The Coign automatic distributed partitioning system
OSDI '99 Proceedings of the third symposium on Operating systems design and implementation
Attestation-based policy enforcement for remote access
Proceedings of the 11th ACM conference on Computer and communications security
A Lightweight Secure Cyber Foraging Infrastructure for Resource-Constrained Devices
WMCSA '04 Proceedings of the Sixth IEEE Workshop on Mobile Computing Systems and Applications
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Tactics-based remote execution for mobile computing
Proceedings of the 1st international conference on Mobile systems, applications and services
Shamon: A System for Distributed Mandatory Access Control
ACSAC '06 Proceedings of the 22nd Annual Computer Security Applications Conference
Restful web services vs. "big"' web services: making the right architectural decision
Proceedings of the 17th international conference on World Wide Web
Towards trusted cloud computing
HotCloud'09 Proceedings of the 2009 conference on Hot topics in cloud computing
Augmented smartphone applications through clone cloud execution
HotOS'09 Proceedings of the 12th conference on Hot topics in operating systems
Towards a discipline of mission-aware cloud computing
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
Mobile Networks and Applications
Enhancing enterprise field productivity via cross platform mobile cloud apps
MCS '11 Proceedings of the second international workshop on Mobile cloud computing and services
Jupiter: transparent augmentation of smartphone capabilities through cloud computing
MobiHeld '11 Proceedings of the 3rd ACM SOSP Workshop on Networking, Systems, and Applications on Mobile Handhelds
ECOS: practical mobile application offloading for enterprises
Hot-ICE'12 Proceedings of the 2nd USENIX conference on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services
An effective partition approach for elastic application development on mobile cloud computing
GPC'12 Proceedings of the 7th international conference on Advances in Grid and Pervasive Computing
Mobile cloud computing: A survey
Future Generation Computer Systems
ECOS: leveraging software-defined networks to support mobile application offloading
Proceedings of the eighth ACM/IEEE symposium on Architectures for networking and communications systems
MeghaOS: A Framework for Scalable, Interoperable Cloud Based Operating System
International Journal of Cloud Applications and Computing
Towards secure mobile cloud computing: A survey
Future Generation Computer Systems
Hybrid contextual cloud in ubiquitous platforms comprising of smartphones
International Journal of Intelligent Systems Technologies and Applications
Mobile cloud computing and other mobile technologies: survey
Journal of Mobile Multimedia
The Journal of Supercomputing
Hi-index | 0.00 |
Cloud computing provides elastic computing infrastructure and resources which enable resource-on-demand and pay-as-you-go utility computing models. We believe that new applications can leverage these models to achieve new features that are not available for legacy applications. In our project we aim to build elastic applications which augment resource-constrained platforms, such as mobile phones, with elastic computing resources from clouds. An elastic application consists of one or more weblets, each of which can be launched on a device or cloud, and can be migrated between them according to dynamic changes of the computing environment or user preferences on the device. This paper overviews the general concept of this new application model, analyzes its unique security requirements, and presents our design considerations to build secure elastic applications. As first steps we propose a solution for authentication and secure session management between weblets running device side and those on the cloud. We then propose secure migration and how to authorize cloud weblets to access sensitive user data such as via external web services. We believe some principles in our solution can be applied in other cloud computing scenarios such as application integration between private and public clouds in an enterprise environment.