Theoretical Considerations: Inferring and Enforcing Use Patterns for Mobile Cloud Assurance
Gul Agha
Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL, USA
Search for more papers by this authorMinas Charalambides
Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL, USA
Search for more papers by this authorKirill Mechitov
Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL, USA
Search for more papers by this authorKarl Palmskog
Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL, USA
Search for more papers by this authorAtul Sandur
Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL, USA
Search for more papers by this authorReza Shiftehfar
Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL, USA
Search for more papers by this authorGul Agha
Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL, USA
Search for more papers by this authorMinas Charalambides
Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL, USA
Search for more papers by this authorKirill Mechitov
Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL, USA
Search for more papers by this authorKarl Palmskog
Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL, USA
Search for more papers by this authorAtul Sandur
Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL, USA
Search for more papers by this authorReza Shiftehfar
Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL, USA
Search for more papers by this authorRoy H. Campbell
Search for more papers by this authorCharles A. Kamhoua
Search for more papers by this authorKevin A. Kwiat
Search for more papers by this authorAbstract
The mobile cloud is the integration of smart sensors, mobile devices, and cloud computers in a well-connected ecosystem. Such integration can improve the efficiency of services. However, such integration also leads to security and trust issues. For example, the security of cloud spaces has sometimes been breached through accessing of peripheral devices, such as HVAC system. This chapter will show how mobile cloud security and trust can be improved while maintaining the benefits of efficiency by supporting fine-grained mobility. Specifically, we discuss an actor-based programming framework that can facilitate the development of mobile cloud systems in a way that improves efficiency while enforcing security and privacy. There are two key ideas here. First, by supporting fine-grained units of computation (actors), a mobile cloud can be agile in migrating components. It does so in response to a system context (including dynamic variables such as available bandwidth, processing power, and energy) while respecting constraints on information containment boundaries. Second, by specifying constraints on interaction patterns, information flow between actors can be observed and suspicious activity flagged or prevented. We introduce the concepts and discuss their realization in notations and prototypes. Finally, we will discuss open research issues such as inference of interaction patterns.
References
- Kumar, K., Liu, J., Lu, Y.-H., and Bhargava, B. (2013) A survey of computation offloading for mobile systems. Mobile Networks and Applications, 18 (1), 129–140.
- Agha, G. and Hewitt, C. (1985) Concurrent programming using actors: exploiting large-scale parallelism, in Foundations of Software Technology and Theoretical Computer Science, FSTTCS 1985 (ed. S.N. Maheshwari), Lecture Notes in Computer Science, vol. 206, Springer, Berlin, pp. 19–41.
- Frølund, S. (1996) Coordinating Distributed Objects: An Actor-Based Approach to Synchronization, MIT Press.
- Charalambides, M., Dinges, P., and Agha, G. (2016) Parameterized, concurrent session types for asynchronous multi-actor interactions. Science of Computer Programming, 115 (C), 100–126.
- Honda, K., Vasconcelos, V.T., and Kubo, M. (1998) Language primitives and type discipline for structured communication-based programming, in Proceedings of the 7th European Symposium on Programming: Programming Languages and Systems (ESOP) (ed. C. Hankin), Lecture Notes in Computer Science, vol. 1381, Springer, Berlin pp. 122–138.
- Rahman, M., Gao, J., and Tsai, W.-T. (2013) Energy saving in mobile cloud computing, in Proceedings of the IEEE International Conference on Cloud Engineering (IC2E), pp. 285–291.
- Satyanarayanan, M., Bahl, P., Caceres, R., and Davies, N. (2009) The case for VM-based cloudlets in mobile computing. IEEE Pervasive Computing, 8 (4), 14–23.
- Imai, S., Chestna, T., and Varela, C.A. (2012) Elastic scalable cloud computing using application-level migration, in Proceedings of the IEEE 5th International Conference on Utility and Cloud Computing, pp. 91–98.
- Cuervo, E., Balasubramanian, A., Cho, D.-k., Wolman, A., Saroiu, S., Chandra, R., and Bahl, P. (2010) MAUI: making smartphones last longer with code offload, in Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services, pp. 49–62.
- Chun, B.-G., Ihm, S., Maniatis, P., Naik, M., and Patti, A. (2011) CloneCloud: elastic execution between mobile device and cloud, in Proceedings of the 6th European Conference on Computer Systems, pp. 301–314.
- Kosta, S., Aucinas, A., Hui, P., Mortier, R., and Zhang, X. (2012) ThinkAir: dynamic resource allocation and parallel execution in the cloud for mobile code offloading, in Proceedings of the IEEE INFOCOM, pp. 945–953.
- Shifteh Far, S. (2015) A flexible fine-grained adaptive framework for parallel mobile hybrid cloud applications, Ph.D. dissertation, University of Illinois at Urbana-Champaign.
