Iris Code Secured Mobile Cloud Computing Computer Science Essay

Published: Last Edited:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Abstract:-Cloud computing is one of the hottest topics in present world. The Cloud computing is Internet- ("cloud-") based development and use of computer technology ("computing"). Cloud computing describes a new supplement, consumption and delivery model for IT services based on the Internet, and it typically involves the provision of dynamically scalable and often virtualized resources as a service over the Internet. Now the cloud computing is looked on to become mobile so that the power consumption, mobility and ease can increase even more. Here in this paper I would like to introduce mobile cloud computing with security. We use the best biometrics method of Iris recognition for security (or) personality identification. Iris code recognition is a method of biometric authentication that uses pattern-recognition techniques based on high-resolution images of the irides of an individual's eyes. Here we scan each cloud user to provide them a iris code after some digital image principals (this is unique for all users) at the initial stage or before becoming the member of the cloud group. Now by using this code they enter into their own cloud spot for the cloud usage. We also provide a separate authentication for each user with a user name and password. We recommend the use 3G technology in cloud computing with its advantages. Finally we depict the overall advantages of secured mobile cloud computing and the conclusion.


The term cloud is used as a metaphor for the Internet, based on the cloud drawing used to depict the Internet in computer network diagrams as an abstraction of the underlying infrastructure it represents. Typical cloud computing providers deliver common business applications online which are accessed from a web browser, while the software and data are stored on servers.These applications are broadly divided into the following categories that emphasize the notion of "Everything-as-a-Service": Software as a Service (SaaS), Utility Computing, Web Services, Platform as a Service (PaaS), Managed Service Providers (MSP), Service Commerce, and Internet Integration. Cloud computing is one of the hottest topics in mobile - even if many in the space are confused about just what defines the cloud. And as the use of mobile cloud services ramps up, network operators and others in the wireless space will have to eschew traditional product- and technology-driven business models in favor of more global, service-driven paradigms.

Sophisticated devices such as the iPhone have boosted uptake of mobile data services in a major way in more mature markets, spurring an evolution in the economic engine for mobile telecoms beyond coverage and penetration toward usage. Indeed,  56 percent of U.S. users have accessed the Internet wirelessly, with 32 percent of the population having done so with a handheld device such as a phone, PDA, iPod, Kindle or other connected consumer gadget, Pew Internet and American Life recently reported. That evolution is sure to continue as emerging markets reach maturity and data usage moves beyond novelty apps (which typically are used just a few times) into enterprise-minded offerings and practical tools that enhance the lives of mobile users.


Recently the talks are going on the development of the mobile cloud computing. These have been under several problems and critics. The current development in the internet accessing of the mobiles have increased the users accessing the internet through the mobiles, but still the use of internet through mobiles are not fully fledged since the higher cost of internet access and the lesser speed in accessing. Mobile application developers today face the challenge of multiple mobile operating systems either they must write for just one OS, or create many versions of the same application.

More sophisticated apps require significant processing power and memory in the handset. Using Web development, applications can run on servers instead of locally, so handset requirements can be greatly reduced and developers can create just one version of an application. A cloud-based application stops working if you lose your connection. New programming languages such as HTML 5 could come to the rescue as they can enable data caching on the handset, allowing work to continue until cellular signal is restored.

Cloud computing will bring unprecedented sophistication to mobile applications. To mention just a few examples, business users will benefit from collaboration and data sharing apps. Personal users will gain from remote access apps allowing them to monitor home security systems, PCs or DVRs, and from social networking mashups that let them share photos and video or incorporate their phone address books and calendars.


Figure-1 Cloud computing sample architecture

Cloud architecture, the systems architecture of the software systems involved in the delivery of cloud computing, comprises hardware and software designed by a cloud architect who typically works for a cloud integrator. It typically involves multiple cloud components communicating with each other over application programming interfaces, usually web services.[55]

This closely resembles the Unix philosophy of having multiple programs each doing one thing well and working together over universal interfaces. Complexity is controlled and the resulting systems are more manageable than their monolithic counterparts.

Cloud architecture extends to the client, where web browsers and/or software applications access cloud applications.

Cloud storage architecture is loosely coupled, often assiduously avoiding the use of centralized metadata servers which can become bottlenecks. This enables the data nodes to scale into the hundreds, each independently delivering data to applications or users.


The increase in cyber crime have been a case of issue for the insecurity in the mobile cloud computing. Here we can see the cyber crimes like- Spoofing, Unauthorized accessing, Replay Attacks, Tampering, DDOS attacks and eavesdropping.

Figure-2 Problems with current MCC

Other than these attacks and insecurity problems the main problem with the development of the mobile cloud computing is the speed of the internet access through the mobiles. The current 2.5G technology also known as the General Packet Radio Service (GPRS) for the GSM and 1xRTT for the CDMA mobiles provide us with the data rates of 56 kbps up to 114 kbps and 80-100 kbps respectively. Other problems like Full compatibility with usual web service interfaces, Low resource considerations; Mobile phones general purpose is not seriously affected. The Scalability issues is also one of problems.


Overcoming the authorization and authentication problems:-

Insecurity, compatibility of the applications in mobile phones and accessing speed are the problems. Our proposal of the iris code recognition for authentication is the best possible for individual identity. The iris codes are generated for each individual user. , iris recognition uses camera technology, with subtle infrared illumination reducing specular reflection from the convex cornea, to create images of the detail-rich, intricate structures of the iris. Converted into digital templates, these images provide mathematical representations of the iris that yield unambiguous positive identification of an individual.

