SECURE MOBILE CLOUD COMPUTATION OFFLOADING: NODE PRIVACY AND SECURITY

Similar documents
Mobile Assistance Using the Internet The MAUI Project

Mobile Offloading. Matti Kemppainen

ABSTRACT I. INTRODUCTION

Advanced Computer Networks. Wireless TCP

Framework for Offloading Android Applications using Cloud

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

A Review on Cloud Service Broker Policies

Scalable Middleware Environment for Agent-Based Internet Applications]

ECOS: Practical Mobile Application Offloading for Enterprises. Aaron Gember, Chris Dragga, Aditya Akella University of Wisconsin-Madison

Information Collection and Survey Infrastructure, APIs, and Software Tools for Agent-based Systems (An Overview of JADE)

Assistant Professor, School of Computer Applications,Career Point University,Kota, Rajasthan, India Id

Today s Topics. The Problem. MAUI: Making Smartphones Last Longer With Code Offload 10/10/2015. Battery fails to keep up. The Problem.

CHAPTER 7 JAVA AGENT DEVELOPMENT ENVIRONMENT

Mobile Cloud Computing: Issues, Challenges and Future Trends

A Firewall Architecture to Enhance Performance of Enterprise Network

SMART RESOURCE PROTOTYPE ENVIRONMENT V. 2.0 DELIVERABLE 2.3

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS

Kusum Lata, Sugandha Sharma

A Mediator based Dynamic Server Load Balancing Approach using SDN

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Network Security Policy

GRID SIMULATION FOR DYNAMIC LOAD BALANCING

Co-operative Scheduled Energy Aware Load-Balancing technique for an Efficient Computational Cloud

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

Thoughtful Encounters in Mobile Computation Offloading to Cloud through Research

POMAC: Properly Offloading Mobile Applications to Clouds

Jade: Java Agent DEvelopment Framework Overview

Performance Improvement of a Mobile Device by Selecting between Offloading and Local Computation

Scheduling with Task Duplication for Application Offloading

A Survey on Energy aware offloading Techniques for Mobile Cloud Computing

PCI DSS Compliance. White Paper Parallels Remote Application Server

Multi Packed Security Addressing Challenges in Cloud Computing

T Computer Networks Green ICT

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

Quadratic Route Factor Estimation Technique for Routing Attack Detection in Wireless Adhoc Networks

20 Fast Facts About Microsoft Windows Server 2012

IMEI Security Technical Design Principles

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

A Catalog of Architectural Tactics for Cyber-Foraging

AN EFFICIENT SERVICE ALLOCATION & VM MIGRATION IN CLOUD ENVIRONMENT

Towards Introducing Code Mobility on J2ME. Laurentiu Lucian Petrea and Dan Grigoras Computer Science Department UCC Cork, Ireland

FIPA specification and JADE. Tomáš Poch

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)

White Paper February McAfee Network Protection Solutions. Encrypted Threat Protection Network IPS for SSL Encrypted Traffic.

BIG-IP TMOS : Implementations. Version

Cloud-Security: Show-Stopper or Enabling Technology?

S. Indirakumari, A. Thilagavathy

Vortex Whitepaper. Intelligent Data Sharing for the Business-Critical Internet of Things. Version 1.1 June 2014 Angelo Corsaro Ph.D.

Link Security Considerations in the. Enterprise

International Journal of Advance Research in Computer Science and Management Studies

A Review Paper on Network Security Attacks and Defences

APPLICATION WHITELISTING: APPROACHES AND CHALLENGES

Security concern in computation offloading Technique

Announcements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris

FIPA-OS Feature Overview. Agent Technology Group Nortel Networks February 2000

An Enhanced Version of the MCACC to Augment the Computing Capabilities of Mobile Devices Using Cloud Computing

Quadratic Route Factor Estimation Technique for Routing Attack Detection in Wireless Adhoc Networks

FIREFLY ARCHITECTURE: CO-BROWSING AT SCALE FOR THE ENTERPRISE

Statistical based Approach for Packet Classification

GIS Deployment Guide. Introducing GIS

Mobile Agent. Summer Project Report. Indian Institute of Technology Kanpur Department of Computer Science and Engineering

ENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING

Centralization of Network using Openflow Protocol

AES and DES Using Secure and Dynamic Data Storage in Cloud

Operating System Virtualization for Ubiquitous Computing

Cisco ASA Next-Generation Firewall Services

Keywords Cloud Computing, Mobile Cloud Computing, Smart phones, offloading, android

Implementation of ATM security using IOT

(C) Global Journal of Engineering Science and Research Management

Title: PERSONAL TRAVEL MARKET: A REAL-LIFE APPLICATION OF THE FIPA STANDARDS

Virtual private networks

Energy Optimized Link Selection Algorithm for Mobile Cloud Computing

Triadic Formal Concept Analysis within Multi Agent Systems

Virtual Machine Placement in Cloud Computing

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

BYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY

JADE Web Service Integration Gateway (WSIG)

Load Balancing in Distributed System through Task Migration

Improving the Performance of the Peer to Peer Network by Introducing an Assortment of Methods

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

Survey on Mobile Cloud Computing : Applications, Techniques and

Jade: Java Agent DEvelopment Framework Overview

UnCovert: Evaluating thermal covert channels on Android systems. Pascal Wild

CSci530 Final Exam. Fall 2011

Chapter 3 Virtualization Model for Cloud Computing Environment

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

An Implementation of Fog Computing Attributes in an IoT Environment

Computer Life (CPL) ISSN: Simulation and Implementation of Cloud Computing Based on CloudSim

Diffusing Your Mobile Apps: Extending In-Network Function Virtualisation to Mobile Function Offloading

Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: 2-4 July, 2015

A Mobile Agent Platform for Supporting Ad-hoc Network Environment

Mobile Application Support

Detection of Vampire Attack in Wireless Adhoc

Special Topics: CSci 8980 Edge Computing Outsourcing III

HOMOMORPHIC HANDOVER AUTHENTICATION TECHNIQUE FOR MOBILE CLOUD COMPUTING

Double Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment

ABSTRACT I. INTRODUCTION II. PROPOSED FRAMEWORK

Transcription:

SECURE MOBILE CLOUD COMPUTATION OFFLOADING: NODE PRIVACY AND SECURITY David I. Fadaraliki 1, S. Rajendran 2 1M.Tech Student, I.T. Department, SRM University, Tamil Nadu, India 2Professor, I.T. Department, SRM University, Tamil Nadu, India ----------------------------------------------------------------------------***-------------------------------------------------------------------------- Abstract - Mobile agents provide better computation offloading from the mobile device to the cloud environment. They use https based Message Transfer Protocol (MTP) communication mechanism, from this premise it can be concluded that the communication channel is secure. However security concerns are raised at the processing nodes. Agents need to be protected at the host and from other malicious agents. In this paper, we present the design and implementation of a multi-agent framework on the Android platform, which is built on the Foundation for Intelligent Physical Agents (FIPA) specifications compliant Java Agent Development (JADE). In our design, the framework allows developers to develop applications with high CPU usage and battery consuming running on the framework. The framework then offloads the task to the cloud, bringing back the results to the device. Agents in the system are aware of resource constraints such as battery capacity, CPU usage, and dynamically adjust their behaviours accordingly to achieve a balance between the resources consumption and security expectations. Keywords: Mobile agents, offloading, communication channel, security 1. INTRODUCTION Android has gained popularity rapidly as a mobile device operating system in recent years. In this light, it is forming the basis of Mobile Cloud Computing (MCC). The rapid progress of MCC becomes a powerful trend in the development of IT technology as it increases enterprise mobility in commerce and industry fields. However android mobile devices are usually constrained by resource limitations such as: battery life, lower CPU frequency, limited memory and storage.battery usage can be improved by reducing the CPU usage [1]. A vibrant mechanism to reduce CPU usage in smartphones is to offload computation to remote locations. Previous works have been successfully conducted using various technologies, to offload computation capabilities to the cloud. Concerns were however raised on security measures to protect the data that have been offloaded. Mobile agents facility a more efficient way of offloading data from the device to the cloud; taking advantage of capabilities to reduce network latency and secure communication channel [2]. The mobile agents bundle the code, data and the instructions to execute to a remote location. In this research, we use java JADE mobile agents. JADE agents are built on FIPAspecification for standardisation and Agent Communication Language (ACL) for communication. The protocol they use is HTTP based MTP [3] which uses the Java Messaging Service (JMS) to deliver inter-platform communication between agent platforms. An analysis of various multi agent platforms is conducted to determine amongst other the advantages of using JADE. Because the data is processed in the cloud, security and privacy settings depend on the IT (information technology) management of the cloud providers. Loopholes in the cloud might result in a breach of privacy. Authenticity and integrity of each device connected to the cloud needs to be determined. Data, instructions and code is transmitted between nodes (service provider and mobile device) as plain code. Algorithms to encrypt the data may reduce overall performance as they are time consuming and require resources. Agents need to be protected from malicious hosts and/or from other agents. 2. BACKGROUND 2.1 Offloading Overview With the rise in demand of computational resources by mobile devices, various solutions for computation offloading to more powerful virtual machines on the cloud have been proposed by various scholars. An analysis of some of these techniques has been done. The background of our study is basing on the flaws of these techniques. A. MAUI Interoperability Issues MAUIprovides method level code offloading for Microsoft.NET applications [6]. This framework is a real time application, offload decisions are made at runtime. The weakness of MAUI is thatit is more dependent on the hardware architecture of the hosts. Mobile devices typically have different CPU instruction architecture than desktops and servers. Processes cannot be easily run on devices with different architectures. 2015, IRJET.NET- All Rights Reserved Page 222

B. CloneCloud Security Issues CloneCloud is a system that automatically transforms mobile applications to benefit from a cloud environment [7]. The system has a runtime application partition that works on the mobile applications to offload part of the code and executions from mobile devices onto device clones (application level virtual machines) operating in the cloud. One of the weakness of CloneCloud is security is assumed basing on the trusted virtual machines, all the device data is replicated in the cloud to ensure synchronous virtualization between the device and its clone. Encoded Message Envelope Payload Message Content Transport Information Message parameters Message content C. ThinkAir Security Issues ThinkAir provides on demand resource allocation and parallel execution on the cloud operating at method level [8]. They used 11 Android phones and device clones running on Amazon EC2. Mobile devices are used to store data that are personal data, and also for economic transactions. The weakness with ThinkAir is that, it assumes a trustworthy cloud server execution environment: there is hope that whenever data is offloaded to the cloud, the code and state of the data are not maliciously modified or stolen. The authors assume that the server faithfully loads and executes any code received from the devices. 2.2 Why use Mobile Agents The use of mobile agents in relation to this research is coupled with a number of security advantages which include the following; Mobile agents encapsulate data, instructions and protocols. Ability to move transparently across different hosts. Capable of adaptive learning and automation. Some intelligent agents are equipped with techniques to check self-integrity. The diagram (fig. 1) portrays the generic structure of an ACL message. The message envelop contains the addressing details (source and destination Agent ID-AID). It have the communicative intention, also called performative (accept-proposal, request, inform, propose etc.)[9]android code and data is transmitted between nodes bundled as the messages content. Execution is completed at the receiver terminal 2.3 Agent Development Toolkits Developing as well as usingmobile agents obliges the use of good underlying infrastructure [4]. Over the years it has been widely noted that scarcity of agent development tools has limited the exploitation of this beneficial technology. As technology evolves, nowadays a wide variety of tools are available, for developing robust infrastructure. According Nguyen & Dang [5] there are more than 100 toolkits in this category but at this juncture to the space constraints, we would be focusing on most appealing toolkits among the available choices. The toolkit of choice in this work is JADE, because it simplifies the implementation of multi-agent systems through a middle-ware that claims to comply with the FIPA specifications and through a set of tools that supports the debugging and deployment phase. [10] Recently, JADE had an android extension (Light Extension Agent Programming - LEAP) which allows agent programming on android environments. This extension limits the memory usage on the device. 2.4 Agent Security Mobile agents encounter threats which may be realised by different security mechanisms [14]. Below, the applicability of services and mechanisms with respect to mobile agents is evaluated. 2015, IRJET.NET- All Rights Reserved Page 223

