НАЦИОНАЛЬНАЯ АКАДЕМИЯ НАУК АЗЕРБАЙДЖАНА
ВОПРОСЫ БЕЗОПАСНОСТИ И КОНФИДЕНЦИАЛЬНОСТИ В МОБИЛЬНЫХ ОБЛАЧНЫХ ВЫЧИСЛЕНИЯХ (азерб.)
Алекперов Рашид Г., Алекперов Огтай Р.

В статье исследованы вопросы безопасности и конфиденциальности на облачных платформах, используемых в мобильных облачных вычислениях. Были проанализированы угрозы, возникающие для гарантированной защиты данных пользователей от внешних лиц и сетевой безопасности в мобильных облачных вычислениях. Кроме того, в статье были проанализированы информационная безопасность, конфиденциальность, размещение и перемещение данных, целостность информации, кибератаки и т.д. в мобильных облачных вычислениях. Были исследованы научно-теоретические проблемы безопасности и конфиденциальности мобильных облачных вычислений и проанализировано состояние научных исследований в этом направлении (стр.92-102)

Ключевые слова: мобильные облачные вычисления, мобильное оборудование, информационная безопасность, конфиденциальность, кибератаки, вычислительные ресурсы, ресурсы памяти, облачные вычисления, виртуальная машина, облачные сервисы.
DOI : 10.25045/jpit.v09.i1.09
Литература
  • Gayathri M.R., Srinivas K. A Survey on Mobile Cloud Computing Architecture, Applications and Challenges // International Journal of Scientific Research Engineering & Technology, 2014, vol.3, no.6, pp.1013–1021.
  • Qi H., Gani A. Research on mobile Cloud Computing: review, trend and perspectives / Proceeding of IEEE second international Conference on Digital Information Technology & its application, 2012, pp.195–201.
  • Xiao Z., Xiao Y. Security and Privacy in Cloud Computing // IEEE Communications Surveys & Tutorials, 2013, vol.15, no.2, pp.843–859.
  • Gopichand M. An Overview of Security and Privacy Issue in Mobil Cloud Computing Environment // International Jornal of Advanced Researc in Computer Science and Software Engineering, 2016, vol.6, no.5, pp.779–784.
  • Hlavacs H., Treutner T., Gelas J.P., Lefevre L. Orgerie A.C. Energy consumption side-channel attack at virtual machines in a cloud / IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), 2011, pp.605–612.
  • Caytiles, Lee S. Security considerations for Public Mobile Cloud Computing // International Journal of Advanced Science and Technology, 2012, vol.44, pp.81–88.
  • Chen Y., Paxson V., Katz R.H. What's New About Cloud Computing Security? Electrical Engineering and Computer Sciences University of California at Berkeley.Technical Report, no. UCB/EECS-2010-5, 2010, pp.1–8.
  • Chen Y.J., Wang L.C. A security framework of group location-based mobile applications in cloud computing / Proceeding International Conference on Parallel Processing Workshops, (ICPPW’11), 2011, pp.184–190.
  • Subashini S., Kavitha V. A survey on security issues in service deliverymodels of cloud computing // Journal of Network and Computer Applications, 2011, vol.34, pp.1–11.
  • Fernando N., Seng L.W., Rahayu L. Mobile Cloud Computing: A Survey // Journal of Future Generation Systems, 2013, vol.29, no.1, pp.84–106.
  • Donald A., Oli S., Arockiam L. Mobile cloud security issues and challenges: A perspective // International Journal of Engineering and Innovative Technology, 2013, vol.3, no.1, pp.401.
  • Sarrab M. Mobile Cloud Computing: Security Issues and Considerations // Journal of Advances in Information Technology, 2015, vol.6, no.4, pp.248–251.
  • Collings R. Mobile Cloud Adoption Challenges in the Enterprise. http://cloudcomputingtopics.com/2012/04/mobile-cloud-adoption-challenges-in-theenterprise/
  • Dinh H.T., Lee C., Niyato D., Wang P. A survey of mobile cloud computing: Architecture, applications, and approaches // Wireless Communications and Mobile Computing, 2013, vol.13, no.18, pp.1587–1611.
  • Bahar A., Habib A., Islam M. Security architecture for mobile cloud computing // International Journal of Scientific Knowledge Computing and Information Technology, 2013, vol.3, no.3, pp.11–17.
