La sécurité et la confiance pour le Cloud computing mobile

Doctoral thesis English OPEN
Le Vinh , Thinh (2017)
  • Publisher: HAL CCSD
  • Subject: Mobile systems | Fuzzy logic | Trusted platforms | [ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR] | [ INFO.INFO-WB ] Computer Science [cs]/Web | Systèmes de confiance | Security | Plates-Formes mobiles | Efficacité énergétique | Energy efficiency | Logique floue | Cloud computing | Sécurité

As living in the cyber era, we admit that a dozen of new technologies have been born every day with the promises that making a human life be more comfortable, convenient and safe. In the forest of new technologies, mobile computing is raise as an essential part of human life. Normally, mobile devices have become the best companions in daily activities. They have served us from the simple activities like entertainment to the complicated one as business operations. As playing the important roles, mobile devices deserve to work in the environment which they can trust for serving us better. In this thesis, we investigate the way to secure mobile devices from the primitive security level (Trusted Platforms) to the sophisticated one (bio-inspired intelligence). More precisely, after addressing the challenges of mobile cloud computing (MCC), we have studied the real-case of mobile cloud computing, in terms of energy efficiency and performance, as well as proposed a demonstration of particular MCC model, called Droplock system. Moreover, taking advantages of trusted platform module functionality, we introduced a novel schema of remote attestation to secure mobile devices in the context of Mobile-Cloud based solution. To enhance the security level, we used fuzzy logic combining with ant colony system to assess the trust and reputation for securing another mobile cloud computing model based on the cloudlet notion.; Nous vivons aujourd’hui dans l'ère cybernétique où de nouvelles technologies naissent chaque jour avec la promesse de rendre la vie humaine plus confortable, pratique et sûre. Parmi ces nouvelles technologies, l'informatique mobile se développe en influençant la vie de l’utilisateur. En effet, les plates-formes mobiles (smartphone, tablette) sont devenues les meilleurs compagnons de l’utilisateur pour mener à bien ses activités quotidiennes, comme les activités commerciales ou de divertissement. En jouant ces rôles importants, les plates-formes mobiles doivent opérer dans des environnements de confiance. Dans cette thèse, nous étudions la sécurité des plates-formes mobiles en passant d’un niveau de sécurité primitif qui s’appuie sur les plates-formes de confiance, à un niveau plus sophistiqué qui se base sur de l’intelligence bio-inspirée. Plus précisément, après avoir abordé les défis du cloud computing mobile (MCC), nous développons une étude de cas appelée Droplock pour le cloud mobile et nous étudions son efficacité énergétique et ses performances pour illustrer le modèle MCC. En outre, en s’appuyant sur les plates-formes de confiance (comme les TPM), nous avons introduit un nouveau schéma d'attestation à distance pour sécuriser les plates-formes mobiles dans le contexte du cloud mobile. Pour améliorer le niveau de sécurité et être adaptatif au contexte, nous avons utilisé de la logique floue combinant un système de colonies de fourmis pour évaluer la confiance et la réputation du cloud mobile basé sur la notion de cloudlets.
  • References (82)
    82 references, page 1 of 9

    [3] Samia Bouzefrane, Julien Cordry, Hervé Meunier, and Pierre Paradinas. Evaluation of Java Card Performance. In Smart Card Research and Advanced Applications, Lecture Notes in Computer Science, pages 228-240. Springer, Berlin, Heidelberg, September 2008. ISBN 978-3-540-85892-8 978-3-540-85893-5. doi: 10.1007/978-3-540-85893-5_ 17.

    [4] Damien Sauveron. Multiapplication smart card: Towards an open smart card? Information Security Technical Report, 14(2):70-78, May 2009. ISSN 1363-4127. doi: 10.1016/j.istr.2009.06.007.

    [5] HUIJUN WU. MOBILE CLOUD COMPUTING. MORGAN KAUFMANN PUBLISHER, S.l., 2017. ISBN 0-12-809641-1 978-0-12-809641-3. OCLC: 974027147.

    [6] Jiehan Zhou, Teemu Leppanen, Erkki Harjula, Mika Ylianttila, Timo Ojala, Chen Yu, and Hai Jin. CloudThings: A common architecture for integrating the Internet of Things with Cloud Computing. Proceedings of the 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD).

    [7] U. A. Kashif, Z. A. Memon, A. R. Balouch, and J. A. Chandio. Distributed trust protocol for IaaS Cloud Computing. In 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST), pages 275-279, January 2015. doi: 10.1109/IBCAST.2015.7058516.

    [8] Nuno Santos, Himanshu Raj, Stefan Saroiu, and Alec Wolman. Using ARM trustzone to build a trusted language runtime for mobile applications. pages 67-80. ACM Press, 2014. ISBN 978-1-4503-2305-5. doi: 10.1145/2541940.2541949.

    [9] Will Arthur and David Challener. A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security. Apress, 2015.

    [10] Chen Chen, Himanshu Raj, Stefan Saroiu, and Alec Wolman. cTPM: A cloud TPM for cross-device trusted applications. In Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation, pages 187-201. USENIX Association, 2014.

    [11] Farzad Sabahi. Cloud Computing Reliability, Availability and Serviceability (RAS): Issues and Challenges. International Journal on Advances in ICT for Emerging Regions (ICTer), 4(2), 2012.

    [13] Thinh Le Vinh, Reddy Pallavali, Fatiha Houacine, and Samia Bouzefrane. Energy Eficiency in Mobile Cloud Computing Architectures. pages 326-331. IEEE, August 2016. ISBN 978-1-5090-3946-3. doi: 10.1109/W-FiCloud.2016.72.

  • Metrics
    No metrics available
Share - Bookmark