Skip to main content
Log in

Pirax: framework for application piracy control in mobile cloud environment

  • Original Paper
  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Mobile cloud computing is an emerging technology that is gaining popularity as a means to extend the capabilities of resource-constrained mobile devices such as a smartphone. Mobile cloud computing requires specialized application development models that support computation offloading from a mobile device to the cloud. The computation offloading is performed by means of offloading application process, application component, entire application, or clone of the smartphone. The offloading of an entire application or clone of the smartphone to cloud may raise application piracy issues, which, unfortunately, have not been addressed in the existing literature. This paper presents a piracy control framework for mobile cloud environment, named Pirax, which prevents mobile applications from executing on unauthenticated devices and cloud resources. Pirax is formally verified using High Level Petri Nets, Satisfiability Modulo Theories Library and Z3 solver. Pirax is implemented on Android platform and analyzed from security and performance perspectives. The performance analysis results show that Pirax is lightweight and easy to integrate into existing mobile cloud application development models.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Khan AR, Othman M, Madani SA, Khan SU (2013), A survey of mobile cloud computing application models. IEEE Commun Surv Tut 99(PP):1–21. doi: 10.1109/SURV.2013.062613.00160

    Google Scholar 

  2. Khan AN, Kiah MLM, Khan SU, Madani SA (2013) Towards secure mobile cloud computing: a survey. Future Gener Comput Syst 29(5):1278–1299

    Article  Google Scholar 

  3. Chun B, Ihm S, Maniatis P, Naik M (2010) CloneCloud: Boosting Mobile Device Applications Through Cloud Clone Execution. Computing Research Repository (CoRR) abs/1009.3088

  4. Zhang X, Jeong S, Kunjithapatham A, Gibbs S (2010) Towards an elastic application model for augmenting computing capabilities of mobile platforms. In: Proceedings of international ICST conference on mobile wireless middleware, operating systems, and applications, June 2010

  5. March V, Gu Y, Leonardi E, Goh G, Kirchberg M (2011) Lee BS (2011) \(\mu \) Cloud: towards a new paradigm of rich mobile applications. In: Proceedings of international conference on mobile web information systems (MobiWIS)

  6. Cuervo E, Balasubramanian A, Cho DK, Wolman A, Saroiu S, Chandra R, Bahl P (2010) MAUI: making smartphones last longer with code offload. In: 8th International conference on mobile systems, applications and aervices (MobiSys ’10), 2010, pp 49–62

  7. Ma RKK, King LT, Cho-li W (2011) eXCloud: Transparent runtime support for scaling mobile applications in cloud. In: Proceedings of international conference on cloud and service computing (CSC), Dec 2011

  8. Kosta S, Aucinas A, Hui P, Mortier R, Zhang X (2011) Unleashing the power of mobile cloud computing using ThinkAir. Computing Research Repository (CoRR) abs/1105.3232

  9. Kemp R, Palmer NP, Kielmann T, Bal HE (2010) Cuckoo: a computation offloading framework for smartphones. In: Proceedings of international conference on mobile computing, applications, and services (MobiCASE’2010), Oct 2010

  10. DeveloperWorks survey (2013) http://public.dhe.ibm.com/software/dw/survey/2010surveyresults/2010surveresults-pdf.pdf. 19 Jan 2013

  11. International Data Corporation (2013) http://www.idc.com/getdoc.jsp?containerId=prUS23028711. 21 Jan 2013

  12. Application Piracy (2013) http://www.rascal.co.il/smartphones.html. 3 Mar 2013

  13. Mobile cloud computing - Devices, trends, issues, and the enabling technologies (2013) http://public.dhe.ibm.com/software/dw/cloud/library/cl-mobilecloudcomputing-pdf.pdf. 3 Jan 2013

  14. Android App Market reaches 500,000 submissions (2013) http://www.informationweek.com/news/personal-tech/mobile-apps/231901537. 2 Jan 2013

  15. How piracy ruins it for paid apps (2013) http://news.cnet.com/8301-1035_3-20107572-94/how-piracy-ruins-it-for-paid-apps-inside-apps. 3 Jan 2013

