59
[email protected] 1 Mobile Cloud Computing Dr Samia Bouzefrane Laboratoire CEDRIC CNAM, 292 rue Saint Martin http://cedric.cnam.fr/~bouzefra

Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

  • Upload
    others

  • View
    21

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 1

Mobile Cloud Computing

Dr Samia BouzefraneLaboratoire CEDRIC

CNAM, 292 rue Saint Martinhttp://cedric.cnam.fr/~bouzefra

Page 2: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 2

Agenda

•Mobile Cloud computing

– Mobile trusted computing

– Cloud computing

– Security Issues

•Mobile Cloud Computing & Internet of Things Convergence

Page 3: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 3

Context/Involvement

• CNRS Action on Secure Smart Objects & Internet ofThings du GDR ASR

http://samovar.telecom-sudparis.eu/spip.php?rubrique157

• Book on Smart Cards (in French Les Cartes à puce, Sept. 2013, coordinated by S. Bouzefrane & P. Paradinas, ISBN : 9782746239135)

• Book on identity Management Systems (in French La gestion des identités numériques, coordinated by M.

Laurent & S. Bouzefrane, to appear oct. 2014, Ed. ISTE).

Page 4: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 4

Mobile Cloud Computing

Page 5: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 5

Mobile Cloud Computing

• Mobile Computing– Untrusted mobile devices with limited resources

– Trusted Platforms for trusted computing•Smart cards (contact, contactless), Secure

Elements/NFC, Trusted Execution Environment

•Etc.

• Cloud Computing– Elastic on-demand resource provisioning with

minimum management effort

Page 6: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 6

Trusted platforms for mobile devices

Page 7: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 7

Smart cards as secure devices

Page 8: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] [email protected] 8

According to Eurosmart

Source Eurosmart, Nov. 2013: http://www.eurosmart.com/publications/market-overview

NFC Secure Elements (Mu)

Smart Secure Contactless

(Mu)

Smart Secure Device

(Mu)

Page 9: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 9

ISO7816 Standard

• The standard ISO 7816-1 definesthe physical characteristics ofthe card

• The standard ISO 7816-2 definesthe position of the contacts within the card

• The standard ISO 7816-3 definesthe electric signals used to communicate with the card

• The standard ISO 7816-4 definesthe basic commands to interactwith the smart cards

Page 10: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 10

Card Contacts in ISO7816-2

APDU protocol for communication

Page 11: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 11

APDU communication

MobileSIM

Page 12: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 12

Physical characteristics

• Monolithic component :

– CPU (8, 16, 32 bits)– PROM (32 to 64 KB) contains OS (JVM)– RAM (1 to 4 KB)– EEPROM/Flash 1KB to 128 KB (256 KB for Java

Card) contains data and applications– I/O interface– crypto processor

Page 13: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 13

A safety box

• Stores security keys and sensitive data

• Implements cryptographic algorithms

• Crypto-processor

• Physical sensors (light, power)

• Used for authentication and encryption

– SIM card authentication with the cell networks

– Banking card authentication with payment terminals

Page 14: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 14

Java Card platforms

99% of SIM Cards are Java Card platforms

Page 15: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 15

Java Card Specification

• Java Card 3 Specification by Oracle

– Classic edition (extension of Java Card 2.2)

•Java Card API Specification

•Java Card Runtime Environment Specification

•Java Card Virtual Machine Specification

– Connected edition (Web oriented, not deployed)

• Global Platform defines a trust environment in multi-application cards (used in Java Card platforms)

Page 16: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 16

GlobalPlatform Card Specificationv2.2.1

Runtime Environment

OPEN and GP TrustedFramework

RTE API

Controlling Authorities'Security Domain(s)

Issuer'sSecurity Domain

Application Providers'

Security Domain(s)

Card IssuerApplication(s)

Application Provider

Application(s)

Global ServicesApplication(s)

GP API

Page 17: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 17

Security domains in Java Card

• In Java Card platforms

– Each application (package) in a Security Domain

– Many applications from distinct providers may co-exist in the same card

– A firewall applet checks the isolation

– Each application has its own trusted execution environment

– The applications may share objects

Page 18: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 18

Secure Elements

Page 19: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 19

Secure Elements

• are Java Card platforms– SIM cards (SIM centric)

– Embedded secure elements (Phone centric)

– External secure SD Card (SD centric)

• Use NFC capabilities– distance : 0 - 20 cm, frequency : 13.56MHz (HF), rate: 424

kbits/s

• Use the security domains of GlobalPlatform

Page 20: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 20

Secure Elements

[email protected]

Page 21: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 21

NFC Forum specifications

ApplicationsApplications

LLCP(Logical Link

Control Protocol)

LLCP(Logical Link

Control Protocol)

RTD(Record Type Definition)

&NDEF

(Data Exchange Format)

RTD(Record Type Definition)

&NDEF

(Data Exchange Format)

Card Emulation

(Smart Card Capability for Mobile Devices)

Card Emulation

(Smart Card Capability for Mobile Devices)

RF Layer ISO 18092 + ISO 14443 Type A, Type B + FeliCaRF Layer ISO 18092 + ISO 14443 Type A, Type B + FeliCa

Peer to peer mode Read/Write mode Card emulation mode

Page 22: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 22

Mobile Payment

UICC SIMUICC SIM

NFC antenna

NFC antenna

Externalenv.

