05-05-2012, 03:41 PM
Security provisioning for mobile host in Cloud Computing
ABSTRACT
In the 1990s, the world was introduced to the Internet, and we began to see distributed computing power realized on a large scale. Today, we have the ability to utilize scalable, distributed computing environments within the limits of the Internet, a practice known as cloud computing.
Cloud Computing is evolving as a key computing platform for sharing resources that include infrastructures, software, applications, and business processes. In past three decades, the world of computation has changed from centralized to distributed systems and now we are getting back to the virtual centralization.
Location of data and processes makes the difference in the realm of computation. Organizations use cloud computing as a service infrastructure; critically like to examine the security and confidentiality issues for their business critical insensitive applications.
The promise of providing interoperability in a heterogeneous world, as well as the possibility of offloading operations that require high processing power, make the mobile phones an ideal target device for accessing it. Yet, guaranteeing the security of corporate data in the "cloud" is difficult, if not impossible, as they provide different services like Software as a service (SaaS), Platform as a service (PaaS), and Infrastructure as a service (IaaS). Each service has their own security issues.
But along with these advantages come security concerns. This paper presents how cloud computing can be accessed using a mobile phone, and how the communication between the cloud computing and the mobile phone client can be secured.
Keyword: Software as a service (SaaS), Platform as a service (PaaS), Database as a Service
(DaaS) and Infrastructure as a service (IaaS), Confidentiality, Integrity and
Availability (CIA)