Privacy Protection Techniques in Mobile Cloud Computing

2017 ◽  
pp. 179-200
2017 ◽  
Vol 379 ◽  
pp. 42-61 ◽  
Author(s):  
Yinghui Zhang ◽  
Xiaofeng Chen ◽  
Jin Li ◽  
Duncan S. Wong ◽  
Hui Li ◽  
...  

Author(s):  
Gianmarco Baldini ◽  
Pasquale Stirparo

Information systems and wireless communications are becoming increasingly present in the everyday life of citizens both from a personal and business point of view. A recent development in this context is Mobile Cloud Computing (MCC), which is the combination of Cloud Computing and pervasive mobile networks. Ensuring the preservation of privacy can be difficult in MCC. Therefore, this chapter provides an overview of the main challenges in ensuring privacy in MCC and surveys the most significant contributions from the research community. The second objective of the chapter is to introduce and describe a new framework for privacy protection based on the concepts of Virtual Object (VO) and Composite Virtual Object (CVO), where data are encapsulated and protected using a sticky policy approach and a role-based access model. The proposed iCore framework is compared to the privacy challenges described in the first objective.


2015 ◽  
pp. 517-542
Author(s):  
Gianmarco Baldini ◽  
Pasquale Stirparo

Information systems and wireless communications are becoming increasingly present in the everyday life of citizens both from a personal and business point of view. A recent development in this context is Mobile Cloud Computing (MCC), which is the combination of Cloud Computing and pervasive mobile networks. Ensuring the preservation of privacy can be difficult in MCC. Therefore, this chapter provides an overview of the main challenges in ensuring privacy in MCC and surveys the most significant contributions from the research community. The second objective of the chapter is to introduce and describe a new framework for privacy protection based on the concepts of Virtual Object (VO) and Composite Virtual Object (CVO), where data are encapsulated and protected using a sticky policy approach and a role-based access model. The proposed iCore framework is compared to the privacy challenges described in the first objective.


Sign in / Sign up

Export Citation Format

Share Document