Privacy-preserving personal data operation on mobile cloud—Chances and challenges over advanced persistent threat

Man Ho Allen Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu, Jianting Ning

Research output: Journal article publicationJournal articleAcademic researchpeer-review

30 Citations (Scopus)

Abstract

Bring your own devices have become a new symbol of industrial and education institutional culture to date. A single individual can gain access to personal data anytime at anywhere of his/her workplace due to the advanced WiFi/5G network and cloud technology. The most convenient way for us to access to cloud data is to use personal smartphone. However, smartphone is somewhat vulnerable (because of its innate disadvantage, e.g., low security protection and limited computation resource) while encountering with malicious attacks in open network. Mobile users may be the victims of a recent new type of attack - advanced persistent threat (APT), since attackers may penetrate into different levels of cloud and mobile infrastructures to eavesdrop, steal and temper data. This survey paper introduces some security/privacy risks on mobile cloud in the view point of applied cryptography. Meanwhile, it provides some insights as possible solutions for the risks.
Original languageEnglish
Pages (from-to)337-349
Number of pages13
JournalFuture Generation Computer Systems
Volume79
DOIs
Publication statusPublished - 1 Feb 2018

Keywords

  • Applied cryptography
  • Mobile could
  • Privacy
  • Security

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Privacy-preserving personal data operation on mobile cloud—Chances and challenges over advanced persistent threat'. Together they form a unique fingerprint.

Cite this