- Varela, C.A. and Agha, G. (1999) A hierarchical model for coordination of concurrent activities, in Proceedings of the 3rd International Conference on Coordination Languages and Models: COORDINATION ‘99 (eds. P. Ciancarini and A.L. Wolf), Lecture Notes in Computer Science, vol. 1594, Springer, Berlin, pp. 166–182.
- Astley, M., and Agha, G.A. (1998) Customization and composition of distributed objects: middleware abstractions for policy management, in Proceedings of the 6th ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE-6), pp. 1–9.
- Sturman, D.C. (1996) Modular specification of interaction policies in distributed computing, Ph.D. dissertation, University of Illinois at Urbana-Champaign.
- Meseguer, J. and Talcott, C. (2002) Semantic models for distributed object reflection, in 16th European Conference on Object-Oriented Programming (ECOOP 2002) (ed. B. Magnusson), Lecture Notes in Computer Science, vol. 2374, Springer, Berlin pp. 1–36.
- Venkatasubramanian, N. and Talcott, C. (1995) Reasoning about meta level activities in open distributed systems, in Proceedings of the 14th Annual ACM Symposium on Principles, PODC, pp. 144–152.
- Ren, S., Yu, Y., Chen, N., Marth, K., Poirot, P.-E., and Shen, L. (2006) Actors, roles and coordinators: a coordination model for open distributed and embedded systems, in Proceedings of the 8th International Conference on Coordination Models and Languages: COORDINATION 2006, Lecture Notes in Computer Science, vol. 4038, Springer, pp. 247–265.
- Milner, R., Parrow, J., and Walker, D. (1992) A calculus of mobile processes, I. Information and Computation, 100 (1), 1–40.
- Honda, K. (1993) Types for dyadic interaction, in Proceedings of the 4th International Conference Concurrency Theory (CONCUR) (ed. E. Best), Lecture Notes in Computer Science, vol. 715, Springer, Berlin, pp. 509–523.
- W3C: The Web Services Choreography Description Language, Version 1.0, 2005. Available at http://www.w3.org/TR/ws-cdl-10/.
- Carbone, M., Honda, K., and Yoshida, N. (2007) Structured communication-centred programming for web services, in Proceedings of the 16th European Symposium on Programming (ESOP) (ed. R. De Nicola), Lecture Notes in Computer Science, vol. 4421, Springer, pp. 2–17.
- Honda, K., Yoshida, N., and Carbone, M. (2008) Multiparty asynchronous session types, in Proceedings of the 35th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), pp. 273–284.
- Gay, S. and Hole, M. (2005) Subtyping for session types in the pi calculus. Acta Informatica, 42 (2–3), 191–225.
- Gay, S.J. and Vasconcelos, V.T. (2010) Linear type theory for asynchronous session types. Journal of Functional Programming, 20 (1), 19–50.
- Yoshida, N., Deniélou, P.-M., Bejleri, A., and Hu, R. (2010) Parameterised multiparty session types, in International Conference on Foundations of Software Science and Computational Structures (FoSSaCS) (ed. L. Ong), Lecture Notes in Computer Science, vol. 6014, Springer, Berlin, pp. 128–145.
- Castagna, G., Dezani-Ciancaglini, M., and Padovani, L. (2011) On global types and multi-party sessions, in Formal Techniques for Distributed Systems (eds. R. Bruni and J. Dingel), Lecture Notes in Computer Science, vol. 6722, Springer, Berlin, pp. 1–28.
- Charalambides, M., Dinges, P., and Agha, G. (2012) Parameterized concurrent multi-party session types, in Proceedings of the 11th International Workshop on Foundations of Coordination Languages and Self Adaptation (FOCLASA), Newcastle, UK, Sep. 8, 2012, Electronic Proceedings in Theoretical Computer Science (EPTCS), vol. 91, pp. 16–30. Available at http://eptcs.web.cse.unsw.edu.au/content.cgi?FOCLASA12.
- Bocchi, L., Chen, T.-C., Demangeon, R., Honda, K., and Yoshida, N. (2017) Monitoring networks through multiparty session types, in Theoretical Computer Science, vol. 669, pp. 33–58.
- Neykova, R., Bocchi, L., and Yoshida, N. (2017) Timed runtime monitoring for multiparty conversations. Formal Aspects of Computing, 29 (5), 877–910.
- Honda, K., Mukhamedov, A., Brown, G., Chen, T.-C., and Yoshida, N. (2011) Scribbling interactions with a formal foundation, in Proceedings of the Distributed Computing and Internet Technology (ICDCIT 2011) (eds. R. Natarajan and A. Ojo), Lecture Notes in Computer Science, vol. 6536, Springer, Berlin, pp. 55–75.
