Monday, September 23, 2013

Research Readings in Mobile Cloud Security


Dynamic Integration of Mobile JXTA with Cloud for Emergency Rural Public Health Care

R Rajkumar, NCSN Iyengar - Osong Public Health and Research Perspectives, 2013
... Multimedia and security operations can be performed in the cloud, allowing mobile health service
providers to subscribe and extend the capabilities of their mobile health applications beyond
the existing mobile device limitations [13].A comparative performance analysis is ...

[PDF] Cloud Security for Computing Secure Cloud Bursting, Brokerage and Aggregation Using Cryptography

N Shrivastava, R Yadav - 2013
... 50-55. [15] Kandukuri, Paturi, and Rakshit, "Cloud Security Issues," 2009 IEEE International
Conference on Services Computing Bangalore, India, Sep. 21-25, 2009, pp. 517-520. [16] Vishnu
S Pendyala, Joanne Holliday, "Performing Intelligent Mobile Searches in the Cloud ...

[PDF] INTRUSION DETECTION ON CLOUD APPLICATIONS

AV Reddy, KS Kumar, VH Prasad - 2013
... representing different techniques for implementing Intrusion detection and tolerance on Cloud
computing: SHIM ... and Configuration Protocol) is an auto configuration protocol in mobile Ad Hoc ...
With respect to this protocol, our approach defines a global security requirement for a ...

[PDF] Resource Allocation and Storage Using Hungarian Method in Mobile Cloud Computing

P Akki - International Journal, 2013
... have proposed the entropy based Hungarian method to allocate resources in mobile cloud
computing to reduce overload and channel interference and frequent application method to save
storage space. In future we can extend the proposed method to provide security also in ...

Social-Network-Sourced Big Data Analytics

W Tan, MB Blake, I Saleh, S Dustdar - Internet Computing, IEEE, 2013
... share com- putational resources while leveraging them on desktops, servers, and mobile phones. ...
As such, new comprehensive cross-network, cross- cloud data models must be developed that ...
conventional security and access con- trol systems, such as the active directory, are ...

Information Security Best Practices

K Mayes, K Markantonakis - Secure Smart Embedded Devices, Platforms and …, 2014
... It works as follows. Page 9. 6 Information Security Best Practices 127 1 ... Page 10. 128
K. Mayes and K. Markantonakis like the Cloud are also interesting. The likelihood
is that half an Exabyte will not sound "big" for very long. The ...

[PDF] Development of an internet-based exam system for mobile environments and evaluation of its usability

A Tufekci, H Ekinci, U Kose - 2013
... study on what extent mobile education approach that is realized via cloud computing approach ...
Mobile devices have the following advantages regarding their uses in M-learning: portability ... screen
size, incompatible operation systems, and the problems with data security are the ...

Performance Analysis of IEEE 802.15. 4 Based Wireless Sensor Networks using LAR protocol for CBR and ZIGBEE Traffic Applications

P Samundiswary, R Surender - INTERNATIONAL JOURNAL OF COMPUTERS & …, 2013
... Mehran Abolhasan, Tadeusz Wysocki, ErykDutkiewicz, "A review of routing protocols
for mobile ad hoc networks" , Ad Hoc Networks, Volume 2, Issue 1, pp.1–22, January
2004. YB Ko, NH Vaidya, Location-aided routing (LAR ...

[PDF] Data Encryption and Decryption using Deterministic Random Key for Transmission: A Review

E Vidiksha, ES Saini - International Journal, 2013
... GENERATION WITHIN PEER-TO-PEER NETWORK OVERLAYS", P2P, PARALLEL, GRID, CLOUD
AND INTERNET ... RUmarani, "UMARAM: A novel fast encryption algorithm for data security in local ...
Data encryption using the dynamic location and speed of mobile node" Journal ...

Securing m-healthcare social networks: challenges, countermeasures and future directions

J Zhou, Z Cao, X Dong, X Lin, AV Vasilakos - Wireless Communications, IEEE, 2013
... proposed a secure same-symptom- based handshake scheme and applied the prov- able security
technique to justify its security in the random oracle model [4]. Two mobile patients with the same
symptoms can derive the same session key and use it to establish the secure ...

