Skip to main content

Can a Mobile Cloud Be More Trustworthy than a Traditional Cloud?

  • Conference paper
Security and Privacy in Mobile Information and Communication Systems (MobiSec 2011)

Abstract

Cloud computing is deemed to be the next big trend nebulous. Various sectors have expressed interest in its adoption, including banking, the government, education, manufacturing and telecommunication. With the promise of cost saving and flexibility also comes the greater challenge of security in-particularly "trust". One of the common questions asked by many users is "Can the cloud be trusted?" Telecommunication service providers have been trusted for many years, and have been adopted my millions of users world wide. With the emerging vision of new mobile cloud providers, the ultimate question lies in asking, can a mobile cloud provider be a more trustworthy provider than the traditional ones?

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Voas, J., et al.: Cloud computing: New wine or just a new bottle? vol. 11(2), pp. 15–17. IEEE Computer Society (March/April 2009)

    Google Scholar 

  2. John, W., et al.: Cloud computing: Implementation, management and security, pp. 153–180. CRC Press (2010)

    Google Scholar 

  3. Ali, M.: Green Cloud on the Horizon. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 451–459. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  4. Amazon (2010), http://aws.amazon.com/ec2/

  5. http://blogs.idc.com/ie/wp-content/uploads/2009/12/idc_cloud_challenges_2009.jpg

  6. Khalid, A.: Cloud computing: Applying Issues in Small. In: 2010 International Conference on Signal Acquisition and Processing. IEEE (2010)

    Google Scholar 

  7. Dillon, T., et al.: Cloud computing: Issues and Challenges. In: 24th International Conference on Advanced Information Networking and Applications. IEEE (2010)

    Google Scholar 

  8. Jesen, M., et al.: On Technical Security Issues in Cloud Computing. In: IEEE International Conference on Cloud Computing (2009)

    Google Scholar 

  9. Marshall, R.: Google explains Gmail troubles (February 2009), http://www.vnunet.com/vnunet/news/2237201/google-gmail-troubles-explained

  10. Mari, A.: Cloud computing could bring security threats (February 2009), http://www.vnunet.com/computing/news/2237013/cloud-computing-bring-security

  11. Data Protection Act (1998), http://www.opsi.gov.uk/Acts/Acts1998/ukpga_19980029_en_1,1998

  12. Claire, B.: First malicious virus hit iPhone…but only on mobiles cracked by users (November 2009), http://www.dailymail.co.uk/sciencetech/article-1230223/First-malicious-virus-hits-iPhone--mobiles-cracked-users.html

  13. BBC news, Worm attack bites at Apple iPhone, http://news.bbc.co.uk/2/hi/technology/8349905.stm

  14. Dinah, G.: Trojan targets iPhone users (August 2010), http://www.talktalk.co.uk/technology/news/articles/trojan-targets-iphone-users.html

  15. Mills, E.: First SMS sending Android Trojan reported (August 2010), http://news.cnet.com/8301-27080_3-20013222-245.html

  16. Beavis, G.: Expensive virus hit Android Users, fake application sucks mega-bucks from your phone (August 2010), http://www.techradar.com/news/phone-and-communications/mobile-phones/expensive-virus-hits-android-users-709260

  17. Ali, M., et al.: A Review of Security Threats on Smart Phones. In: ICGeS (February 2005), Conference Paper (April 2005)

    Google Scholar 

  18. The register, Linux vs windows viruses (October 2003), http://www.theregister.co.uk/2003/10/06/linux_vs_windows_viruses/

  19. Santhi, K.R., et al.: Goals of True Broad band’s Wireless Next Wave (4G-5G). In: 2003 IEEE 58th Vehicular Technology Conference, VTC 2003-Fall, vol. 4, pp. 2317–2321 (May 2004)

    Google Scholar 

  20. Smith, C., et al.: 3G Wireless Networks. McGrow-Hill Telecom professional (2002)

    Google Scholar 

  21. Top 10 Most Dangerious Viruses on Symbian based Cell phones (April 2010), http://www.worldinterestingfacts.com/lifestyle/top-10-most-dangerous-cell-phone-viruses-on-symbian-based-cell-phone.html

  22. Malik, When the Cloud Fails: T-Mobile, Microsoft Lose Sidekick Customer Data (October 2009), http://gigaom.com/2009/10/10/when-cloud-fails-t-mobile-microsoft-lose-sidekick-customer-data/

  23. BBC (April 2010), http://news.bbc.co.uk/1/hi/programmes/click_online/8625625.stm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Ali, M. (2012). Can a Mobile Cloud Be More Trustworthy than a Traditional Cloud?. In: Prasad, R., Farkas, K., Schmidt, A.U., Lioy, A., Russello, G., Luccio, F.L. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 94. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30244-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30244-2_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30243-5

  • Online ISBN: 978-3-642-30244-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics