Abstract
Mobile cloud computing is an emerging technology that is gaining popularity as a means to extend the capabilities of resource-constrained mobile devices such as a smartphone. Mobile cloud computing requires specialized application development models that support computation offloading from a mobile device to the cloud. The computation offloading is performed by means of offloading application process, application component, entire application, or clone of the smartphone. The offloading of an entire application or clone of the smartphone to cloud may raise application piracy issues, which, unfortunately, have not been addressed in the existing literature. This paper presents a piracy control framework for mobile cloud environment, named Pirax, which prevents mobile applications from executing on unauthenticated devices and cloud resources. Pirax is formally verified using High Level Petri Nets, Satisfiability Modulo Theories Library and Z3 solver. Pirax is implemented on Android platform and analyzed from security and performance perspectives. The performance analysis results show that Pirax is lightweight and easy to integrate into existing mobile cloud application development models.
Similar content being viewed by others
References
Khan AR, Othman M, Madani SA, Khan SU (2013), A survey of mobile cloud computing application models. IEEE Commun Surv Tut 99(PP):1–21. doi: 10.1109/SURV.2013.062613.00160
Khan AN, Kiah MLM, Khan SU, Madani SA (2013) Towards secure mobile cloud computing: a survey. Future Gener Comput Syst 29(5):1278–1299
Chun B, Ihm S, Maniatis P, Naik M (2010) CloneCloud: Boosting Mobile Device Applications Through Cloud Clone Execution. Computing Research Repository (CoRR) abs/1009.3088
Zhang X, Jeong S, Kunjithapatham A, Gibbs S (2010) Towards an elastic application model for augmenting computing capabilities of mobile platforms. In: Proceedings of international ICST conference on mobile wireless middleware, operating systems, and applications, June 2010
March V, Gu Y, Leonardi E, Goh G, Kirchberg M (2011) Lee BS (2011) \(\mu \) Cloud: towards a new paradigm of rich mobile applications. In: Proceedings of international conference on mobile web information systems (MobiWIS)
Cuervo E, Balasubramanian A, Cho DK, Wolman A, Saroiu S, Chandra R, Bahl P (2010) MAUI: making smartphones last longer with code offload. In: 8th International conference on mobile systems, applications and aervices (MobiSys ’10), 2010, pp 49–62
Ma RKK, King LT, Cho-li W (2011) eXCloud: Transparent runtime support for scaling mobile applications in cloud. In: Proceedings of international conference on cloud and service computing (CSC), Dec 2011
Kosta S, Aucinas A, Hui P, Mortier R, Zhang X (2011) Unleashing the power of mobile cloud computing using ThinkAir. Computing Research Repository (CoRR) abs/1105.3232
Kemp R, Palmer NP, Kielmann T, Bal HE (2010) Cuckoo: a computation offloading framework for smartphones. In: Proceedings of international conference on mobile computing, applications, and services (MobiCASE’2010), Oct 2010
DeveloperWorks survey (2013) http://public.dhe.ibm.com/software/dw/survey/2010surveyresults/2010surveresults-pdf.pdf. 19 Jan 2013
International Data Corporation (2013) http://www.idc.com/getdoc.jsp?containerId=prUS23028711. 21 Jan 2013
Application Piracy (2013) http://www.rascal.co.il/smartphones.html. 3 Mar 2013
Mobile cloud computing - Devices, trends, issues, and the enabling technologies (2013) http://public.dhe.ibm.com/software/dw/cloud/library/cl-mobilecloudcomputing-pdf.pdf. 3 Jan 2013
Android App Market reaches 500,000 submissions (2013) http://www.informationweek.com/news/personal-tech/mobile-apps/231901537. 2 Jan 2013
How piracy ruins it for paid apps (2013) http://news.cnet.com/8301-1035_3-20107572-94/how-piracy-ruins-it-for-paid-apps-inside-apps. 3 Jan 2013
App Anti-Piracy (2013) http://www.mtiks.com. 7 Jan 2013
Android Market Game Piracy (2013) http://www.wired.co.uk/news/archive/2012-05/02/android-market-game-piracy. 8 Jan 2013
Android (2013) http://www.android.com. 10 Jan 2013
Apple iOS5 (2013) http://www.apple.com/ios. 10 Jan 2013
Nokia Symbian (2013) http://symbian.nokia.com. 10 Jan 2013
Windows Mobile (2013), http://www.microsoft.com/download/en/windowsMobile.aspx?q=windows+mobile, 10 Jan 2013
BlackBerry 7 OS (2012) http://www.rim.com/products/blackberry_os7.shtml. 15 July 2012
The Piracy Problem In Chinas Mobile Game Market (2013) http://micgadget.com/18949/the-piracy-problem-in-chinas-mobile-game-market. 15 Jan 2013
Android Market Game Piracy (2013) http://www.wired.co.uk/news/archive/2012-05/02/android-market-game-piracy. 17 Jan 2013
Tendulkar V, Snyder R, Pletcher J, Butler K, Shashidharan A, Enck W (2012) Abusing cloud-based browsers for fun and profit. In: Proceedings of 28th annual computer security applications conference (ACSAC), Orlando, FL, December 2012
Node-locked License model (2013) http://idlastro.gsfc.nasa.gov/idl_html_help/Licensing_Methods.html, 10 Jan 2013
GSMA association—IMEI allocation and approval guidelines (2011) http://www.gsma.com/documents/ts-06-6-0-imei-allocation-and-approval-guidelines/20164/. 5 Jan 2013
Changing or keeping a UUID for a moved virtual machine (2013) http://kb.vmware.com/selfservice/microsites/search.do?cmd=displayKC&externalId=1541. 5 Jan 2013
Virtualbox (2013) http://www.virtualbox.org. 15 Feb 2013
VMware (2013) http://www.vmware.com. 15 Feb 2013
Michel D (2013) Petri nets: fundamental models, verification and applications. Wiley-ISTE, New York, 2013
Moura L, Bjrner N (2009), Satisfiability modulo theories: an appetizer. In: Oliveira MVM, Woodcock J (eds), Lecture notes in computer science, vol 5902. Springer, Berlin, pp 23–36
Z3 Solver (2012) http://research.microsoft.com/en-us/um/redmond/projects/z3/ml/z3.html. 10 Dec 2012
Malik SUR, Srinivasan SK, Khan SU, Wang L (2012) A methodology for OSPF routing protocol verification. In: Proceedings of international conference on scalable computing and communications (ScalCom), Changzhou, China, Dec 2012
Android SDK (2013) http://developer.android.com/sdk/index.html. 13 Jan 2013
RSA Cryptography Standard (2012) PKCS# 1 v2.2 RSA Laboratories. 27 Oct 2012
FIB PUB (2008) Secure Hath Standard (SHS). Federal Information Processing Standards Publication
RSA Laboratories (2013) http://www.rsa.com/rsalabs/node.asp?id=2004. 2 Jan 2013
Khan AN, Kiah MLM, Madani SA, Khan AR, Ali M (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Super Comput. doi: 10.1007/s11227-013-0967-y
Acknowledgments
This work was funded in part by BrightSparks and Peruntukan Penyelidikan Pascasiswazah (PPP) (Grant No: PG122-2012B), University of Malaya, Malaysia.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Khan, A.R., Othman, M., Ali, M. et al. Pirax: framework for application piracy control in mobile cloud environment. J Supercomput 68, 753–776 (2014). https://doi.org/10.1007/s11227-013-1061-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-013-1061-1