LOGO Mobile Cloud Computing Hossein Abdolghafar 89191133 Advisor :Dr. H.Salimi Februray 2011 1/25.

Slides:



Advertisements
Similar presentations
A Lightweight Platform for Integration of Mobile Devices into Pervasive Grids Stavros Isaiadis, Vladimir Getov University of Westminster, London {s.isaiadis,
Advertisements

Info to Enterprise Migration Implementation Case Study: SBC Corporation Presented to the Crystal Decisions Regional Users Group for the Bay Area on October.
Using PHINMS and Web-Services for Interoperability The findings and conclusions in this presentation are those of the author and do not necessarily represent.
J0 1 Marco Ronchetti - Basi di Dati Web e Distribuite – Laurea Specialistica in Informatica – Università di Trento.
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
11 Application of CSF4 in Avian Flu Grid: Meta-scheduler CSF4. Lab of Grid Computing and Network Security Jilin University, Changchun, China Hongliang.
What's a Proxy Printer Provider? PWG WIMS-CIM Working Group Rick Landau Dell, CTO Office 2008/08/08 v0.2.
MicroKernel Pattern Presented by Sahibzada Sami ud din Kashif Khurshid.
18 Copyright © 2005, Oracle. All rights reserved. Distributing Modular Applications: Introduction to Web Services.
11 Copyright © 2005, Oracle. All rights reserved. Creating the Business Tier: Enterprise JavaBeans.
1 Copyright © 2005, Oracle. All rights reserved. Introducing the Java and Oracle Platforms.
17 Copyright © 2005, Oracle. All rights reserved. Deploying Applications by Using Java Web Start.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
GridPP July 2003Stefan StonjekSlide 1 SAM middleware components Stefan Stonjek University of Oxford 7 th GridPP Meeting 02 nd July 2003 Oxford.
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
Universitá degli Studi di LAquila Mälardalens Högskola, Västerås 10th September 2009 Integrating Wireless Systems into Process Industry and Business Management.
Chapter 1 Introduction Copyright © Operating Systems, by Dhananjay Dhamdhere Copyright © Introduction Abstract Views of an Operating System.
Secure Virtual Machine Execution Under an Untrusted Management OS Chunxiao Li Anand Raghunathan Niraj K. Jha.
Auto-scaling Axis2 Web Services on Amazon EC2 By Afkham Azeez.
Server Access The REST of the Story David Cleary
1 Java Card Technology Prepared by:Ali Toyserkani Adopted from: Introduction to Java Card Technology C. Enrique Ortiz.
Managing Web server performance with AutoTune agents by Y. Diao, J. L. Hellerstein, S. Parekh, J. P. Bigu Jangwon Han Seongwon Park
Chapter 1: Introduction to Scaling Networks
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
© 2005 Avaya Inc. All rights reserved. A Client-Side Architecture for Supporting Pervasive Enterprise Communications Amogh Kavimandan, Reinhard Klemm,
The Platform as a Service Model for Networking Eric Keller, Jennifer Rexford Princeton University INM/WREN 2010.
1 Mobile Applications and Web Services Part II Prof. Klaus Moessner, Dr Payam Barnaghi Centre for Communication Systems Research Electronic Engineering.
Access Control 1. Given Credit Where It Is Due Most of the lecture notes are based on slides by Dr. Daniel M. Zimmerman at CALTECH Some slides are from.
ABC Technology Project
Secure mobile cloud. Introduction Mobile cloud computing is gaining popularity among mobile users. The ABI Research predicts that the number of mobile.
Taming User-Generated Content in Mobile Networks via Drop Zones Ionut Trestian Supranamaya Ranjan Aleksandar Kuzmanovic Antonio Nucci Northwestern University.
25 July, 2014 Hailiang Mei, TU/e Computer Science, System Architecture and Networking 1 Hailiang Mei Remote Terminal Management.
25 July, 2014 Hailiang Mei, TU/e Computer Science, System Architecture and Networking 1 Hailiang Mei Security and Privacy Concern.
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 1 Tempering Kademlia with a robust identity based system.
Making Time-stepped Applications Tick in the Cloud Tao Zou, Guozhang Wang, Marcos Vaz Salles*, David Bindel, Alan Demers, Johannes Gehrke, Walker White.
IONA Technologies Position Paper Constraints and Capabilities for Web Services
Suggested Course Outline Cloud Computing Bahga & Madisetti, © 2014Book website:
Database System Concepts and Architecture
Executional Architecture
Implementation Architecture
Global Analysis and Distributed Systems Software Architecture Lecture # 5-6.
1 Chapter 11: Data Centre Administration Objectives Data Centre Structure Data Centre Structure Data Centre Administration Data Centre Administration Data.
25 seconds left…...
What’s New in WatchGuard Dimension v1.2
We will resume in: 25 Minutes.
Xiao Zhang and Wenliang Du Dept. of Electrical Engineering & Computer Science Syracuse University.
University of Minnesota Optimizing MapReduce Provisioning in the Cloud Michael Cardosa, Aameek Singh†, Himabindu Pucha†, Abhishek Chandra
Communication and Functional Models
Chapter 13 The Data Warehouse
From Model-based to Model-driven Design of User Interfaces.
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
A Virtual Cloud Computing Provider for Mobile Devices Gonzalo Huerta-Canepa Dongman Lee.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
1 MAIN TABLE OF CONTENTS Definition: SOFTWARE AGENT HOW MANY TYPES OF AGENT? DEFINITION OF MOBILE AGENT: SOFTWARE AGENTS PROPERTIES, WORKING OF MOBILE.
SECURING ELASTIC APPLICATIONS ON MOBILE DEVICES FOR CLOUD COMPUTING Xinwen Zhang,Joshua Schiffman,Simon Gibbs 2009 ACM Cloud Computing Security Workshop.
A policy-based per-flow mobility management system design
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
CSI 3125, Preliminaries, page 1 SERVLET. CSI 3125, Preliminaries, page 2 SERVLET A servlet is a server-side software program, written in Java code, that.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Aneka Cloud ApplicationPlatform. Introduction Aneka consists of a scalable cloud middleware that can be deployed on top of heterogeneous computing resources.
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
Data-Centric Systems Lab. A Virtual Cloud Computing Provider for Mobile Devices Gonzalo Huerta-Canepa presenter 김영진.
Nguyen Thi Thanh Nha HMCL by Roelof Kemp, Nicholas Palmer, Thilo Kielmann, and Henri Bal MOBICASE 2010, LNICST 2012 Cuckoo: A Computation Offloading Framework.
Introduction to Mobile-Cloud Computing. What is Mobile Cloud Computing? an infrastructure where both the data storage and processing happen outside of.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
University of Maryland College Park
Consulting Services JobScheduler Architecture Decision Template
Presentation transcript:

