2014
DOI: 10.1007/978-3-662-43862-6_9
|View full text |Cite
|
Sign up to set email alerts
|

Outsourcing Mobile Security in the Cloud

Abstract: In order to prevent attacks against smartphones and tablets, dedicated security applications are deployed on the mobile devices themselves. However, these applications may have a significant impact on the device resources. Users may be tempted to uninstall or disable them with the objective of increasing battery lifetime and avoiding configuration operations and updates. In this paper, we propose a new approach for outsourcing mobile security functions as cloud-based services. The outsourced functions are dyna… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…To deal with such problem, [Hurel et al 2014] proposed outsourcing security controls in mobiles to the cloud so that they can work as security services on demand. This may clearly solve the issue of using mobile resources.…”
Section: A C C E P T E D Accepted Manuscriptmentioning
confidence: 99%
“…To deal with such problem, [Hurel et al 2014] proposed outsourcing security controls in mobiles to the cloud so that they can work as security services on demand. This may clearly solve the issue of using mobile resources.…”
Section: A C C E P T E D Accepted Manuscriptmentioning
confidence: 99%
“…Such a model not only provides organizations of all sizes with access to the technology services that they need, but it can also be a much more cost-effective way of accessing services than performing functions in-house. By outsourcing security protections to a security service provider, users can gain consistent and cost-effective protections regardless of device types, users locations or operating systems [26,27].…”
Section: Motivationmentioning
confidence: 99%
“…Considering the storage and computational limitations of mobile devices for very heavy security applications, [90] proposed outsourcing security to cloud using OpenFlow virtual switch in the device and OpenFlow controller residing in the cloud along with security manager. This method takes away major computational load from the device, employs variety of security services with fast processing.…”
Section: Proposalmentioning
confidence: 99%
“…This method takes away major computational load from the device, employs variety of security services with fast processing. The communication delay is an important factor affecting performance and so far it is not clear if faster processing overcomes the transmission latency or not [90]. 6) Summary of outstanding security Issues: A comprehensive survey of SDN security solutions have been done in [67] and [72].…”
Section: Proposalmentioning
confidence: 99%