  • Jashizume K. H., Rosado D., Fernandez-Medina E., Eduardo B. An analysis of security issues for cloud computing // Journal of Internet Services and Applications, 2013, vol.4, no.5, pp.1–13.
  • Schoo P., Fusenig V., Souza V., Melo M., Murray P., Debar H., Medhioub H., Zeghlach D. Challenges for Cloud Networking Security / 2nd International ICST Conference on Mobile Networks and Management, 2010, pp.2–16.
  • Zhangwei H., Mingjun X. A Distributed Spatial Cloaking Protocol for Location Privacy / Proceedings of the 2nd International Conference on Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010, vol.2, pp.468–471.
  • Zou P., Wang C., Liu Z., Bao D. Phosphor: Cloud Based DRM Scheme with Sim Card / Proceedings of the 12th International Asia-Pacific on Web Conference (APWEB), 2010, pp.459–463.
  • Zhu Y., Hu H., Ahn G.J., Huang D., Wang S. Towards temporal access control in cloud computing / INFOCOM, 2012, pp.2576–2580.
  • Lakshmi I. A Review on Cloud Computing in Mobile Applications. // International Journal of Computer Science and Mobile Computing, 2016, vol.5, no.6, pp.149–161.
  • Gregg M. 10 Security Concerns for Cloud Computing. Global Knowledge, 2010, pp.2–7.
  • Sarrab M., Janicke H. Runtime monitoring and controlling of information flow // International Journal of Computer Science and Information Security, 2010, vol.8, no.9, pp.37–45.
  • Chow R., Jakobsson M., Masuoka R., Molina J., Niu Y., Shi E., Song Z. Authentication in the clouds: a framework and its application to mobile users / Proceeding ACM Cloud Computing Security Workshop (CCSW’10), 2010, pp.1–6.
  • Huang D., Zhou Z., Xu L., Xing T., Zhong Y. Secure data processing framework for mobilecloud computing / Proceeding IEEE INFOCOM Workshop on Cloud Computing, (INFOCOM’11), 2011, pp.620–624.
  • Yogita D.M., Kailas K.D. Protection concern in Mobile Cloud Computing - A Survey // IOSR Journal of Computer Engineering (IOSR-JCE), pp.39–44.
  • AlZain M., Pardede E., Soh B., Thom J. Cloud computing security: From single to multi-clouds/45th Hawaii International Conference on System Science (HICSS), 2012, pp.5490–5499.
  • Cachin C., Keidar I., Shraer A. Trusting the cloud // ACM SIGACT News, 2009, vol.40, no.2, pp.81–86.
  • Vukolic M. The byzantine empire in the intercloud // ACM SIGACT News, 2010, vol.41, no.3, pp.105–111.
  • Shankarwar M., Pawar A. Security and privacy in cloud computing: A survey / Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, ser. Advances in Intelligent Systems and Computing. Springer International Publishing, 2015, vol.328, pp.1–11.
  • Popovic K., Hocenski V. Cloud computing security issues and challenges / MIPRO, Proceedings of the 33rd International Convention, 2010, pp.344–349.
  • Kovachev D., Klamma R. Framework for Computation Offloading in Mobile Cloud Computing // International Journal of Artificial Intelligence and Interactive Multimedia, 2012, vol.1, no.7, pp.6–15.
  • Portokalidis G., Homburg P., Anagnostakis K., Bos H. Paranoid Android: versatile protection for smartphones / Proceedings of the 26th Annual Computer Security Application Conference (ACSAC), 2010, pp.347–356.
  • Choi E., Jeong H. User authentication using profiling in mobil cloud computing / AASRİ Confrence on Power and Energy Systems, 2012, pp.262–267.
  • Jia W., Zhu H., Cao Z., Wei L., Lin X. SDSM: a secure data service mechanism in mobile cloud computing / The First International Workshop on Security in Computers, Networking and Communications, 2011, pp.1087–1082.
  • T et al. Monitoring and detecting abnormal behavior in mobile cloud infrastructure / 2012 IEEE Network Operations and Management Symposium, 2012, pp.1303–1310.
  • Oberheide J., Veeraraghavan K., Cooke E., Jahanian F. Virtualized in-cloud security services for mobile devices / Proceedings of the 1st Workshop on Virtualization in Mobile Computing (MobiVirt), 2008, pp.31–35.