JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN INFORMATION TECHNOLOGY MOBILE CLOUD COMPUTING SECURITY USING TRANSIENT AUTHENTICATION SYSTEM HARDAYAL SINGH SHEKHAWAT Associate Professor, Department of Information Technology, Govt. Engineering College Bikaner, Rajasthan. shekhawat.hardayal@gmail.com ABSTRACT: Mobile devices like smart phones, PDA, palmtops, tablets, with their advance features to access internet are becoming very common in public around the world. These devices can be used to access cloud computing resources using internet from any where wirelessly. Cloud computing is also becoming very popular among the people and organizations due to its various advantages like low cost, pay per use, and elastic scalability. Due to small size and simple usability of mobile devices they are vulnerable to theft and loss. Once these devices are authenticated to access cloud services using simple authentication system and stolen, they can be misused to access the critical data stored in the cloud. This paper developed a transient authentication system to meet this challenge. In transient authentication system a wearable token is used which is constantly attached to the mobile device using radio frequency and monitors the presence of the device (user). When user is away from the mobile device the token and device will loose the contact and the device will not allow any one to access the cloud services. Keywords: - Cloud computing, Mobile Devices, Security, Transient Authentication, Wearable Token. 1. INTRODUCTION Cloud computing system provides infrastructure, software, platform, storage and processing power etc. as a service on demand. The key characteristics of cloud computing includes reduced cost, scalability, security, elasticity, device independence, reduced maintenance and reduced manpower. The services provided by cloud computing becomes available to organizations of all size, educational institutes, governments and individuals which enables them to provide more scalable, resilient services to employees, partners and clients at lower cost and higher business agility [1]. Mobile cloud computing is the availability of cloud computing service in combination with mobile devices. Mobile cloud computing provides optimal cloud computing services for mobile users. In mobile cloud computing environment, mobile device does not need high configuration like CPU, memory, computational speed because all computation is done in the cloud [2]. 2. CLOUD COMPUTING Cloud computing environment offers IT functionality as service in a multi-tenant manner. Cloud services are provided by the cloud vendor and that can be used by the cloud consumer on a pay per use basis. The enabling technology includes virtualization, SaaS (Software as a service) enabled application platform (SEAP), Metering tools and technologies etc. These service exposed as industry standard interfaces like web services using Service Oriented Architecture SOA [3] or REST [4] services or any proprietary services. Cloud Computing Service Models The cloud computing services are basically classified in to three delivery models: Software as a service (SaaS), Platform as a service (PaaS) and Infrastructure as a service (IaaS). SaaS offers applications like customer relationship management (CRM), e-mail, instant messaging, and office productivity applications are offered as a service by the cloud provider. For example salesforce.com services or google office productivity application, or Microsoft exchange online etc [5]. PaaS produces platform by integrating OS, Middleware, application software, and development environment that is then delivered as a service by the cloud vendors. PaaS is provided to the clients using APIs, which is used by the user to interact with the platform [6]. IaaS made Servers, storage systems, switches, routers, and other systems are pooled and available to handle workloads that range from application components to highperformance computing applications [6]. Cloud Computing Deployment Models The cloud computing deployments are basically classified into four deployment models: Public Cloud, Private Cloud, Community Cloud and Hybrid Cloud. Public cloud is a standard cloud computing model, in ISSN: 0975 – 6698| NOV 11 TO OCT 12 | VOLUME – 02, ISSUE - 01 Page 126 JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN INFORMATION TECHNOLOGY which a cloud service provider creates and offers the resources. Public cloud computing services can be free or offered on pay per use basis [7]. Private clouds generally designed for an organization that needs more control over the data and applications stored in the cloud. Private cloud