Considerations for mobile authentication in the Cloud

  • Authors:
  • Zaheer Ahmad;Keith E. Mayes;Song Dong;Kostas Markantonakis

  • Affiliations:
  • Orange Labs, 2nd Floor, Building 10, Chiswick Park, Chiswick, London W4 5XS, UK;ISG Smart Card Centre, Royal Holloway, University of London, Egham, Surrey, England, UK;Orange Labs, 2nd Floor, Building 10, Chiswick Park, Chiswick, London W4 5XS, UK;ISG Smart Card Centre, Royal Holloway, University of London, Egham, Surrey, England, UK

  • Venue:
  • Information Security Tech. Report
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Cloud promises significant benefits and opportunities for key players in the mobile communication industry as well as the end users. However, along with these opportunities comes a plethora of security issues including potential attacks, identity authentication, personal data management and privacy. There are issues with the use of legacy security mechanisms and interoperability of the various Smartphone platforms as well as the virtualisation products that are meant to assist with Smartphone security and stability. This paper first considers the general security concerns and how a Subscriber Identity Module-based security framework could be used. It goes on to introduce Smartphone virtualisation and proposes a framework for comparing product capabilities. Finally, use cases are discussed related to personal data security, including data on removable components.