Abstract. Mobile Cloud Computing has become as a new IT paradigm because of the growth of mobile device like smartphone and appearance of Cloud Computing environment. This mobile cloud environment provides various services and IT resources according to users' requests, so an effective management of service and IT resources is required. Hence, this paper designs a context model based on ontology in mobile cloud computing in order to provide distributed IT resources and services to users based on context-awareness information. As the context model proposed in this paper uses context-aware information, it enables to provide more accurate personalized services and manage distributed IT resources.
Abstract. Cloud computing is a computing environment centered on users and can use programs or documents stored respectivily in servers by operating an applied software such as Web browser through diverse devices on where users can access Internet as an on-demand outsourcing service of IT resources using Internet. In order to use these cloud computing service, a user authentication is needed. This paper proposed the platform for user authentication using provisioning in Cloud computing environment.
We can use information and software of various forms without being restricted for place and time if ubiquitous computing age comes. However, its reverse function is causing security problems such as outflow of personal information, hacking, diffusion of virus. Specially, dissemination of software that has malicious purpose in ubiquitous computing environment causes serious damage. We have studied about malicious code detection and software vulnerability detection tool to prevent this. But, existent detection tools are not suited to general software, because they are limitative in specification area. In addition, they can not detect a newly appeared malicious code. We must update pattern of new malicious code, because they use a simple pattern matching technique. In this paper, we propose rule-based security auditing tool that analyzes structure of target code to solve these problems, define this as rule, and detect malicious codes and software vulnerabilities. Proposed auditing tool can construct secure ubiquitous computing environment, because it will be used by a common software audit tool that detects malicious codes and software vulnerabilities at the same time.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.