Change search
ReferencesLink to record
Permanent link

Direct link
Security as a Service in Cloud for Smartphones
KTH, School of Information and Communication Technology (ICT).
2011 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Smartphone usage has been continuously growing in recent times. Smartphones offer Personal Computer (PC) functionality to the end user, hence they are vulnerable to the same sorts of security threats as desktop computers. Cloud computing is a new computing paradigm and a breakthrough technology of recent times. Its growing popularity can be attributed to its ability to transform computing to a utility, scalability, and cost effectiveness. More and more services are predicted to be offered in the cloud in the near future.

Due to the resource constraints of smartphones, security services in the form of a cloud offering seems to be a natural fit (as the services could be provided in a very scalable form in the cloud while off-loading the smartphone).

This project proposes a generic architecture for providing security services in the cloud for smartphones. To enable the design of this architecture, it is essential to analyze and identify possible security solutions that could be provided as a cloud service to the smartphone. Security requirements of smartphones have been analysed considering the various infection channels for smartphones, attacks and threats encountered in a smartphone environment, smartphone usage scenarios and the smartphoneā€Ÿslimitations. Next, the security functions that must be implemented in the smartphone to overcome these threats are identified. Furthermore, a review of the existing architectures for mobile computing are presented and their security issues are examined.

A detailed study of the analysed results has been used to build the architecture for offering security services to smartphones in the cloud, targeted use case scenario being the usage in a corporate environment. The functions to be handled by each of the components of the architecture have been specified. Furthermore, the proposed architecture has been examined to prove its feasibility by analysing it in terms of its security aspects, scalability and flexibility. Additionally, experiments to understand the performance enhancement by offering security services in the cloud for smartphones have been performed. This has been done by measuring the resource consumption of anti-virus software in a smartphone and performing the same measurement in an emulated smartphone in the cloud.

Place, publisher, year, edition, pages
2011. , 74 p.
Trita-ICT-EX, 143
National Category
Engineering and Technology
URN: urn:nbn:se:kth:diva-47886OAI: diva2:456509
Subject / course
Communications Systems
Educational program
Master of Science -Security and Mobile Computing
Available from: 2011-11-15 Created: 2011-11-15 Last updated: 2011-11-15Bibliographically approved

Open Access in DiVA

fulltext(1854 kB)756 downloads
File information
File name FULLTEXT01.pdfFile size 1854 kBChecksum SHA-512
Type fulltextMimetype application/pdf

By organisation
School of Information and Communication Technology (ICT)
Engineering and Technology

Search outside of DiVA

GoogleGoogle Scholar
Total: 756 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 799 hits
ReferencesLink to record
Permanent link

Direct link