Skip to main content

Security Issues of Mobile Application Using Cloud Computing

  • Conference paper

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 334))

Abstract

Security issues of the mobile application using cloud computation services are discussed in this paper. Communication between smart phone as a client on the one side and cloud server on the other is described. Security analyse for proposed solution of the health monitoring application is introduced as well. Data about health of the person are one of the most confidential thus need to be secured against different types of threats. Proposed solution is based on the smartphone as a client gathering data and the cloud servers as a computational platform for data storage and analysing. The sensors embedded in the smart phone measure data about monitored person then are partly processed and sent to the server by the internet connection for the deeper analysis.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hřebíček, J., et al.: Scientific computing in mathematical biology, MU (2012), http://www.iba.muni.cz/res/file/ucebnice/hrebicek-vedecke-vypocty.pdf

  2. Bureš, V., Otčenášková, T., Čech, P., Antoš, K.: A Proposal for a Computer-Based Framework of Support for Public Health in the Management of Biological Incidents: the Czech Republic Experience. Perspectives in Public Health 132(6), 292–298 (2012), doi:10.1177/1757913912444260, ISSN 1757-9139

    Google Scholar 

  3. Allan, R.: Cloud and Web 2.0 resources for supporting research (2012), http://tyne.dl.ac.uk/NWGrid/Clouds/

  4. Bureš, V., Brunet-Thornton, R.: Knowledge Management: The Czech Situation, Possible Solutions and the Necessity for Further Research. In: Proceedings of the 6th International Conference on Intellectual Capital and Knowledge Management, McGill University, Montréal, Canada, pp. 95–102 (2009) ISBN 978-1-906638-45-0

    Google Scholar 

  5. Chirag, M., Dhiren, P., Bhavesh, B., Avi, P., Muttukrishnan, R.: A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing 63(2), 561–592 (2013), doi:10.1007/s11227-012-0831-5, ISSN 0920-8542

    Google Scholar 

  6. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34(1), 1–11 (2011), http://dx.doi.org/10.1016/j.jnca.2010.07.006 , ISSN 1084-8045

  7. Keiko, H., Rosado, D.G., Fernández-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. Journal of Internet Services and Applications 4(5) (2013), doi:10.1186/1869-0238-4-5, ISSN 1867-4828

    Google Scholar 

  8. Fernandes, D.A.B., Soares, L.F.B., Gomes, J.V., Freire, M.M., Inácio, P.R.M.: Security issues in cloud environments: a survey. International Journal of Information Security (2013), doi:10.1007/s10207-013-0208-7, ISSN 1615-5262

    Google Scholar 

  9. Lee, H., Kim, J., Lee, Y., Won, D.: Security Issues and Threats According to the Attribute of Cloud Computing. In: Kim, T.-H., Stoica, A., Fang, W.-C., Vasilakos, T., Villalba, J.G., Arnett, K.P., Khan, M.K., Kang, B.-H. (eds.) SecTech, CA, CES3 2012. CCIS, vol. 339, pp. 101–108. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  10. Jia, W., Sun, S.: Research on the Security Issues of Cloud Computing. In: Du, Z. (ed.) Intelligence Computation and Evolutionary Computation. AISC, vol. 180, pp. 845–848. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  11. Mouratidis, H., Islam, S., Kalloniatis, C., Gritzalis, S.: A framework to support selection of cloud providers based on security and privacy requirements. Journal of Systems and Software 86(9), 2276–2293 (2013), http://dx.doi.org/10.1016/j.jss.2013.03.011 , ISSN 0164-1212

    Article  Google Scholar 

  12. Sujithra, M., Padmavathi, G.: Mobile device security: A survey on mobile device threats, vulnerabilities and their defensive mechanism. International Journal of Computer Applications 56(14) (2012), doi: http://dx.doi.org/10.5120/8960-3163 , ISSN: 09758887

  13. Cagalaban, G., Kim, S., Kim, M.: A mobile device-based virtualization technique for M2M communication in cloud computing security. In: Kim, T.-H., Stoica, A., Fang, W.-C., Vasilakos, T., Villalba, J.G., Arnett, K.P., Khan, M.K., Kang, B.-H. (eds.) SecTech, CA, CES3 2012. CCIS, vol. 339, pp. 160–167. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  14. Singhal, M., Chandrasekhar, S., Ge, S.R., Krishnan, R., Ahn, G.J., Bertino, E.: Collaboration in Multicloud Computing Environments: Framework and Security Issues. Computer 46(2), 76–84 (2013) ISSN: 0018-9162, WOS:000314943300019

    Google Scholar 

  15. Popa, D., Boudaoud, K., Borda, M.: Secure mobile-cloud framework - implementation on the mobile device. Acta Technica Napocensis 54(4), 7–12 (2013) ISSN: 12216542

    Google Scholar 

  16. Wood, J., Aboba, B.: RFC 3539 - Authentication, Authorization and Accounting (AAA) Transport Profile (2003), http://tools.ietf.org/html/rfc3539

  17. Singhal, M., Chandrasekhar, S., Ge, S.R., Krishnan, R., Ahn, G.J., Bertino, E.: Collaboration in Multicloud Computing Environments: Framework and Security Issues. Computer 46(2), 76–84 (2013) ISSN: 0018-9162, WOS:000314943300019

    Google Scholar 

  18. Gejibo, S., Mancini, F., Mughal, K.A., Valvik, R., Klungsøyr, J.: Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings. In: Barthe, G., Livshits, B., Scandariato, R., et al. (eds.) ESSoS 2012. LNCS, vol. 7159, pp. 38–45. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  19. European Union Agency for Network and Information Security, Cloud Computing Risk Assessment — ENISA (2009), http://www.enisa.europa.eu/activities/risk-management/files/deliverables/cloud-computing-risk-assessment

  20. Brodkin, J.: Gartner: Seven cloud-computing security risks. Infoworld, 1–3 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Richard Cimler .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Cimler, R., Matyska, J., Balík, L., Horalek, J., Sobeslav, V. (2015). Security Issues of Mobile Application Using Cloud Computing. In: Abraham, A., Krömer, P., Snasel, V. (eds) Afro-European Conference for Industrial Advancement. Advances in Intelligent Systems and Computing, vol 334. Springer, Cham. https://doi.org/10.1007/978-3-319-13572-4_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13572-4_29

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13571-7

  • Online ISBN: 978-3-319-13572-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics