{"title":"移动云计算:安全分析","authors":"Amina Gamlo, Ning Zhang, O. Bamasag","doi":"10.1109/MobileCloud.2017.27","DOIUrl":null,"url":null,"abstract":"This paper provides a comprehensive security analysis of Mobile Cloud Computing (M2C). It first describes two Cloud Computing (CC) scenarios. The first scenario describes one Cloud service provider providing all necessary services. The second scenario describes the case of two Cloud service providers collaborating to provide necessary services for one Client. The two scenarios focus on Authentication. Based on the use-case scenarios, the paper presents a generic model for M2C with a description of entities and interactions among them. Based on this model, the paper analyzes potential security threats, in order to specify a set of general security requirements, with an emphasis on Authentication. These requirements could provide guidance to future security solutions or Authentication solutions for M2C communication and/or risk assessment.","PeriodicalId":106143,"journal":{"name":"2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Mobile Cloud Computing: Security Analysis\",\"authors\":\"Amina Gamlo, Ning Zhang, O. Bamasag\",\"doi\":\"10.1109/MobileCloud.2017.27\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper provides a comprehensive security analysis of Mobile Cloud Computing (M2C). It first describes two Cloud Computing (CC) scenarios. The first scenario describes one Cloud service provider providing all necessary services. The second scenario describes the case of two Cloud service providers collaborating to provide necessary services for one Client. The two scenarios focus on Authentication. Based on the use-case scenarios, the paper presents a generic model for M2C with a description of entities and interactions among them. Based on this model, the paper analyzes potential security threats, in order to specify a set of general security requirements, with an emphasis on Authentication. These requirements could provide guidance to future security solutions or Authentication solutions for M2C communication and/or risk assessment.\",\"PeriodicalId\":106143,\"journal\":{\"name\":\"2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MobileCloud.2017.27\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MobileCloud.2017.27","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper provides a comprehensive security analysis of Mobile Cloud Computing (M2C). It first describes two Cloud Computing (CC) scenarios. The first scenario describes one Cloud service provider providing all necessary services. The second scenario describes the case of two Cloud service providers collaborating to provide necessary services for one Client. The two scenarios focus on Authentication. Based on the use-case scenarios, the paper presents a generic model for M2C with a description of entities and interactions among them. Based on this model, the paper analyzes potential security threats, in order to specify a set of general security requirements, with an emphasis on Authentication. These requirements could provide guidance to future security solutions or Authentication solutions for M2C communication and/or risk assessment.