provides control to the owner organization over services, security of the data and applications [8]. Hybrid cloud is combination of both public and a private (or community) cloud which is best of both public and private cloud, client get benefit of both hosted delivery model and on premises highly secure model [9]. A community cloud is managed and used by a group of various organizations those have similar interest and goals, and have similar privacy, security, and regularity consideration. The sectors like public sector, health care, energy and media industry can use community cloud [10]. As mobile cloud computing involves cloud computing system and mobile devices, so mobile security can be divided in to tow categories mobile device security and cloud computing security [12]. Mobile Device Security: Mobile devices enable user to work when they are away from their desk, they allow users to work when they are travelling or in the public place. Unfortunately with the mobile advantage of these devices there is a threat of loss or stolen, due to their small size. Once mobile device goes into the hands of the hackers, they can be misused to access critical user information stored in the cloud. Security of user’s data stored in the cloud is the big issue in front of the cloud providers and users. Solution to device theft or lost problem includes configuration of mobile device, use of Wi-Fi Network, encryption and antivirus. 3. Mobile Cloud Computing Access to cloud computing resources or service using mobile devices is called as mobile cloud computing. Open Gardens blog defines Mobile Cloud Computing as "the availability of cloud computing services in a mobile ecosystem. This incorporates many elements, including consumer, enterprise, endto-end security, home gateways, and mobile broadband-enabled services. [11]" The data and application in cloud environment are stored in the cloud server and can be accessed using internet and mobile devices. Applications run on the remote cloud servers and users can access these applications using mobile devices. Figure 1 shows basic architecture of the mobile cloud computing. Configuration of Mobile Devices: The configuration of mobile device means user must use strong password authentication system or multi factor authentication system. User must always keep browser security system of their mobile device active and properly configured. Wi-Fi Networks: User must disable all Wi-Fi systems of the device like Bluetooth, infrared, or Wi-Fi when not in use. User should not connect to any unknown Wi-Fi network [13]. In addition to that a Bluetooth enabled device can be attached to the mobile device for authentication purpose. Encryption: The data travels between mobile device and cloud computing should be in encrypted form using some strong authentication. If intruder managed to access the data in transient, he/she should not be able to understand that data. Encryption plays very important role in data security. The Cloud Antivirus: Virus is a big threat in front of mobile device users. User must install a strong antivirus system into their devices and they should also regularly update the antivirus to protect the device from newly developed viruses. Internet Mobile Device Mobile Device Figure 1. Mobile Cloud Computing 3.1 Mobile Cloud Security Cloud Computing Security: Organizations and individuals are taking advantages of cloud computing by deploying their applications and storing their data in the cloud environment. With various advantages there are some security issues on using cloud computing for data storage, these challenges includes data security and, identity and access management. Data Security: Cloud computing service providers uses various geographically distributed and interconnected data enters to store customer’s data. Customer does not know where in the word their data ISSN: 0975 – 6698| NOV 11 TO OCT 12 | VOLUME – 02, ISSUE - 01 Page 127 JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN INFORMATION TECHNOLOGY is stored, which is a serious issue for cloud customers to adopt cloud computing system. The solution to this problem is encryption of the data. The data should be encrypted using some strong encryption method and key before storing it in to the cloud storage system. Similarly data in transit should also be in encrypted form for securing it from the intruders. Identity and Access Management: Secure user identity management plays very important role in access management system which is a complex process in the cloud computing system. Cloud’s identity management system must manage control points, dynamic composite and decommissioned machines, virtual device or service identities, and user identity to provide high security against unauthorized access to the user data [14]. 