skip to main content
10.1145/3019612.3019719acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Secure policy-based device-to-device offloading for mobile applications

Published:03 April 2017Publication History

ABSTRACT

Mobile application offloading, with the purpose of extending battery lifetime and increasing performance has been intensively discussed recently, resulting in various different solutions: mobile device clones operated as virtual machines in the cloud, simultaneously running applications on the mobile device and on a distant server, as well as flexible solutions dynamically acquiring other mobile devices' resources in the user's surrounding. Existing solutions have gaps in the fields of data security and application security. These gaps can be closed by integrating data usage policies, as well as application-flow policies. In this paper, we propose and evaluate a novel approach of integrating XACML into existing mobile application offloading-frameworks. Data owners remain in full control of their data, still, technologies like device-to-device offloading can be used.

References

  1. A. Baumann, M. Peinado, and G. Hunt. Shielding Applications from an Untrusted Cloud with Haven. Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation, pages 267--283, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. B. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti. CloneCloud: Elastic Execution Between Mobile Device and Cloud. In Proceedings of the sixth conference on Computer systems, pages 301--314, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. E. Cuervo, A. Balasubramanian, D. Cho, A. Wolman, S. Saroiu, R. Chandra, and B. Paramvir. MAUI : Making Smartphones Last Longer with Code Offload. In Proceedings of the 8th international conference on Mobile systems, applications, and services, volume 17, pages 49--62, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Jones, J. Bradley, and N. Sakimura. JSON Web Token (JWT). RFC 7519, RFC Editor, May 2015. http://www.rfc-editor.org/rfc/rfc7519.txt.Google ScholarGoogle Scholar
  5. S. Kosta, A. Aucinas, P. Hui, R. Mortier, and X. Zhang. ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. In Proceedings of 2012 IEEE INFOCOM, pages 945--953, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  6. B. Lin, Y. Chen, X. Chen, and Y. Yu. Comparison between JSON and XML in Applications Based on AJAX. Proceedings - 2012 International Conference on Computer Science and Service System, pages 1174--1177, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. N. Nurseitov, M. Paulson, R. Reynolds, and C. Izurieta. Comparison of JSON and XML Data Interchange Formats: A Case Study. Caine, pages 157--162, 2009.Google ScholarGoogle Scholar
  8. A. Reiter and T. Zefferer. POWER : A Cloud-Based Mobile Augmentation Approach for Web- and Cross-Platform Applications. In Proceedings of 2015 IEEE CloudNet, pages 226--231, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  9. A. Reiter and T. Zefferer. Flexible and Secure Resource Sharing for Mobile Augmentation Systems. 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), pages 31--40, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  10. Z. Sanaei, S. Abolfazli, A. Gani, and M. Chen. HMCC: A Hybrid Mobile Cloud Computing Framework Exploiting Heterogeneous Resources. In 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, pages 157--162, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Satyanarayanan. Pervasice Computing: Vision and Challenges. IEEE Personal Communications, pages 10--17, 2001. Google ScholarGoogle ScholarCross RefCross Ref
  12. M. Shiraz, A. Gani, R. H. Khokhar, and R. Buyya. A Review on Distributed Application Processing Frameworks in Smart Mobile Devices for Mobile Cloud Computing. IEEE Communications Surveys & Tutorials, 15(3):1294--1313, 2013. Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Secure policy-based device-to-device offloading for mobile applications

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              SAC '17: Proceedings of the Symposium on Applied Computing
              April 2017
              2004 pages
              ISBN:9781450344869
              DOI:10.1145/3019612

              Copyright © 2017 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 3 April 2017

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              Overall Acceptance Rate1,650of6,669submissions,25%
            • Article Metrics

              • Downloads (Last 12 months)1
              • Downloads (Last 6 weeks)0

              Other Metrics

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader