Por favor, use este identificador para citar o enlazar a este item: http://hdl.handle.net/10261/197387
COMPARTIR / EXPORTAR:
logo share SHARE logo core CORE BASE
Visualizar otros formatos: MARC | Dublin Core | RDF | ORE | MODS | METS | DIDL | DATACITE

Invitar a revisión por pares abierta
Título

Towards mobile cloud computing with single sign-on access

AutorLordan, Francesc; Jensen, Jens G.; Badia, Rosa M.
Palabras claveDistributed computing
High performance computing
Mobile computing
Authentication
Data security
Fecha de publicación1-dic-2018
EditorSpringer Nature
CitaciónJournal of Grid Computing 16: 627–646 (2018)
ResumenThe low computing power of mobile devices impedes the development of mobile applications with a heavy computing load. Mobile Cloud Computing (MCC) has emerged as the solution to this by connecting mobile devices with the “infinite” computing power of the Cloud. As mobile devices typically communicate over untrusted networks, it becomes necessary to secure the communications to avoid privacy-sensitive data breaches. This paper presents work on implementing MCC applications with secure communications. For that purpose, we built on COMPSs-Mobile, a redesigned implementation of the COMP Superscalar (COMPSs) framework aiming to MCC platorms. COMPSs-Mobile automatically exploits the parallelism inherent in an application and orchestrates its execution on loosely-coupled distributed environment. To avoid a vendor lock-in, this extension leverages on the Generic Security Services Application Program Interface (GSSAPI) (RFC2743) as a generic way to access security services to provide communications with authentication, secrecy and integrity. Besides, GSSAPI allows applications to take profit of more advanced features, such as Federated Identity or Single Sign-On, which the underlying security framework could provide. To validate the practicality of the proposal, we use Kerberos as the security services provider to implement SSO; however, applications do not authenticate themselves and require users to obtain and place the credentials beforehand. To evaluate the performance, we conducted some tests running an application on a smartphone offloading tasks to a private cloud. Our results show that the overhead of securing the communications is acceptable.
Versión del editorhttp://dx.doi.org/10.1007/s10723-017-9413-3
URIhttp://hdl.handle.net/10261/197387
DOI10.1007/s10723-017-9413-3
ISSN1570-7873
E-ISSN1572-9184
Aparece en las colecciones: (IIIA) Artículos




Ficheros en este ítem:
Fichero Descripción Tamaño Formato
accesoRestringido.pdf15,35 kBAdobe PDFVista previa
Visualizar/Abrir
Mostrar el registro completo

CORE Recommender

SCOPUSTM   
Citations

4
checked on 25-abr-2024

WEB OF SCIENCETM
Citations

3
checked on 25-feb-2024

Page view(s)

172
checked on 27-abr-2024

Download(s)

16
checked on 27-abr-2024

Google ScholarTM

Check

Altmetric

Altmetric


NOTA: Los ítems de Digital.CSIC están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.