4. Authentication System Authentication is the process of verifying the identity of a user, which is performed by a system that user want to access. It is performed on the basis of credentials supplied by the user; authentication system compares these credentials with the credentials stored in the authentication server for that particular user. If mach in the credential found user is considered as authenticated user. Authentication is also performed by the cloud computing system when usr want to access it. which is valid for one attempt only. One time passwords are secure to reply attacks. So if password is stolen by intruder, it can not be reused. The disadvantage of this method is it is difficult to remember new password for each login attempt. 4.2. Transient Authentication System User does not authenticate mobile device frequently, device remains in authenticated mode until it is not revoked. If the device is lost or stolen when it is in authenticated mode it can be misused, which is a big threat with the light wait mobile devices. The threat of loss of device in authenticated mode and misused is resolved with transient authentication system [17]. Transient authentication is the system where a wearable token like IBM Linux wrist watch [18] is used in addition to the mobile computing device for authentication purpose. This token is connected with the mobile device wirelessly, using a technology which has a limited radio range like Bluetooth. Transient authentication system can also be used in cloud computing system for high security of the user data and information stored in the cloud. Mobile Device Token 4.1 Token Based Authentication Systems: Swipe Card: It is a plastic card with a magnetic strip containing encoded data that is read by passing the card through a device. These cards are generally used for electronic transections [15]. The main advantage of swipe card based authentication system is user does not need to remember user name, password and other credentials. The disadvantage of this authentication method is cards can be stolen and data on the card can be duplicated using some equipment [16]. USB Token: It is a small low cost device which contains user credentials and can be sued to for user identification and authentication purpose. It use USB port of the computer for read and write purpose so no addition reader device is needed. The disadvantage of USB token is it can be lost stolen or broken. Smart Card: It is a portable device which contains a CPU, I/O devices and memory that is accessed by the CPU of the card. It can process, store and control the data stored in the card. It can provide high level of security when used for authentication purpose. The disadvantage of smart card is it requires smart card reader which makes authentication system costly. One Time Password (OTP) Generators: These are the hardware devices used to generate password Figure 2. Device present in the range of token Token ? Figure 3. Device not present in the range of token In this model of transient authentication system the token provide authentication for mobile device, token works as authentication server and mobile device works as authentication client. As shown in figure 2 the wearable token continuously authenticates to the mobile device using short range, wirelessly. The communication between the device and token is in encrypted form, a session key is used for encrypting this communication. The token periodically (let us say every second) sense the device to ensure user’s presence. As shown in figure 3 when user is away from the device token ISSN: 0975 – 6698| NOV 11 TO OCT 12 | VOLUME – 02, ISSUE - 01 Page 128 JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN INFORMATION TECHNOLOGY goes out of range with the mobile device then the device will secure itself and will be disconnected from the cloud computing system. When user returns and mobile device comes in the range of the token, connection will be re established and user will be allowed to connect to the cloud. Authentication System Swipe Card Advantages Disadvantages No need to remember user credentials USB Token Uses USB port for read write purpose. No extra card reader is required. Provides high level of security for authentication Password can not be reused Card can be stolen or theft. Card can be duplicated. Card can be lost, stolen or broken. Smart Card One Time Password Generators Wearable Token (Transient Authentication) Needs additional wearable token. Card is costly. Can be stolen or lost. Difficult