Browsing by Author "Jara Juarez, Diego Xavier"
Now showing 1 - 3 of 3
- Results Per Page
- Sort Options
Item Propuesta metodológica de evaluación de seguridad para aplicaciones de mobile cloud computing(Universidad de Cuenca, 2017-10-10) Jara Juarez, Diego Xavier; Cedillo Orellana, Irene PriscilaAccording to the latest Mobility Report by the Swedish manufacturer Ericsson; it is highlighted that by the last quarter of 2015 the total number of mobile lines in the world was 7300 million, which is the same than the number of inhabitants of the Earth; as well as, within the same quarter, 350 million smartphones were sold. This growing trend of Internet access from mobile devices, coupled with the increase of their capabilities and the greater deployment of third and fourth generation networks (3G / 4G Long Term Evolution LTE) over Wi-Fi networks, provide users, A wide range of services and solutions. However, the responsibility for security, personal identification and the evolution of the post-implementation era are three areas in which convergent factors are shown, which Gartner has identified as the nexus of forces for 2020. The increase in smart mobile terminals, as well as increased access to the internet from these devices, together with the needs raised, have given rise to a new concept of mobile computing in the cloud or Mobile Cloud Computing (MCC), which deals with the combination of mobile computing, cloud computing and mobile Internet, where all the advantages of the three are integrated. Therefore, this study intends to carry out an in-depth literature review, which allows us to obtain a security model for applications deployed in Mobile Cloud Computing (MCC) environments, to subsequently is used by an evaluation method that makes use of this model. The validation of this method has been made performed by means of proofs of concept or cases of study of existing applications in which this proposal is applied and that allow to make an evaluation of the same one. Magíster en Gestión Estratégica de Tecnologías de la Información CuencaItem Propuesta metodológica de evaluación de seguridad para aplicaciones de mobile cloud computing(2017) Jara Juarez, Diego Xavier; Cedillo Orellana, Irene PriscilaMobile devices are increasingly used to perform complex tasks due to technological advances in mobile devices. However, there are issues that limit their use in processes that demand a lot of resources due to their processing limitations, the charge cycle of the battery among others. Hence a suitable option is the use of cloud computing to perform tasks of high complexity and transfer the results to the mobile device. Mobile Cloud Computing has become a good and appropriate solution. Given its adoption in many applications, the issue of security has been considered a critical issue, which is often the main limitation for its massive acceptance. This paper proposes a methodology for evaluating mobile applications based on cloud computing platforms. To do so, we propose a quality model based on the characteristics of ISO/IEC 25010, and designed finally a formal methodology with the help of the SPEM 2 (Software & System Process Engineering Meta-Model Specification V2.0) notation. This article can be of support when carrying out security studies in this area.Item Security of Mobile Cloud Computing: A Systematic Mapping Study(Institute of Electrical and Electronics Engineers Inc., 2018) Jara Juarez, Diego Xavier; Cedillo Orellana, Irene PriscilaCloud Computing has gained more prominence in organizations in the last years. Meanwhile, ubiquity and mobility are two main features that have emerged from the popularization of mobile devices. Therefore, the combination of ubiquitous mobile network and cloud computing generates Mobile Cloud Computing technology. This next-generation technology has led to the development of applications based on mobile cloud computing, which required specific security features because of their specific requirements. This paper presents the results of a systematic mapping done for mobile cloud computing technology. This study breaks down the security sub-characteristic from the ISO / IEC 25010 relates them to the information found in our study that analyzed and evaluated a total of 83 articles. The novelties found in this study allow to identify the security problems that are not being addressed by the researchers and in this way, can be quantified to serve as the basis for future research.
