. LNCS, vol. 7159, pp. 38–45. Springer, Heidelberg (2012)
European Union Agency for Network and Information Security, Cloud Computing Risk Assessment — ENISA (2009), http://www.enisa.europa.eu/activities/risk-management/files/deliverables/cloud-computing-risk-assessment
Brodkin, J.: Gartner: Seven cloud-computing security risks. Infoworld, 1–3 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Cimler, R., Matyska, J., Balík, L., Horalek, J., Sobeslav, V. (2015). Security Issues of Mobile Application Using Cloud Computing. In: Abraham, A., Krömer, P., Snasel, V. (eds) Afro-European Conference for Industrial Advancement. Advances in Intelligent Systems and Computing, vol 334. Springer, Cham. https://doi.org/10.1007/978-3-319-13572-4_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-13572-4_29
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13571-7
Online ISBN: 978-3-319-13572-4
eBook Packages: EngineeringEngineering (R0)