LOGO Mobile Cloud Computing Hossein Abdolghafar Advisor :Dr. H.Salimi Februray /25

LOGO Contents Introduction 1 Secure Session Management 4 Elastic Framework 3 Trust Cube 5 2/25 Mobile Devices as a virtual cloud computing provider 2

LOGO Introduction Mobile phones are becoming pervasive. There is one mobile phone every two person in the world. Given the advances : users start to consider a mobile phone a personal information processing tool users expect to execute any application on top of a mobile device One way to overcome this limitation is mobile cloud computing 3/25

LOGO Mobile Devices as a virtual cloud computing provider Motivation and Scenario On an economical basis, accessing cloud computing providers is associated with two costs: The cost of networking The cost of using the providers resources Design Considerations Resource monitoring and management Seamless integration with the existing cloud APIs Activity detection to find users of the same or similar goals A memory cache scheme to save intermediate results …. 4/25

LOGO Current Implementation Architecture 5/25

LOGO Elastic Framework 6/25

LOGO Current Implementation (cont.) The Application Manager is in charge of launching and intercepting an application at loading time The Resource Manager is in charge of application profiling and resource monitoring on a local device The Context Manager wields and synchronizes contextual information from context widgets The Offloading manager component is in charge of sending and managing jobs from the node to other remote devices 7/25

LOGO Current Implementation (cont.) This project consists of two sub implementations: Cloud computing provider client Ad Hoc mobile cloud framework Both are developed based on Hadoop (a cloud computing platform from Apache.) Communication between devices is based on the Extensible Messaging and Presence Protocol (XMPP) 8/25

LOGO Another application platform for mobile (elastic framework) An elastic application can consist of one or more weblets which function independently, but communicate with each other. Elasticity manager running on the device monitors the resource requirements of the weblets of the application Elasticity manager talks to an Elasticity service residing on the cloud on which cloud node it should be launched, and how much storage should be allocated Elasticity manager can also make decisions about: migrating running weblets from the device to cloud or from cloud to device 9/25