- Noble, B.D., Satyanarayanan, M., Narayanan, D., Tilton, J.E., Flinn, J., and Walker, K.R. (1997) Agile application-aware adaptation for mobility. ACM SIGOPS Operating Systems Review, 31 (5), 276–287.
- Moinzadeh, P. (2013) I-AdMiN: a framework for deriving adaptive service configuration in wireless smart sensor networks, Ph.D. dissertation, University of Illinois at Urbana-Champaign.
- Oliner, A.J., Iyer, A.P., Stoica, I., Lagerspetz, E., and Tarkoma, S. (2013) Carat: collaborative energy diagnosis for mobile devices, in Proceedings of the 11th ACM Conf. Embedded Networked Sensor Systems, Article No. 10.
- Subashini, S. and Kavitha, V. (2011) A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34 (1), 1–11.
- Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., and Molina, J. (2009) Controlling data in the cloud: outsourcing computation without outsourcing control, in Proceedings of the ACM Workshop on Cloud Computing Security, pp. 85–90.
- Grewal, R.K. and Pateriya, P.K. (2013) A rule-based approach for effective resource provisioning in hybrid cloud environment, in New Paradigms in Internet Computing (eds. S. Patnaik et al.), Advances in Intelligent Systems and Computing, vol. 203, Springer, Berlin, pp. 41–57.
- Kumar, K. and Lu, Y.-H. (2010) Cloud computing for mobile users: can offloading computation save energy? Computer, 43 (4), 51–56.
- Zhang, X., Schiffman, J., Gibbs, S., Kunjithapatham, A., and Jeong, S. (2009) Securing elastic applications on mobile devices for cloud computing, in Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW’09), Chicago, IL, pp. 127–134.
- Chow, R., Jakobsson, M., Masuoka, R., Molina, J., Niu, Y., Shi, E., and Song, Z. (2010) Authentication in the clouds: a framework and its application to mobile users, in Proceedings of the ACM Cloud Computing Security Workshop (CCSW'10), Chicago, IL, pp. 1–6.
- Huang, D., Zhang, X., Kang, M., and Luo, J. (2010) MobiCloud: building secure cloud framework for mobile computing and communication, in Proceedings of the 5th IEEE International Symposium on Service Oriented System Engineering, pp. 27–34.
- Khan, A.N., Kiah, M.L.M., Khan, S.U., and Madani, S.A. (2013) Towards secure mobile cloud computing: a survey. Future Generation Computer Systems, 29 (5), 1278–1299.
- Yu, X. and Wen, Q. (2012) Design of security solution to mobile cloud storage, in Knowledge Discovery and Data Mining (ed. H. Tan), Advances in Intelligent and Soft Computing, vol. 135, Springer, Berlin, pp. 255–263.
- Jansen, W. and Grance, T. (2011) Guidelines on Security and Privacy in Public Cloud Computing. National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Special Publication 800-144, Computer Security Division, Information Technology Laboratory, NIST, Gaithersburg, MD.
-
Damiani, E.,
De Capitani di Vimercati, S.,
Paraboschi, S., and
Samarati, P.
(2002)
A fine-grained access control system for XML documents.
ACM Transactions on Information and System Security,
5 (2),
169–202.
10.1145/505586.505590 Google Scholar
- Varela, C. and Agha, G. (2001) Programming dynamically reconfigurable open systems with SALSA. ACM SIGPLAN Notices, 36 (12), 20–34.
- Dinges, P. and Agha, G. (2012) Scoped synchronization constraints for large scale actor systems, in Proceedings of the International Conference on Coordination Languages and Models: COORDINATION 2012 (ed. M. Sirjani), Lecture Notes in Computer Science, vol. 7274, Springer, Berlin pp. 89–103.
- Miller, M.S. (2006) Robust composition: towards a unified approach to access control and concurrency control, Ph.D. dissertation, Johns Hopkins University.
- Barendregt, H. (1992) Lambda calculi with types, in Handbook of Logic in Computer Science, Vol. II: Background: Computational Structures (eds. S. Abramsky, D.M. Gabbay, and T.S.E. Maibaum), Oxford University Press, pp. 117–309.
-
Gödel, K.
(1958)
Über eine bisher noch nicht benützte Erweiterung des finiten Standpunktes.
Dialectica,
12 (3–4),
280–287.
10.1111/j.1746-8361.1958.tb01464.x Google Scholar
- Castagna, G., Dezani-Ciancaglini, M., and Padovani, L. (2012) On global types and multi-party sessions. Logical Methods in Computer Science, 8 (1), Available at https://lmcs.episciences.org/773.