  16. App Anti-Piracy (2013) http://www.mtiks.com. 7 Jan 2013

  17. Android Market Game Piracy (2013) http://www.wired.co.uk/news/archive/2012-05/02/android-market-game-piracy. 8 Jan 2013

  18. Android (2013) http://www.android.com. 10 Jan 2013

  19. Apple iOS5 (2013) http://www.apple.com/ios. 10 Jan 2013

  20. Nokia Symbian (2013) http://symbian.nokia.com. 10 Jan 2013

  21. Windows Mobile (2013), http://www.microsoft.com/download/en/windowsMobile.aspx?q=windows+mobile, 10 Jan 2013

  22. BlackBerry 7 OS (2012) http://www.rim.com/products/blackberry_os7.shtml. 15 July 2012

  23. The Piracy Problem In Chinas Mobile Game Market (2013) http://micgadget.com/18949/the-piracy-problem-in-chinas-mobile-game-market. 15 Jan 2013

  24. Android Market Game Piracy (2013) http://www.wired.co.uk/news/archive/2012-05/02/android-market-game-piracy. 17 Jan 2013

  25. Tendulkar V, Snyder R, Pletcher J, Butler K, Shashidharan A, Enck W (2012) Abusing cloud-based browsers for fun and profit. In: Proceedings of 28th annual computer security applications conference (ACSAC), Orlando, FL, December 2012

  26. Node-locked License model (2013) http://idlastro.gsfc.nasa.gov/idl_html_help/Licensing_Methods.html, 10 Jan 2013

  27. GSMA association—IMEI allocation and approval guidelines (2011) http://www.gsma.com/documents/ts-06-6-0-imei-allocation-and-approval-guidelines/20164/. 5 Jan 2013

  28. Changing or keeping a UUID for a moved virtual machine (2013) http://kb.vmware.com/selfservice/microsites/search.do?cmd=displayKC&externalId=1541. 5 Jan 2013

  29. Virtualbox (2013) http://www.virtualbox.org. 15 Feb 2013

  30. VMware (2013) http://www.vmware.com. 15 Feb 2013

  31. Michel D (2013) Petri nets: fundamental models, verification and applications. Wiley-ISTE, New York, 2013

  32. Moura L, Bjrner N (2009), Satisfiability modulo theories: an appetizer. In: Oliveira MVM, Woodcock J (eds), Lecture notes in computer science, vol 5902. Springer, Berlin, pp 23–36

  33. Z3 Solver (2012) http://research.microsoft.com/en-us/um/redmond/projects/z3/ml/z3.html. 10 Dec 2012

  34. Malik SUR, Srinivasan SK, Khan SU, Wang L (2012) A methodology for OSPF routing protocol verification. In: Proceedings of international conference on scalable computing and communications (ScalCom), Changzhou, China, Dec 2012

  35. Android SDK (2013) http://developer.android.com/sdk/index.html. 13 Jan 2013

  36. RSA Cryptography Standard (2012) PKCS# 1 v2.2 RSA Laboratories. 27 Oct 2012

  37. FIB PUB (2008) Secure Hath Standard (SHS). Federal Information Processing Standards Publication

  38. RSA Laboratories (2013) http://www.rsa.com/rsalabs/node.asp?id=2004. 2 Jan 2013

  39. Khan AN, Kiah MLM, Madani SA, Khan AR, Ali M (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Super Comput. doi: 10.1007/s11227-013-0967-y

Download references

Acknowledgments

This work was funded in part by BrightSparks and Peruntukan Penyelidikan Pascasiswazah (PPP) (Grant No: PG122-2012B), University of Malaya, Malaysia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Atta ur Rehman Khan.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Khan, A.R., Othman, M., Ali, M. et al. Pirax: framework for application piracy control in mobile cloud environment. J Supercomput 68, 753–776 (2014). https://doi.org/10.1007/s11227-013-1061-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-013-1061-1

Keywords

Navigation