Abstract
Cloud computing is deemed to be the next big trend nebulous. Various sectors have expressed interest in its adoption, including banking, the government, education, manufacturing and telecommunication. With the promise of cost saving and flexibility also comes the greater challenge of security in-particularly "trust". One of the common questions asked by many users is "Can the cloud be trusted?" Telecommunication service providers have been trusted for many years, and have been adopted my millions of users world wide. With the emerging vision of new mobile cloud providers, the ultimate question lies in asking, can a mobile cloud provider be a more trustworthy provider than the traditional ones?
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Voas, J., et al.: Cloud computing: New wine or just a new bottle? vol. 11(2), pp. 15–17. IEEE Computer Society (March/April 2009)
John, W., et al.: Cloud computing: Implementation, management and security, pp. 153–180. CRC Press (2010)
Ali, M.: Green Cloud on the Horizon. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 451–459. Springer, Heidelberg (2009)
Amazon (2010), http://aws.amazon.com/ec2/
http://blogs.idc.com/ie/wp-content/uploads/2009/12/idc_cloud_challenges_2009.jpg
Khalid, A.: Cloud computing: Applying Issues in Small. In: 2010 International Conference on Signal Acquisition and Processing. IEEE (2010)
Dillon, T., et al.: Cloud computing: Issues and Challenges. In: 24th International Conference on Advanced Information Networking and Applications. IEEE (2010)
Jesen, M., et al.: On Technical Security Issues in Cloud Computing. In: IEEE International Conference on Cloud Computing (2009)
Marshall, R.: Google explains Gmail troubles (February 2009), http://www.vnunet.com/vnunet/news/2237201/google-gmail-troubles-explained
Mari, A.: Cloud computing could bring security threats (February 2009), http://www.vnunet.com/computing/news/2237013/cloud-computing-bring-security
Data Protection Act (1998), http://www.opsi.gov.uk/Acts/Acts1998/ukpga_19980029_en_1,1998
Claire, B.: First malicious virus hit iPhone…but only on mobiles cracked by users (November 2009), http://www.dailymail.co.uk/sciencetech/article-1230223/First-malicious-virus-hits-iPhone--mobiles-cracked-users.html
BBC news, Worm attack bites at Apple iPhone, http://news.bbc.co.uk/2/hi/technology/8349905.stm
Dinah, G.: Trojan targets iPhone users (August 2010), http://www.talktalk.co.uk/technology/news/articles/trojan-targets-iphone-users.html
Mills, E.: First SMS sending Android Trojan reported (August 2010), http://news.cnet.com/8301-27080_3-20013222-245.html
Beavis, G.: Expensive virus hit Android Users, fake application sucks mega-bucks from your phone (August 2010), http://www.techradar.com/news/phone-and-communications/mobile-phones/expensive-virus-hits-android-users-709260
Ali, M., et al.: A Review of Security Threats on Smart Phones. In: ICGeS (February 2005), Conference Paper (April 2005)
The register, Linux vs windows viruses (October 2003), http://www.theregister.co.uk/2003/10/06/linux_vs_windows_viruses/
Santhi, K.R., et al.: Goals of True Broad band’s Wireless Next Wave (4G-5G). In: 2003 IEEE 58th Vehicular Technology Conference, VTC 2003-Fall, vol. 4, pp. 2317–2321 (May 2004)
Smith, C., et al.: 3G Wireless Networks. McGrow-Hill Telecom professional (2002)
Top 10 Most Dangerious Viruses on Symbian based Cell phones (April 2010), http://www.worldinterestingfacts.com/lifestyle/top-10-most-dangerous-cell-phone-viruses-on-symbian-based-cell-phone.html
Malik, When the Cloud Fails: T-Mobile, Microsoft Lose Sidekick Customer Data (October 2009), http://gigaom.com/2009/10/10/when-cloud-fails-t-mobile-microsoft-lose-sidekick-customer-data/
BBC (April 2010), http://news.bbc.co.uk/1/hi/programmes/click_online/8625625.stm
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Ali, M. (2012). Can a Mobile Cloud Be More Trustworthy than a Traditional Cloud?. In: Prasad, R., Farkas, K., Schmidt, A.U., Lioy, A., Russello, G., Luccio, F.L. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 94. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30244-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-30244-2_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30243-5
Online ISBN: 978-3-642-30244-2
eBook Packages: Computer ScienceComputer Science (R0)