Abstract
This work presents the solution used within STMicroelectronics to grant security in Mobile Cloud computing (MCC), where Cloud computing paradigma meets the mobile environment, the enabling technology to provide access network services anyplace, anytime and anywhere. We first illustrate the scenario, then MCC main issues are introduced, and the corresponding solution in the STMicroelectronics case is shown and briefly discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Node.js is an open-source, cross-platform JavaScript run-time environment for executing JavaScript code server-side. See [14].
References
MongoDB. https://www.mongodb.com. Accessed 29 Aug 2017
Mongoose. http://mongoosejs.com/. Accessed 15 Sept 2017
Bokhari, M.U., Makki, Q., Tamandani, Y.K.: A survey on cloud computing. In: Aggarwal, V.B., Bhatnagar, V., Mishra, D.K. (eds.) Big Data Analytics, pp. 149–164. Springer, Singapore (2018)
Buzzanca, M., Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G.: Direct trust assignment using social reputation and aging. J. Ambient Intell. Hum. Comput. 8(2), 167–175 (2017). https://doi.org/10.1007/s12652-016-0413-0
Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G.: Gain the best reputation in trust networks. In: Brazier, F.M.T., Nieuwenhuis, K., Pavlin, G., Warnier, M., Badica, C. (eds.) Intelligent Distributed Computing V, pp. 213–218. Springer, Heidelberg (2012)
Chow, R., Jakobsson, M., Masuoka, R., Molina, J., Niu, Y., Shi, E., Song, Z.: Authentication in the clouds: a framework and its application to mobile users. In: Proceedings of the CCSW 2010, pp. 1–6. ACM, New York (2010). http://doi.acm.org/10.1145/1866835.1866837
Dey, S., Sampalli, S., Ye, Q.: Message digest as authentication entity for mobile cloud computing. In: 2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC), pp. 1–6, December 2013
Dolui, K., Datta, S.K.: Comparison of edge computing implementations: fog computing, cloudlet and mobile edge computing. In: 2017 Global Internet of Things Summit (GIoTS), pp. 1–6, June 2017
García-Valls, M., Dubey, A., Botti, V.: Introducing the new paradigm of social dispersed computing: applications, technologies and challenges. J. Syst. Archit. 91, 83–102 (2018). http://www.sciencedirect.com/science/article/pii/S1383762118301036
Jeong, Y.S., Park, J.S., Park, J.H.: An efficient authentication system of smart device using multi factors in mobile cloud service architecture. Int. J. Commun. Syst. 28(4), 659–674 (2015). http://dx.doi.org/10.1002/dac.2694
Laravel. https://laravel.com/. Accessed 30 Aug 2017
Laravel Socialite. https://github.com/laravel/socialite. Accessed 7 July 2017
Laszka, A., Dubey, A., Walker, M., Schmidt, D.: Providing privacy, safety, and security in IoT-based transactive energy systems using distributed ledgers. In: Proceedings of the Seventh International Conference on the Internet of Things, IoT 2017, pp. 13:1–13:8. ACM, New York (2017). http://doi.acm.org/10.1145/3131542.3131562
Node.js. https://nodejs.org. Accessed 5 Sept 2017
Noip. https://www.noip.com/. Accessed 15 Sept 2017
OAuth2orize. https://github.com/jaredhanson/oauth2orize. Accessed 5 Sept 2017
Oh, D.S., Kim, B.H., Lee, J.K.: A study on authentication system using QR code for mobile cloud computing environment, pp. 500–507. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22333-4_65
Omri, F., Hamila, R., Foufou, S., Jarraya, M.: Cloud-ready biometric system for mobile security access, pp. 192–200. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-30567-2_16
Rassan, I.A., AlShaher, H.: Securing mobile cloud computing using biometric authentication (SMCBA). In: Proceedings of CSCI 2014, pp. 157–161. IEEE Computer Society, Washington, DC (2014). http://dx.doi.org/10.1109/CSCI.2014.33
Salesforce.com, inc., SalesForce. https://www.salesforce.com. Accessed 5 July 2017
Sanaei, Z., Abolfazli, S., Gani, A., Buyya, R.: Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Commun. Surv. Tutor. 16(1), 369–392 (2014)
Schwab, D., Yang, L.: Entity authentication in a mobile-cloud environment. In: Proceedings of CSIIRW ’13 (CSIIRW 2013), pp. 42:1–42:4. ACM, New York (2013). http://doi.acm.org/10.1145/2459976.2460024
STMicroelectronics. http://www.st.com/
Todorov, D.: Mechanics of User Identification and Authentication: Fundamentals of Identity Management. CRC Press, Boca Raton (2007)
Acknowledgement
This work was partially supported by the ‘Piano per la Ricerca 2016/2018 DIEEI Università degli Studi di Catania’.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Carchiolo, V., Longheu, A., Malgeri, M., Iannello, S., Marroccia, M., Randazzo, A. (2019). Cloud in Mobile Platforms: Managing Authentication/Authorization. In: Rocha, Á., Adeli, H., Reis, L., Costanzo, S. (eds) New Knowledge in Information Systems and Technologies. WorldCIST'19 2019. Advances in Intelligent Systems and Computing, vol 931. Springer, Cham. https://doi.org/10.1007/978-3-030-16184-2_35
Download citation
DOI: https://doi.org/10.1007/978-3-030-16184-2_35
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16183-5
Online ISBN: 978-3-030-16184-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)