A. Authentication An agent s code can be said to constitute fundamental properties of an agent instantiation. An agent s duties can be authenticated through a signature over the intrinsic properties of that agent. This will also authenticate the agent, if the agent name is included, and one trusts the authority. Alternatively, authentication of the agent can be done through a separate signature by another trusted authority. B. Access control Access control in an agent system shall protect the following access categories: Agent to agent platform, to ensure that only authorised agents can run on a host; Agent to host (via the agent platform), e.g. for access to information in the host; Host to agent, which can only be controlled if the agent platform consists of trusted hardware; Agent to agent, controlled by the agent platform. C. Integrity and confidentiality The proposed method for code migration on JADE-LEAP platform is to wrap the state of an agent and its code in the FIPA ACL message and send it to its destination [12]. While analysing this proposal two approaches can be considered: Simple mobility: an agent sends a request for migration in the form of a FIPA ACL message to its local container, which is than responsible for locating all of agents code and to transfer it along with agent s state to the destination container. Full mobility: an agent communicates directly with the destination container, thus creating a new instance of it and sending its internal state to the newly created instance. Execution commences at the cloud environment, results brought back to the android device without the knowledge of the user. The communicating agents are equipped with behaviours to detect the environmental changes and anomalies. Integrity checks on the input data to avoid tampering and adaptive procedure learning are some of the security features that the agents are equipped with to avoid malicious hosts and agents. Detection of tampering causes the agents stateful data migrate to another platform to continue the execution process. Integrity and confidentiality of information in the host systems must be preserved by proper access control, and a virtual machine that ensures that agents cannot circumvent the access control procedures.an agent may carry information that needs protection with respect to external.. 3. DESIGN AND IMPLEMENTATION The design methodology involves the development of the Java based Framework compatible with Android application (.apk) development. Android application developers have the option to evaluate the CPU usage of their applications. For high CPU consuming applications, they have the options of developing the applications on the framework to allow for computation offloading to the cloud environment. The framework is a generic agent environment which can be customized to meet each application s offloading requirements, essentially providing secure execution of the agents. Energy profiling is the analysis of the energy usage of applications [13]. This can be useful for aiming to measure resource consumption. An energy profiler is an application that can aid in this analysis. The profiler can be used to set the CPU usage threshold of an application to label it as a high energy consumer. Low consuming applications can execute locally, with high end applications migrating to the cloud. Fig. 2 Data Flow Diagram Proposed Structure 2015, IRJET.NET- All Rights Reserved Page 224

In this work, a high consuming test-bed application is developed and executed on two different test environments (Locally on the android device and offloaded to the cloud). The application running as the test-bed is the n-queens problem. N- Queensis a backtracking example that asks for the arrangements on n number of queens on an nxn chess board such that no queen attacks the other [11].CPU usage and execution times for the two instances is recorded. The control backtracking algorithm is tested for 30- Queens on a 30X 30 2-dimensional matrix simultaneously on the offloaded data and computation done locally on the android device. listens and accepts incoming connections from other containers and agents. The main container uses the container ID (IP address192.168.11.177) and port number 1099 as the listening connection. This means that the main container should be running at all instances, or should be started first before any other processes can be initiated. B. Once the main container is running, the android device is configured manually to connect to the platform. The user needs to know the main container ID and the port before initializing a connection request. A successful connection means the android agents can communicate with the agents residing on the platform. 3.1 Local/Traditional android Application Execution time for the local application is recorded as 730257milliseconds, which translates to 12minutes and 10 seconds to complete the task. However, it is not the execution time that is of paramount importance, but the CPU usage during the computation time. Fig. 4 Fig. 4 Agent to Platform Connection Fig. 3 Local Execution Android Interface 3.2 Agent Based Offloading A. On the cloud, a jdk enabled virtual machine runs the agent platform. The platform via the main C. Once the connection has been established data can be transmitted between the two nodes for processing. Agent Management System - provides the naming service; name, ensure uniqueness, create/destroy agents. Directory Facilitator - provides a Yellow Pages service of which an agent can find other agents providing the services it. The manager tasks the platform to compute the data that has been acquired. This is customizable depending on the application being developed 2015, IRJET.NET- All Rights Reserved Page 225

