CFP last date
20 December 2024
Reseach Article

Privacy and Control in Mobile Cloud Systems

by Tariq Alwada'n, Omar Al-zitawi, Sufian Khawaldeh, Mohammed Almasarweh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 113 - Number 1
Year of Publication: 2015
Authors: Tariq Alwada'n, Omar Al-zitawi, Sufian Khawaldeh, Mohammed Almasarweh
10.5120/19789-1170

Tariq Alwada'n, Omar Al-zitawi, Sufian Khawaldeh, Mohammed Almasarweh . Privacy and Control in Mobile Cloud Systems. International Journal of Computer Applications. 113, 1 ( March 2015), 12-15. DOI=10.5120/19789-1170

@article{ 10.5120/19789-1170,
author = { Tariq Alwada'n, Omar Al-zitawi, Sufian Khawaldeh, Mohammed Almasarweh },
title = { Privacy and Control in Mobile Cloud Systems },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 113 },
number = { 1 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 12-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume113/number1/19789-1170/ },
doi = { 10.5120/19789-1170 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:49:48.716883+05:30
%A Tariq Alwada'n
%A Omar Al-zitawi
%A Sufian Khawaldeh
%A Mohammed Almasarweh
%T Privacy and Control in Mobile Cloud Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 113
%N 1
%P 12-15
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a huge amount of distributed and dynamic sharing resources that are provided on request to clients over the Internet instead of having a local server or personal devices to deal with applications. Usually, cloud servers don't work at full power; means there's some processing power will be unused. To make use of this wasted power, it's possible to use the mobility which is used to migrate application software, data or jobs among cloud servers. The problem with such technology is the privacy. In this paper we proposed a policy management framework to protect the privacy while applying the mobility method in the cloud environment.

References
  1. Alwada'n, T. : Mobile cloud systems. CIT 19(1) (2014)
  2. Armbrust, M. , Fox, A. , Griffith, R. , Joseph, A. D. , Katz, R. , Konwinski, A. , Lee, G. , Patterson, D. , Rabkin, A. , Stoica, I. , Zaharia, M. : A view of cloud computing. Commun. ACM 53(4), 50–58 (Apr 2010), http://doi. acm. org/10. 1145/1721654. 1721672
  3. The Office of the Privacy Commissioner of Canada, O. : Introduction to cloud computing (October 2011), http://www. priv. gc. ca/resource/fs-fi/02_05_d_51_cc_e. asp
  4. Cardelli, L. : Secure internet programming. chap. Abstractions for mobile computations, pp. 51–94. Springer-Verlag, London, UK (1999), http://portal. acm. org/citation. cfm?id=380171. 380179
  5. De Chaves, S. A. , Uriarte, R. B. , Westphall, C. B. : Toward an architecture for monitoring private clouds. IEEE Communications Magazine 49(12), 130–137 (2011), http://dblp. uni-trier. de/db/journals/cm/cm49. html#ChavesUW11
  6. De Chaves, S. A. , Westphall, C. B. , Lamin, F. R. : Sla perspective in security management for cloud computing. In: Proceedings of the 2010 Sixth International Conference on Networking and Services. pp. 212–217. ICNS '10, IEEE Computer Society, Washington, DC, USA (2010), http://dx. doi. org/10. 1109/ICNS. 2010. 36
  7. Chen, Y. , Paxson, V. , Katz, R. H. : Whats new about cloud computing security?Tech. Rep. UCB/EECS-2010-5, EECS Department, University of California, Berkeley (Jan 2010), http://www. eecs. berkeley. edu/Pubs/TechRpts/2010/EECS-2010-5. html
  8. DELANEY, K. J. , VARA, V. : Google plans service to store users' data (NOVEMBER 27, 2007), http://online. wsj. com/article/SB119612660573504716. html
  9. Foster, I. , Zhao, Y. , Raicu, I. , Lu, S. : Cloud computing and grid computing 360-degree compared. 2008 Grid Computing Environments Workshop abs/0901. 0(5), 1–10 (2008), http://arxiv. org/abs/0901. 0131
  10. Foster, I. , Zhao, Y. , Raicu, I. , Lu, S. : Cloud computing and grid computing 360-degree compared. 2008 Grid Computing Environments Workshop abs/0901. 0(5), 1–10 (2008), http://arxiv. org/abs/0901. 0131
  11. Heyman, T. , Scandariato, R. , Huygens, C. , Joosen, W. : Using security patterns to combine security metrics. In: Proceedings of the 2008 Third International Conference on Availability, Reliability and Security. pp. 1156–1163. IEEE Computer Society, Washington, DC, USA (2008), http://dl. acm. org/citation. cfm?id=1371602. 1371977
  12. Huth, A. , Cebula, J. : The basics of cloud computing (2011), carnegie Mellon University. Produced for US-CERT, a government organiztion
  13. Jaeger, P. , Lin, J. , Grimes, J. : Cloud computing and information policy: Computing in a policy cloud? Journal of Information Technology Politics 5(3), 269–283 (2008), http://www. informaworld. com/openurl?genre=article&doi=10. 1080/19331680802425479&magic=crossref
  14. Leavitt, N. : Is cloud computing really ready for prime time? Computer 42, 15–20 (January 2009), http://dx. doi. org/10. 1109/MC. 2009. 20
  15. Mei, L. , Chan, W. K. , Tse, T. H. : A tale of clouds: Paradigm comparisons and some thoughts on research issues. In: Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference. pp. 464–469. IEEE Computer Society, Washington, DC, USA (2008), http: //dl. acm. org/citation. cfm?id=1487739. 1487898
  16. Mell, P. , Grance, T. : The nist definition of cloud computing ( draft ) recommendations of the national institute of standards and technology. Nist Special Publication 145(6), 7 (2011), http://csrc. nist. gov/publications/drafts/800-145/Draft-SP-800-145_cloud-definition. pdf
  17. Services, A. W. : Aws economics center (May 2012), http://aws. amazon. com/economics/
  18. Singh, R. : Cloud computing from the home (December 2012), http://www. tutorialspoint. com/shorttutorials/cloud-computing-from-the-home
  19. Sotomayor, B. , Montero, R. S. , Llorente, I. M. , Foster, I. : Virtual infrastructure management in private and hybrid clouds. IEEE Internet Computing 13, 14–22 (September 2009), http: //dl. acm. org/citation. cfm?id=1638588. 1638692
  20. Strickland, J. : How cloud computing works (April 2008), http://computerhowstuffworks. com/cloud-computing/cloud-computing4. htm
  21. Tariq Alwada'n, Adel Hamdan Mohammad, H. A. : Privacy in cloud systems. CIT 19(1) (2014).
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Mobility HCI Policy Management Privacy.