Figure-3 An Iris Scan model 2100 iris scanner

Iris recognition efficacy is rarely impeded by glasses or contact lenses. Iris technology has the smallest outlier (those who cannot use/enroll) group of all biometric technologies. Because of its speed of comparison, iris recognition is the only biometric technology well-suited for one-to-many identification. A key advantage of iris recognition is its stability, or template longevity, as, barring trauma, a single enrollment can last a lifetime.

Here we apply certain digital image processing techniques to convert them into particular codes. These codes vary from 20 to 512 bytes based on the image processing algorithm used and the irides. Each user initially sends his\her iris code to the cloud for authentication and authorization. The cloud takes in the iris code and converts it into particular image and checks for it in the database. If the code matches with the any user in the database sends another logon window which encompasses the username and password, the user has to fill this too and send it. If it is correct then the user is given with the authorization to use the cloud.

Overcoming the Network security and hacking problems:

Now comes the problem of hacking and interfering in the data transmission and other attacks, so lets us see what can be done to prevent this and avoid this. End-to-end security can be given using the Secure Sockets Layer (SSL) system. Security Standards for Web Services(WS) can be given using the following systems and methods XML Encryption [W3C], XML Signature [W3C], WSSE (WS-Security Standard), SAML (Security Assertion Markup Language). Message-level security can be given using the following methods Bouncy Castle Lightweight cryptographic API, Upgraded KSoap2, MIDP2.0 (Mobile Information Device Profile). The strategies that can be implemented for this are Symmetric key encryption of message, Asymmetric key exchange of key and signing the message.MAC can even be used for the encryption of the message.

Figure 4-A Web Service handler.

They can be highly secure and better performance by using these techniques AES-256 Symmetric key encryption, RSA 1024 bit key exchange and RSAwithSHA1 signature. In Application level security - Ensuring end-point security can be achieved by the use of the single sign-on (SSO) system, Liberty Alliance ID-FF protocols, Identity provider & Third party identity validator and SourceID Liberty 2.0 Beta. Semantics-Based Access Control can be achieved by the usage of the SBAC encompasses administration and enforcement of access control policies for semantic web services, OWL (Web Ontology Language) ontology's for resources, operations, privilege, prohibitions etc and Prototyped using Jena.

Overcoming the speed problem:

One of the other main problems is the slower speed of internet access, this has lead to the lowering of the internet user through mobiles since they consume a lot of time for even a ordinary data transfer itself. The current development in the 3G technology in India and the evolution of the 4G technology worldwide can increase the speed of net access. The user can browse the internet at a very higher speed than the current technology.

The 3G technology can give a speed of about data rate of 2 Mbit/s for stationary or walking users, and 348 kbit/s in a moving vehicle. Now comes the problem of the compatibility of the applications in the mobiles. Can the mobiles support some of the softwares that are essential for the mobile cloud computing? Yes, this is a good question, but with growing technology this problem can we resolved easily. The current mobile OS like the Windows 3.5 and some of the basic Unix OS can be a handful when using and accessing the internet.

3G provides accelerated data speeds and simultaneous voice and data capabilities for an amazing wireless voice and data experience.

Access CV for faster on-demand viewing of high quality video clips from your favorite TV shows, news, sport and weather

Surf the wireless Internet faster and significantly lower your wait for page loads

Download files and access email faster from favorite providers like Yahoo!, MSN, and AOL.

Multi-task while you are on a call-search for movies times, look up directions, or send messages.

Get more done with faster access to email and internet. AT&T LaptopConnect gives you the power of the AT&T network while you're on the go


2. Cloud sends Logon screen

1. User Sends Iris Code

4. Autherisation provided

3. User sends details

Fig- 5 Basic diagram for SMCC


The limited processing and memory capabilities of mobile devices have always required some use of the "cloud" for delivery of mobile applications and services. However, the challenges inherent in application development as well as the desire to enhance applications with location, presence, and other value-added services are driving greater use of the cloud for creating advanced mobile applications.

The enterprise will be the primary beneficiary of cloud services as mobilizing enterprise data and enhancing existing mobile applications and services will tremendously enhance productivity. The benefits of enterprise cloud services will be available not only to large enterprises but also to the SMB customer segment.

This study provides a detailed view of the drivers and inhibitors for cloud services used across all mobile device platforms. Particular attention is given to cloud services providers including Amazon, Google, and Microsoft for facilitating greater mobile applications development, mobilizing enterprise data and merging the IT and telecommunications supply chains. The report includes an in-depth review of the enteprise IT and mobile supply chains and how each is leveraging networks and cloud services to support a growing mobile worker base.

Forecasts are provided for traditional mobile cloud applications, new mobile cloud applications and for hosted mobile services. Subscriber and revenue estimates are included for North America, Western Europe, Asia Pacific and Rest of World. The report is rounded out with recommendations to mobile and IT suppliers, helping them to capitalize on the opportunities provided by enterprise cloud services.


Monitoring power networks

Field maintenance crews collect information

Operators and experts can prescribe suggestions and changes

Figure-6 Mobile Journalism

Avoid polling

Ex: Checking for updates of RSS feeds

Communities of practice

Collaborative journalism

Mobile Host Co Learn system & Collaborative M-Learning

Remote patient tele-monitoring

Distress call

Location information service

Mobile picture service

Figure-7 Distress management


We have seen the introduction of the cloud computing, the problems making it into a mobile one, then we saw the Mobile cloud computing and security introduced to it and also the advantages of it. Here in the fast moving world the time is an important factor, saving the time and increasing the mobility of the work can make it faster and easier to complete. So this method of Secured Mobile Cloud computing can make the life of professionals better, by reducing their time consumption and work load. This principle can also reduce the power consumed and hence the Greener Computing is introduced. So we conclude that the Secured mobile Cloud Computing if established can be a great success to the green technology and the user.