首页 | 本学科首页   官方微博 | 高级检索  
     


Highly Secure Mobile Devices Assisted with Trusted Cloud Computing Environments
Authors:Doohwan Oh  Ilkyu Kim  Keunsoo Kim  Sang‐Min Lee  Won Woo Ro
Abstract:Mobile devices have been widespread and become very popular with connectivity to the Internet, and a lot of desktop PC applications are now aggressively ported to them. Unfortunately, mobile devices are often vulnerable to malicious attacks due to their common usage and connectivity to the Internet. Therefore, the demands on the development of mobile security systems increase in accordance with advances in mobile computing. However, it is very hard to run a security program on a mobile device all of the time due the device's limited computational power and battery life. To overcome these problems, we propose a novel mobile security scheme that migrates heavy computations on mobile devices to cloud servers. An efficient data transmission scheme for reducing data traffic between devices and servers over networks is introduced. We have evaluated the proposed scheme with a mobile device in a cloud environment, whereby it achieved a maximum speedup of 13.4 compared to a traditional algorithm.
Keywords:Mobile security  offloading computing  cloud computing  pattern matching  Wu‐Manber
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号