ApplicationsApplications

CPUCPU

OSOS

Java AndroidJava Android

NFC ChipNFC Chip

OTA

OSOS

AppsApps

� Single Wire Protocol (SWP) : the SIM card (SE) islinked to the NFC chip.

� GlobalPlatform is used for isolation & security.

Page 23: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 23

Standards for mobile payment

• / SCP (Smart Card Platform) to specify the interface between the SIM card and the chip NFC.

• to specify the multi-application architecture of the secure element.

• for the impact on the EMV payment applications.

Page 24: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 24

Host Card Emulation

Page 25: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 25

HCE (Host Card Emulation)

• Google Solution

• Alternative solution for SE

• Software platform

• Implements a stack protocol to support APDU and NFC standards from Android 4.4

• Motivation: to be independent from the SE providers (ex., telecom operators for SIM cards)

Page 26: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 26

NFC card emulation with a secure element NFC card emulation without a secure elementHCE supports APDU stack protocol

HCE

http://developer.android.com/guide/topics/connectivity/nfc/hce.html

Page 27: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 27

Pros & Cons

• As a software, HCE is less secure than a secure hardware device

• HCE concept does not target applications with high level of security

• Has larger resources (memory & processor)

• Independent from SE providers

Page 28: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 28

Trusted Execution Environment

Page 29: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 29

According to GP

• Target mobile devices

• Rich OS is vulnerable to attacks

• SE is resilient to attacks but limited

• TEE can serve as a comprise between Rich OS performance and SE security

https://www.globalplatform.org/documents/GlobalPlatform_TEE_White_Paper_Feb2011.pdf

Page 30: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 30

Architecture of TEE

https://www.globalplatform.org/documents/GlobalPlatform_TEE_White_Paper_Feb2011.pdf

Page 31: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 31

Benefits of TEE

• Created for security and speed

• Has larger resources than SE– RAM size (up to 1 MB), RAM speed (64bits/200 to 800MHz, Flash

size (shared with Rich OS)

– Secure storage per application

• TEE may cooperate with SE

• Offer security mechanisms (Generation and storage of

cryptographic keys, Attestation mechanism, Secure boot, etc.)

• Examples of implementations: SierraVisor and SierraTEE (ARM), ARM TrustZone, Trustonic TEE

Page 32: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 32

Trusted Platform Module

Page 33: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 33

Trusted Platform Module

• Manufacturers: HP, Infineon, Intel Dell, FUJITSU, etc.

• Convert non secure PCs, printers, mobile devices, etc. to trusted environment

• More than 500 millions of PCs with TPMs

http://trusted-computing.wikispaces.com/M+-+TPM+Chip+can+be+turned+off+Entirely

Page 34: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 34

Trusted Platform Module

"TPM chip" or "TPM Security Device"

http://en.wikipedia.org/wiki/Trusted_Platform_Module

TPM Specifications byTrusted Computing Group (consortium of companies)

Page 35: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 35

First trusted platforms : PCs

• to store secret keys, to encrypt data files/messages, to sign data, etc.

• implement mechanisms and protocols to ensure that a platform has loaded its software properly.

• Have their own hardware and are independent from the operating system of the PC.

Page 36: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 36

Cloud Computing

Page 37: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 37

Motivations

• Mobile devices (e.g., smartphone and tablet PC) are becoming an essential part of human life

• Explosion of mobile applications that provide services/data (e.g., iPhone apps and Google apps)

• As a consequence, Mobile devices deal with heavy computation tasks/data (Image/video/multimedia processing, Natural language processing, Social networking, Sensor data applications, Cloud gaming, etc.)

Page 38: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 38

Challenges

• Mobile devices face challenges in terms of

– Resources (e.g., battery life, storage, and bandwidth)

– Communications (e.g., mobility and security)

• The limited resources significantly impact the service quality

Page 39: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 39

Cloud computing

• Cloud computing is viewed as a solution for mobile applications to:– prolong the resources of mobile devices

– in elastic on-demand fashion.

• Cloud computing infrastructure models: public, private, hybrid

• Cloud computing service models:– Infrastructure as a service (IaaS)

– Platform as a service (PaaS)

– Software as service (SaaS)

Page 40: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 40

MCC definition

• According to: http://www.mobilecloudcomputingforum.com/

‘Mobile cloud computing at its simplest, refers to an infrastructure where both the data storage and data processing happen outside of the mobile device. Mobile cloud applications move the computing power and data storage away from mobile phones and into the cloud, bringing applications and MC to not just smartphone users but a much broader range of mobile subscribers.’

