Search WWW Search
»Journal Description
»Call for Papers and Reviewers
»Author Guidelines
»Contents & Papers
»Call for Special Issues

A Secure Client Aware Certification for Mobile Cloud Offloading Decision


Uma Nandhini D1*, Latha Tamilselvan1, Silviya Nancy J2, UdhayaKumar Shanmugam2


1 School of Computer, Information and Mathematical Science, B.S. Abdur Rahman University, Chennai, Tamil Nadu, India
2 Department of Computer Science and Engineering, Rajalakshmi Engineering College, Thandalam, Chennai, Tamil Nadu, India


The advancements in smartphones with excellent feasibility and networking capabilities paved the way for rising leap in mobile communication, but their limitations incline users to next level paradigm called Mobile Cloud Computing. Despite the cloud services reaching far greater heights, the issues of to security and privacy needs to be addressed. Therefore, our proposed Client Aware Certification (CAC) model ensures to identify the authenticity of client devices connected to the cloud based on the behaviour predictability and security checks. A resource broker identifies the trustworthiness of the client devices before offloading any task. Integrity check, privacy protection, and access patterns are some of the attributes considered for offloading decision. The model achieves better security, privacy, and performance for resource migration. Identity management and certification feature ensure a better predictability with secure virtual communication. The model is experimented with AWS cloud platform and tested for a video conversion application.


Mobile cloud computing, Computation offloading, Identity management, Client awareness.

Full Text:

  1. S. Radicati, “Mobile Statistics Report, 2014-2018”, A Technology Market Research from The Radicati Group, USA, February, 2014.
  2. GSMA Global Mobile Economy Report, GSM Association, 2015.
  3. S. M. Habib, S. Hauke, S. Ries and M. Mühlhäuser, “Trust as a facilitator in cloud computing: A survey”, Journal of Cloud Computing: Advances, Systems and Applications, 2012.
  4. S. Udhayakumar, S. Chandrasekaran, T. Latha and F. Ahamed, “An Adaptive Trust Model for Software Services in Hybrid Cloud Environment”, 15th WSEAS International Conference on Computers, pp. 497-502, 2011.
  5. R. S. Chang, J. Gao and V. Gruhn, “Mobile Cloud Computing Research - Issues, Challenges and Needs”, International Symposium on Service Oriented System Engineering (SOSE), 2013.
  6. R. Los, D. Shackleford and B. Sullivan, “The Notorious Nine Cloud Computing Top Threats in 2013”, Top Threats Working Group, Cloud Security Alliance, February, 2013.
  7. D. Zissis and D. Lekkas, “Addressing Cloud Computing Security Issues”, Future Generation Computer Systems, p. 583–592, 2012.
  8. R. D. Caytiles and S. Lee, “Security Considerations for Public Mobile Cloud Computing”, International Journal of Advanced Science and Technology, Vol. 44, July, 2012.
  9. C. Wang, Q. Wang, K. Ren and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”, IEEE INFOCOM proceedings. 2010.
  10. B. Grobauer, T. Walloschek, and E. Stöcker, “Understanding Cloud Computing Vulnerabilities”, IEEE Computer and Reliability Societies, 2011.
  11. U. Nandhini and T. Latha, “Computational Analytics of Client Awareness for Mobile Application Offloading with Cloud Migration”, KSII Transactions On Internet And Information Systems, Vol. 8, No. 11, 2014.
  12. D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud Computing”, IEEE International Conference on Computer Science and Electronics Engineering, 2012.
  13. H. Li, F. Li, C. Song and Y. Yan, “Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing”, KSII Transactions On Internet And Information Systems, Vol. 9, No. 7, 2015
  14. S. Eludiora, O. Abiona, A. Oluwatope, A. Oluwaranti, C. Onime and L. Kehindel, “A User Identity Management Protocol for Cloud Computing Paradigm”, Int. J. Communications, Network and System Sciences, p. 152-163, 2011.
  15. P. A. Hadole, J. Rohankar ,P. Ambatkar, and A. Katara, “Development of Secure Mobile Cloud Computing Using Improved Identity Management Protocol”, International Journal on Recent and Innovation Trends in Computing and Communication, 2014.
  16. A. Celesti, F. Tusa, M. Villari and A. Puliafito, “Security and Cloud Computing: InterCloud Identity Management Infrastructure”, 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, WETICE, Greece, 2010.
  17. P. Angin, B. Bhargava, R. Ranchal, N. Singh, L. B. Othmane, L. Lilien and M. Linderman, “An Entity-centric Approach for Privacy and Identity Management in Cloud Computing”, Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems, p. 177-183, 2010.
  18. S. Nancy, D. Uma and T. Latha, “Credential and Identity Access Management for Client Awareness in Mobile Cloud Computing Framework”, Australian Journal of Basic and Applied Sciences, vol. 9 issue 11, pp. 624-630, 2015.
  19. S. Udhayakumar and T. Latha, “A Cooperative Trust Model with Adaptive Migration for Secure Cloud Services”, Advances in Information Sciences and Service Sciences, Volume 6, Number 6, 2014.
  20. E. Ghazizadeh, Z. Dolatabadi, R. Khaleghparast, M. Zamani, A. A. Manaf, and M. S. Abdullah, “Secure OpenID Authentication Model by Using Trusted Computing, Abstract and Applied Analysis”, Hindawi Publishing Corporation, Vol. 2014.
  21. X. Zhang, S. Jeong, A. Kunjithapatham, and Simon Gibbs, “Towards an Elastic Application Model for Augmenting Computing Capabilities of Mobile Platforms,” Third International ICST Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, LNICST 48, Springer, pp. 161-174, 2010.
  22. B. Zhou, A. V. Dastjerdi, N. Rodrigo, Calheiros, S. N. Srirama, and R. Buyya, “A Context Sensitive Offloading Scheme for Mobile Cloud Computing Service” IEEE 8th International Conference on Cloud Computing, pp. 869-876, 2015.
  23. C. Shi, K. Habak, P. Pandurangan, M. Ammar, M. Naik and E. Zegura, “COSMOS: Computation Offloading as a Service for Mobile Devices”, 15th ACM international symposium on Mobile ad hoc networking and computing, pp. 287-296, 2014.
  24. E.E.Marinelli, “Hyrax: cloud computing on mobile devices using Map Reduce, “DTIC Document, Tech. Rep.”, September, 2009.

INASS Home | Copyright@2008 The Intelligent Networks and Systems Society