Privacy-preserving personal data operation on mobile cloud-Chances and challenges over advanced persistent threat

Man Ho Allen Au, Kaitai Alexander Liang, Joseph K. Liu, Rongxing Lu, Jianting Ning

    Research output: Contribution to journalArticleResearchpeer-review

    13 Citations (Scopus)

    Abstract

    Bring your own devices have become a new symbol of industrial and education institutional culture to date. A single individual can gain access to personal data anytime at anywhere of his/her workplace due to the advanced WiFi/5G network and cloud technology. The most convenient way for us to access to cloud data is to use personal smartphone. However, smartphone is somewhat vulnerable (because of its innate disadvantage, e.g., low security protection and limited computation resource) while encountering with malicious attacks in open network. Mobile users may be the victims of a recent new type of attack - advanced persistent threat (APT), since attackers may penetrate into different levels of cloud and mobile infrastructures to eavesdrop, steal and temper data. This survey paper introduces some security/privacy risks on mobile cloud in the view point of applied cryptography. Meanwhile, it provides some insights as possible solutions for the risks.

    Original languageEnglish
    Pages (from-to)337-349
    Number of pages12
    JournalFuture Generation Computer Systems
    Volume79
    Issue number1
    DOIs
    Publication statusPublished - Feb 2018

    Keywords

    • Applied cryptography
    • Mobile could
    • Privacy
    • Security

    Cite this

    Au, Man Ho Allen ; Liang, Kaitai Alexander ; Liu, Joseph K. ; Lu, Rongxing ; Ning, Jianting. / Privacy-preserving personal data operation on mobile cloud-Chances and challenges over advanced persistent threat. In: Future Generation Computer Systems. 2018 ; Vol. 79, No. 1. pp. 337-349.
    @article{7488b069550e46db9ed043b728a8ee39,
    title = "Privacy-preserving personal data operation on mobile cloud-Chances and challenges over advanced persistent threat",
    abstract = "Bring your own devices have become a new symbol of industrial and education institutional culture to date. A single individual can gain access to personal data anytime at anywhere of his/her workplace due to the advanced WiFi/5G network and cloud technology. The most convenient way for us to access to cloud data is to use personal smartphone. However, smartphone is somewhat vulnerable (because of its innate disadvantage, e.g., low security protection and limited computation resource) while encountering with malicious attacks in open network. Mobile users may be the victims of a recent new type of attack - advanced persistent threat (APT), since attackers may penetrate into different levels of cloud and mobile infrastructures to eavesdrop, steal and temper data. This survey paper introduces some security/privacy risks on mobile cloud in the view point of applied cryptography. Meanwhile, it provides some insights as possible solutions for the risks.",
    keywords = "Applied cryptography, Mobile could, Privacy, Security",
    author = "Au, {Man Ho Allen} and Liang, {Kaitai Alexander} and Liu, {Joseph K.} and Rongxing Lu and Jianting Ning",
    year = "2018",
    month = "2",
    doi = "10.1016/j.future.2017.06.021",
    language = "English",
    volume = "79",
    pages = "337--349",
    journal = "Future Generation Computer Systems",
    issn = "0167-739X",
    publisher = "Elsevier",
    number = "1",

    }

    Privacy-preserving personal data operation on mobile cloud-Chances and challenges over advanced persistent threat. / Au, Man Ho Allen; Liang, Kaitai Alexander; Liu, Joseph K.; Lu, Rongxing; Ning, Jianting.

    In: Future Generation Computer Systems, Vol. 79, No. 1, 02.2018, p. 337-349.

    Research output: Contribution to journalArticleResearchpeer-review

    TY - JOUR

    T1 - Privacy-preserving personal data operation on mobile cloud-Chances and challenges over advanced persistent threat

    AU - Au, Man Ho Allen

    AU - Liang, Kaitai Alexander

    AU - Liu, Joseph K.

    AU - Lu, Rongxing

    AU - Ning, Jianting

    PY - 2018/2

    Y1 - 2018/2

    N2 - Bring your own devices have become a new symbol of industrial and education institutional culture to date. A single individual can gain access to personal data anytime at anywhere of his/her workplace due to the advanced WiFi/5G network and cloud technology. The most convenient way for us to access to cloud data is to use personal smartphone. However, smartphone is somewhat vulnerable (because of its innate disadvantage, e.g., low security protection and limited computation resource) while encountering with malicious attacks in open network. Mobile users may be the victims of a recent new type of attack - advanced persistent threat (APT), since attackers may penetrate into different levels of cloud and mobile infrastructures to eavesdrop, steal and temper data. This survey paper introduces some security/privacy risks on mobile cloud in the view point of applied cryptography. Meanwhile, it provides some insights as possible solutions for the risks.

    AB - Bring your own devices have become a new symbol of industrial and education institutional culture to date. A single individual can gain access to personal data anytime at anywhere of his/her workplace due to the advanced WiFi/5G network and cloud technology. The most convenient way for us to access to cloud data is to use personal smartphone. However, smartphone is somewhat vulnerable (because of its innate disadvantage, e.g., low security protection and limited computation resource) while encountering with malicious attacks in open network. Mobile users may be the victims of a recent new type of attack - advanced persistent threat (APT), since attackers may penetrate into different levels of cloud and mobile infrastructures to eavesdrop, steal and temper data. This survey paper introduces some security/privacy risks on mobile cloud in the view point of applied cryptography. Meanwhile, it provides some insights as possible solutions for the risks.

    KW - Applied cryptography

    KW - Mobile could

    KW - Privacy

    KW - Security

    UR - http://www.scopus.com/inward/record.url?scp=85028613866&partnerID=8YFLogxK

    U2 - 10.1016/j.future.2017.06.021

    DO - 10.1016/j.future.2017.06.021

    M3 - Article

    VL - 79

    SP - 337

    EP - 349

    JO - Future Generation Computer Systems

    JF - Future Generation Computer Systems

    SN - 0167-739X

    IS - 1

    ER -