Page 41: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 41

Architecture of MCC

Page 42: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 42

Advantages of MCC/1

• Extending battery life: computation offloading techniques have been proposed to migrate the large computations from resource-limited resources (mobile devices) to resourceful machines (Cloud servers).

• Improving data storage and processing power and save energy: – mobile users store/access through wireless networks to

data on the Cloud (ex.; sharing photos)– intensive computation may be performed on the Cloud

(ex. Mobile healthcare, Mobile commerce, Mobile learning, Mobile gaming , etc.)

Page 43: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 43

Advantages of MCC/2

• Improve reliability: storing data or running computation on the Cloud improve the data and computation reliability because they are replicated in different Cloud nodes.

• Dynamic provisioning: is a flexible way to access data/services when desired

• Scalability: the deployment of mobile applications is scaled thanks to the scalability feature offered by the Cloud.

H.T. Dinh et al., “A survey of mobile Cloud computing”, Wirel. Comm. Mob. COmput. 2013; 13:1587-1611, copyright 2011 John Wiley & Sons, Ltd.

Page 44: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 44

Cloud as a Server

N. Fernando et al. / Future Generation Computer Systems 29 (2013) 84–106

A remote cloud server acting as service provider to mobile devices

Page 45: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 45

Important issues in Cloud Server model

• Low bandwidth: Unlike wired networks, the radio resource for wireless networks is scarce

• Service availability: unable to connect to the Cloud because of congestion, network failures, etc.

Page 46: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 46

Alternative solutions

• Cloudlet (introduced by [1])– is a trusted, resource-rich computer (multi-core or a

cluster of computers) that may access to the Internet, and accessible by nearby mobile devices.

– A concept supported by the NIST due to WIFI hotspots that are becoming powerful computers.

• Virtual Cloud:– Built up with peer-to-peer connected mobile devices so

that mobile devices are resource providers of a virtual cloud.

[1]: Satyanarayanan M., Bahl P., Caceres R., Davies N., « The case for VM-based cloudlets in mobile computing », IEEE Pervatsive Computing 2009, 8(4) : 14-23.

Page 47: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 47

Cloudlet Elements

S. Simanta, K. Ha, G. Lewis, Ed Morris, and M. Satyanarayanan, “A Reference Architecture for Mobile Code Offload in Hostile Environments”, http://www.cs.cmu.edu/~satya/docdir/simanta-mobicase2012.pdf

Page 48: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 48

Cloudlet architecture

N. Fernando et al. / Future Generation Computer Systems 29 (2013) 84–106

The Cloudlet is the service provider

Page 49: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 49

Virtual Cloud

N. Fernando et al. / Future Generation Computer Systems 29 (2013) 84–106

The mobile devices are service providers

Page 50: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 50

Security issues for MCC

Page 51: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 51

What we need to secure ?

• Security for mobile users

– Mobile devices are exposed to numerous security threats like malicious codes (e.g., virus)

• Securing data on Clouds

– Both mobile users and application developers must be careful regarding data/applications integrity and authentication.

Page 52: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 52

Security for mobile users

• Security for mobile applications.

– A simple solution: installing security software such as antivirus programs on mobile devices

– Cons: mobile devices are not resourceful like PCs.

– Trusted platforms can be the solution

•SE

•TEE and SE

•TPM and SE

Page 53: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] [email protected] 53

Cloud as a Server

� The use of a TSM (Trusted Service Management) within the Cloud.

� Externalize the secure processing on the Cloud (ex. Mobile payment on the Cloud)

� Security on Demand: allocate a SE from a Cloud of SE (CoSE)

Page 54: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 54

Cloudlet

� The Cloudlet is an offloading element

�A TPM can be used on a Cloudlet with a

TEE/SE on a mobile device

54

Page 55: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 55

MCC and IoT convergence

Page 56: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 56

Some scenarios

• The IoT involves objects such as sensors/actuators

– Healthcare (bio sensors)

– Home access (RFID tags)

– The mobile devices have also sensors

– Etc.

• In these applications, the mobile device can be used to process data collected from sensors or transfer data to a Cloud for processing

Page 57: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 57

Trends

• Smart devices (like mobile devices)

– Can be partly or completely virtualized on the Cloud

• The objects (like sensors)

– interact with resourceful platforms like mobile devices

– can be virtualized on a Cloud or a Cloudlet

Page 58: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 58

A developed scenario

• Implemented by two Master students (Amir Attar and Brian Kennedy) from Master of Secure Embedded and Mobile Systems of CNAM

[email protected] 58

Page 59: Mobile Cloud Computing - Webspaces - Accueil › ... › 2014-SSO-School-Mobile-Cloud-Compu… · Mobile Cloud Computing •Mobile Computing –Untrustedmobile devices with limited

[email protected] 59

Thanks

gfrdsdrfg