to remember new password every time. Card can be stolen or lost Provides strong authentication system. Wearable token is not vulnerable to theft or stolen. Table: Comparison of token based authentication systems 5. Conclusion Cloud computing is gaining popularity due its various advantages like security, elastic scalability, pay-asyou-go etc. Mobile devices have become very common among the people, so cloud users can use mobile devices to access cloud computing system. Mobile devices are vulnerable to theft or loss. The loss of the device can be the loss of critical data of the user. Transient authentication system solves the problem of data loss when device is lost. It uses a hardware token like wearable watch, which remains in continuous contact with the mobile devices using short range wireless connectivity. When these tow devices are in contact it shows the presence of the user and allow to access the cloud. If these devices looses the connection with token it shows the absence of the user, and device will secure the users data and will be disconnected from the cloud also. This way if device is lost or theft and it is away from the token (real user), no one will be allowed to access the device and cloud. Acknowledgment I am thankful to my supervisor Prof DP Sharma for his consistent support and review guidelines that helped me to complete this theoretical research paper. Bibliography [1] NEC Company, Ltd. and information and privacy commissioner, Ontario, (2010), Canada. “Modelling Cloud Computing Architecture without Compromising Privacy: A Privacy by Design Approach”. http://www.ipc.on.ca/images/resources/pbd-NECcloud.pdf [2] Dinh Thai Hoang, Dusit Niyato, and Ping Wang, (2012), Optimal Admission Control Policy for Mobile Cloud Computing Hotspot with Cloudlet. http://www.mobile.ecs.soton.ac.uk/home/conference/ wcnc2012/papers/p3177-dinh.pdf [3] The Open Group, (2012), The open group service oriented architecture. http://www.opengroup.org/subjectareas/soa [4] Russell Kay, (2007), Quick Study: Representational State Transfer (REST). http://www.computerworld.com/s/article/297424/Rep resentational_State_Transfer_REST_ [5] Ramkumar Dargha, (2009), Infosys – Cloud Computing: Key Consideration for Adoption. http://www.infosys.com/cloud/resourcecenter/Docum ents/cloud-computing.pdf [6] Metasoft, (2011), Cloud Computing: Truly Dependable and Highly Appriciable. http://www.metasoftsolutions.com/CloudComputing.h tml [7] Tech Target, (2009), Public Cloud. http://searchcloudcomputing.techtarget.com/definitio n/public-cloud [8] Jithesh Moothoor, Vasvi Bhatt, IBM, (2009), A Cloud Computing Solution for Universities: irtual Computing Lab. http://www2.gsu.edu/~matpxp/SwIG/talks/ws-vcl.pdf [9] GFI Software, (2010), ON-PREMISE VS. CLOUD-BASED SOLUTIONS. http://www.gfi.com/whitepapers/Hybrid_Technology. pdf [10] Dr. Matthias Henneberger, Dr. Achim Luhn, (2010), Community Clouds supporting business ecosystems with cloud computing SIEMENS. http://www.sourcingfocus.com/uploaded/documents/S iemens_Community_Clouds_Whitepaper.pdf [11] Ajit, Open Gardens, (2010), Mobile Cloud Computing: Issues and Risks from a Security Privacy Perspective. http://www.opengardensblog.futuretext.com/archives/ 2010/03/mobile_cloud_co_2.html [12]Soeung-Kon (Victor) Ko, JungHoonLee, Sung Woo Kim, (2012), Mobile Cloud Computing ISSN: 0975 – 6698| NOV 11 TO OCT 12 | VOLUME – 02, ISSUE - 01 Page 129 JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN INFORMATION TECHNOLOGY Security Considerations. SERSE: Journal of security engineering, Volume 9, No.2, ISSN: 17387531 [13] Valerie Vogel, Theresa Semmens, (2013), Mobile Device Security: Ten Steps to Secure Your Mobile Device. https://wiki.internet2.edu/confluence/display/itsg2/M obile+Device+Security [14] Anu Gopalakrishnan, (2009), Cloud Computing Identity Management. SETLabs Briefings VOL7. http://www.infosys.com/infosyslabs/publications/setla bs-briefings/Documents/cloud-computingidentitymanagement.pdf [15] The Free Library, (), Swipe Card. http://www.thefreedictionary.com/swipe+card [16] Seth Thigpen, (), Authentication Methods Used for Banking. http://www.infosecwriters.com/text_resources/pdf/Au thentication_Methods_For_Banking.pdf [17]Rania Abdelhameed, Sabira Khatun, Borhanuddin Mohd Ali and Abdul Rahman Ramli. (2005), Application of Cell-phonein Laptop Security, Journal of Applied Sciences 5 (2): 215-219, 2005, ISSN 1812-5654. [18] Anthony J. Nicholson, Mark D. Corner, and Brian D. Noble, (2006), Mobile Device Security Using Transient Authentication, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 11. ISSN: 0975 – 6698| NOV 11 TO OCT 12 | VOLUME – 02, ISSUE - 01 Page 130