[PDF] Designing and Evaluation of Performance of a Spread Spectrum Technique for Audio Steganography

H Malik, SS Kang - International Journal, 2013
... Data in Digital Media", Communication and Information Systems Security Symposium, IEEE ...
Layered Additive Space Sequenced Audio Steganography Technique for Mobile Network",
International ... Su, J (2011), "Thwarting Audio Steganography Attacks in Cloud Storage Systems ...

[PDF] Short biography

D Soldani - 2013
... Mobile Flow Controller Mobile Networks Applications MF ctrl itf ... New "Software Defined Air-Interface"
concepts supported by unified cloud architectures for optimal service delivery on the move ... Edge
computing for reducing access latency, improving security and ...

Focusing on Menacing Middle East Geopolitical Envorinments, Endangeriong Security and Stability of the Western Balkans

M Aslam Khan - Geopolitics, History, and International Relations, 2013
... Consequently, the criminal markets have be- come very mobile, more flexible, transnational and
transcontinental ... This is because in practice the priority has been improving European security
and not the ... the crowd: 'When you see a cloud rising in the west, immediately you say ...

The BIOS and Rootkits

G Hili, K Mayes, K Markantonakis - Secure Smart Embedded Devices, Platforms and …, 2014
... The prospect of mobile phones being targeted for more malicious and possibly fast spreading
BIOS/rootkit ... com/en-us/server-cloud/hyper-v-server/overview.aspx ... analysis of a botnet takeover."
Proceedings of the 16th ACM conference on Computer and communications security. ...

[PDF] Data as a Service (DaaS) for Sharing and Processing of Large Data Collections in the Cloud

O Terzo, P Ruiu, E Bucci, F Xhafa
... The exponential growth of heterogeneous data due to the diffusion of new technologies (like
mobile, cloud computing, Internet of Things, social networks ... storage, aggregation and preservation
of data for unlimited period of time and at the same time must ensure data security. ...

[PDF] Towards the Creation of a New Program in Informatics

J Galletly, D Christozov, V Karagiozov, S Bonev
... will focus on building mobile applications for Android and iOS devices. ... The installation and
deployment of a private cloud (via oVirt, an open source tool used to ... and skills for running highly
effective computational environments – from pre-installation to security audit, network ...

[PDF] Demystifying the Dark Side of the Middle: A Field Study of Middlebox Failures in Datacenters

R Potharaju, N Jain - 2013
... short- comings, the research community has proposed software im- plementations, policy-aware
switching, consolidation appli- ances, moving middlebox processing to VMs, end hosts, and even
offloading it to the cloud. ... Lost connectivity High LatencyService Error Security SLA ...

ICT based health governance practices the Indian experience

P Nair - Mass Communicator: International Journal of …, 2013
... viruses have elevated the issue of online data and computer security to the ... Eye Mission in Madurai
and four other private hospitals have launched Mobile Tele-Ophthalmonology ... for Adoption of
Secured Effective E-Governance through Visualization and Cloud Computing' in ...

Editorial: forthcoming issues

N Cerpa, H Bouwman - Journal of Theoretical and Applied Electronic …, 2013
... Business-to-Consumer; Business-to-Government; Consumer-to-Consumer; and Mobile Commerce. ...
in Government / SUNY Albany) and Anneke Zuiderwijk (Dutch Ministry of Security and Justice). ...
The December 2013 issue will be dedicated to Cloud Computing and Electronic ...

[PDF] Biologically-Inspired Vertical Mobile Handoff with Seamless Mobility

V Saravanan, A Sumathi
... and security requirements. During the handoff process, if both the BSs (old and new) are of
different type and standard, then it is said to be vertical handoff. The reason for the vertical handoff
could be SS, LI, QoS Requirement, LBP, COS, UP and SR. Recently mobile devices ...


No comments:

Post a Comment

 

blogger templates 3 columns | Make Money Online