LOGO Overview of elastic application for mobile device 10/25

LOGO Exisiting challenges A new application model is needed in order to launch or migrate some parts of an application in the cloud and others on the device. An appropriate protocol is needed between weblets during runtime to: synchronize the state of the application respond to state change or user actions A set of cost objective functions are needed which should be optimized when elastic scheduling decisions are made, such as when and where to migrate weblets Security And Privacy 11/25

LOGO Elastic Framework Architecture) A typical elastic application includes: UI component and one or more weblets Device elasticity manager (DEM) : Where the applications components (weblets) are located Selects paths used for communication with weblets Runs an optimizer which is responsible for determining the best application conguration given costs and user goals cloud elasticity service (CES) : cloud manager, application manager, and sensing information collection provides a web service, referred to as the cloud fabric interface (CFI) 12/25

LOGO Elastic Framework Architecture Contd. 13/25

LOGO Elastic Application Model Partitions of an elastic application Each application should be partitioned into components called weblets. A weblets functionality should not be affected by the location or environment where it is running. Data dependency of weblets An elastic application should allow reasonable data dependency between weblets Communication protocols between weblets Lightweight web services protocols such as REST are used in this framework 14/25

LOGO Threat Model Threats to Mobile Devices Malware targeting mobile devices e.g : A malware can change the battery status of the device thus DEM does not make decision of ofoading execution when an application is launched Threats to Cloud Platform and Application Container Malicious entities e.g : Can change network and cost settings, or even cloud sensing information to confuse the CES into making decisions Threats to Communication Channels Code Red, and SQL Slammer MITM (Man-In-The-Middle), DDoS (Distributed-Denial-Of- Service) 15/25

LOGO Security Objectives Trustworthy weblet containers (or VMs) on both device and cloud Weblets must be installed and execute in trusted runtime environments in all locations. Authentication and secure session management The elastic framework should provide a mechanism to authenticate weblets belonging to the same application and user to each other Authorization and access control A weblet on the cloud should adhere to the property of least privileges Logging and auditing Behaviors of weblets should be logged and audited routinely to prevent malicious activities 16/25

LOGO Secure Installation of Elastic Applications 17/25

LOGO Authorization of Weblets Shared user credentials A hostile environment on cloud node can save the user credentials and impersonate the user later. Shared session information After a device weblet authenticates with the web server, it should share wsk and wss with other weblets. Using session information only on device weblet Whenever a cloud weblet needs access to user data on external web services, it forwards the requests to the authenticated device weblet OAuth-like [3] authentication 18/25

LOGO Trust Cube And Implicit Authentication 19/25

LOGO Trust Cube And Implicit Authentication TrustCube assumes a federated authentication framework,such as OpenID. Implicit authentication is used to identify users by their habits, as opposed to their belongings, memorized data, and biometrics. The use of implicit authentication implies a policy-based authentication framework 20/25

LOGO High-level Architecture The policy includes three parts: The access request The information to be collected from client devices or data aggregator for this access request Rule to generate the authentication result. 21/25

LOGO Implementation Approach client side agent was developed on Android which collects two kinds of data: First, it collects a users context and activities Second, during authentication, it collects information about the phone The service is developed in Java and deployed as an Amazon EC2 instance and encapsulated as an AMI (Amazon Machine Image) 22/25

LOGO Conclusion Based on the result of executing the first framework: The approach over small files shows that the execution of tasks is slightly slower than executing it directly on the mobile device (less than 1% slower in average) More over multiple small files trigger memory problems (hadoop problem) Also Cloud computing has brought new challenges and opportunities for authentication. There is increasing demand for usable authentication to access services and data for both enterprises and consumers. There is another trend that is important to understand in the context of cloud computing and authentication: the shift in platforms from traditional PCs toward smart phones and other mobile platforms. 23/25

LOGO References Amazon. Gonzalo Huerta-Canepa, D. L. A Virtual Cloud Computing Provider for Mobile Devices ACM2010), 5. Xinwen Zhang, J. S., SimonGibbs, and Anugeetha Kunjithapatham, a. S. J. Securing Elastic Applications on Mobile Devices for Cloud Computing. ACM2010. Christensen, J. H. Using RESTful web-services and cloud computing to create next generation mobile applications. ACM2009. I. Giurgiu, O. R., D. Juric, I. Krivulev, and G. Alonso Calling the cloud: enabling mobile phones as interfaces to cloud applications2009. Marinelli, E. Hyrax: Cloud Computing on Mobile Devices using MapReduce. ACM /25

LOGO 25/25