CPU Usage/WiFi Platform Container gent Manage ment System % CPU Usage 80 60 40 20 Directory Facilitator p Manager Agent 0 1 2 3 4 5 6 7 8 9 10 Time/sec Traditional Offloaded Chart 1 CPU Usage Local vs Offload B. When and when not to offload The process of computing the 30X30 N-Queens on the cloud and rendering data back on the android device takes 630526 milliseconds which translate to 10 minutes 30 seconds. Again the CPU usage time being recorded during the execution process. 4 RESULTS A. CPU Usage $ adb shell top -m 10 This is an Android Shell command to record the top CPU using android applications. Percentage usage is manually recorded for the initial 10 seconds of initialising the application. Comparison on the 30X30 matrix indicates that processing the data locally in the mobile device consumes more that activating agents that offload the data to the cloud. Offloading decisions are made in cases when the overall cost of executing local outweighs the cost of offloading for a single application module: if (cost_to_offload<cost_to_execute_locally) then offload else execute on device Where the cost_to_offload = time to send code and data to cloud + time to get response from cloud + time to execute in cloud. Energy saved by offloading data can be calculated by as follows; Energy Saved = P c P i P tr S: Speed of cloud to compute C instructions M: Speed of mobile to compute C instructions D: Data need to transmit B: Bandwidth of the wireless network P c: Energy cost/sec when the mobile phone is doing computing P i: Energy cost/sec when the mobile phone is idle. P tr: Energy cost/sec when the mobile is transmission the data. Noticeably, an increase in the bandwidth against the data to be processed reduces the overall energy saved, an indication that offloading is ideal for high processing 2015, IRJET.NET- All Rights Reserved Page 226

applications, and avoids communication activities (network traffic). 5 CONCLUSION AND FUTURE WORK Offloading is a viable solution for mobile cloud computing, unfortunately available solution has limitations in security and interoperability amongst other issues. The use of mobile agent powered offloading addresses the issues mentioned above. The primary objectives of mobile cloud computing is to improve battery life for mobile devices and also the processing capabilities of the devices. Our research has practically proved these features. The limitation of JADE is that it only works on JAVA based operating systems (android for smartphones). In future, offloading decisions need an algorithmic approach(i.e. when and when not to offload).the framework needs to dynamically set the threshold in relation to the real-time resource availability. CPU usage is allocated to running applications at any given time; the framework should utilize its allocation on offloading decisions resource allocation and parallel execution in cloud for mobile code offloading 9. Anton Naumenko, Programming Agents with JADE for Multi-Agent Systems, Industrial Ontologies Group 10. http://jade.tilab.com/ 11. S. Pothumani, Solving N Queen Problem Using Various Algorithms A Survey, International Journal of Advanced Research in Computer Science and Software Engineering, February 2013 ISSN: 2277 128X 12. S. Robles, J. Borell, and J. Ametller, "Agent Migration over FIPA ACL Messages," in 5th InternationalWorkshop, MATA 2003, October 8-10, Marrakech, Morocco, Nov. 2003, pp. 210-219. [Online].http://jade.tilab.com/papers/EXP/Sergi.pdf 13. Alexander Bakker, Comparing Energy Profilers for Android 14. KristianSchelderup, Jon Olnes, Mobile Agent Security Issues and Directions REFERENCES 1. Ari Cotler, Dean Shi, OnurSahin, AyseCoskun Power Aware Computing Hardware Management Software for Android Mobile Systems 2. Salah Jowan, Tony Mullins A Java based Mobile Agent Framework for Distributed Network Applications 3. Curry, E.Chambers, D., Lyons, G. A JMS Message Transport Protocol for the JADE platform 4. Aarti Singh, Dimple Juneja, A.K. Sharma, Agent Development Toolkits, International Journal of Advancements in Technology Vol 2, No 1 (January 2011) 5. Nguyen G., Dang T.T., Hluchy L., Laclavik M., BaloghZ.andBudinska I., Agent Platform Evaluation and Comparison, Published by Institute of informatics, Slovak Academy of Sciences, Pellucid 5FP IST -2001-34519, June 2002. 6. Eduardo Cuervo, ArunaBalasubramanian, Dae-ki Cho, Alec Wolman, Stefan Saroiu, Ranveer Chandra, ParamvirBahl, MAUI: Making Smartphones Last Longer with Code Offload 7. Byung-Gon Chun, SunghwanIhm, PetrosManiatis, Naik, Ashwin Patti, CloneCloud: Elastic Execution between Mobile Device and Cloud 8. SokolKosta, AndriusAucinas, Pan Hui, Richard Mortier, XinwenZhang, ThinkAir: Dynamic 2015, IRJET.NET- All Rights Reserved Page 227