TY - GEN
T1 - A security framework of group location-based mobile applications in cloud computing
AU - Chen, Yu Jia
AU - Wang, Li-Chun
PY - 2011/11/7
Y1 - 2011/11/7
N2 - In this paper, we present a secure framework when the location information of mobile terminals is utilized in a cloud computing environment. Because cloud computing provides powerful storage capability and scalability, many application providers start migrating the data stored in their original databases to outsourced databases (ODB), such as AMAZON SIMPLEDB. However, because of the multiple tenants and multiple replicas of data in the cloud databases, the security issues of location-based services (LBS) become more serious in cloud computing. In this paper, we propose a security model for LBS using ODB and demonstrate how we can use distributed storage and international mobile subscriber identity (IMSI) as user identification to secure the location data. Enhanced privacy and authentication mechanisms on top of the suggested security framework are also proposed, which achieve significant improvements in privacy, authentication, and continuity when providing LBS in cloud computing. Simulation results show that network coding scheme has better performance than hash function scheme.
AB - In this paper, we present a secure framework when the location information of mobile terminals is utilized in a cloud computing environment. Because cloud computing provides powerful storage capability and scalability, many application providers start migrating the data stored in their original databases to outsourced databases (ODB), such as AMAZON SIMPLEDB. However, because of the multiple tenants and multiple replicas of data in the cloud databases, the security issues of location-based services (LBS) become more serious in cloud computing. In this paper, we propose a security model for LBS using ODB and demonstrate how we can use distributed storage and international mobile subscriber identity (IMSI) as user identification to secure the location data. Enhanced privacy and authentication mechanisms on top of the suggested security framework are also proposed, which achieve significant improvements in privacy, authentication, and continuity when providing LBS in cloud computing. Simulation results show that network coding scheme has better performance than hash function scheme.
KW - Cloud computing
KW - Database as a service
KW - LBS
KW - Location privacy
UR - http://www.scopus.com/inward/record.url?scp=80155167231&partnerID=8YFLogxK
U2 - 10.1109/ICPPW.2011.6
DO - 10.1109/ICPPW.2011.6
M3 - Conference contribution
AN - SCOPUS:80155167231
SN - 9780769545110
T3 - Proceedings of the International Conference on Parallel Processing Workshops
SP - 184
EP - 190
BT - Proceedings - 2011 International Conference on Parallel Processing Workshops, ICPPW 2011
Y2 - 13 September 2011 through 16 September 2011
ER -