Cloud Message Queueing and Notification: Challenges and Opportunities

@article{Esposito2018CloudMQ,
  title={Cloud Message Queueing and Notification: Challenges and Opportunities},
  author={Christian Esposito and Francesco Palmieri and Kim-Kwang Raymond Choo},
  journal={IEEE Cloud Computing},
  year={2018},
  volume={5},
  pages={11-16}
}
The current mobile app development practice, like other large-scale network-centric software projects, is characterized by the use of event notification facilities supporting the exchange of effective and efficient data flows between the applications front-end, usually located on customers terminal equipment and the back-end services available within the cloud. In order to avoid the need of setting up the notification infrastructure from scratch for any new application, many cloud service… 
Alive+: A Private Cloud Messaging System for Android Devices
TLDR
Alive+ system as a private cloud messaging to forward messages over the Android devices securely and is secure, reliable, and error-tolerant with high scalability levels, thereby serving a large number of users simultaneously.
Mobile App to SGX Enclave Secure Channel
TLDR
This paper proposes a protocol to combine secure frameworks in order to exchange and process sensitive data, i.e. respecting user's privacy, and shows the feasibility and importance of an end-to-end secure channel protocol.
Demystifying blockchain: A critical analysis of challenges, applications and opportunities
TLDR
The paper theoretically constructs an integrated framework of the blockchain innovation adoption process in an organization considering organizational and user acceptance perspectives to facilitate its widespread adoption, thereby achieving sustained leadership solutions.
An extensive research survey on data integrity and deduplication towards privacy in cloud storage
TLDR
This manuscript discusses the explicit research contribution toward data integrity, data privacy, and data deduplication and contributes towards highlighting the potential open research issues followed by a discussion of the possible future direction of work towards addressing the existing problems.
Blockchains: a Systematic Multivocal Literature Review
TLDR
A systematic definition of blockchain technology is derived, based on a formal concept analysis, and an overview of the state of the art in blockchain technology elaborated by means of Grounded-Theory is flesh out.
Blockchain: a literature review
A blockchain consists of an ordered list with nodes and links where the nodes store information and are connected through links called chains. This technology supports the availability of a publicl...
Implementation of agent interaction protocol within cloud infrastructure in geographically distributed data centers
A cloud system for geographically distributed data centers is presented. An approach is based on the principle of multi-agent structure (microservices). A special interaction protocol was developed

References

SHOWING 1-10 OF 15 REFERENCES
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services
TLDR
A technique is developed that helps the app developers establish end-to-end protection of the communication with their apps, over the vulnerable messaging services they use, to mitigate the threat from an adversary running carefully-crafted exploits.
Blockchains and Smart Contracts for the Internet of Things
TLDR
The conclusion is that the blockchain-IoT combination is powerful and can cause significant transformations across several industries, paving the way for new business models and novel, distributed applications.
Survey of Cloud Messaging Push Notification Service
TLDR
This article presents four kinds of push notifications such as Microsoft Push Notification service, Google Cloud Messaging, Blackberry Push service, Apple Push notification service and proposes a CPTEM to evaluate and select the most appropriate push mechanisms.
Legal Issues in the Cloud
TLDR
Although security, privacy, public policy, legal, and forensic challenges associated with cloud computing have attracted academic attention, research on the topic is still in its infancy.
Implementation of Cloud Messaging System Based on GCM Service
TLDR
This work creates an application using the cloud pushing based on Android GCM service, which is integrated into the information management system and shows that it enhances the timeliness and effectiveness of the information, reduces online traffic and saves Android terminals' power.
Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service
TLDR
This work proposes a new form of cloud-based push-styled mobile botnets that exploits today's push notification services as a means of command dissemination and discusses how to generalize the design to other platforms, such as iOS or Window-based systems, and recommend possible defense methods.
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures
This work analyzes a new and very subtle kind of security threat that can affect large-scale cloud-based IT service infrastructures, by exploiting the computational resources of their component data
Detecting Misuse of Google Cloud Messaging in Android Badware
TLDR
This paper extends Flowdroid to extract GCM flows from Android applications, and trains different machine-learning algorithms to detect badware that use GCM to perform malicious activities, and demonstrates that combining different classifiers trained on the flows originated from GCM services allows it to improve the detection rate.
Intrusion Tolerance of Stealth DoS Attacks to Web Services
TLDR
Preliminary experimental results show that the proposed approach results in a better performance of Intrusion Prevention Systems, in terms of reducing service unavailability during stealth attacks.
On data dissemination for large-scale complex critical infrastructures
TLDR
A peer-to-peer approach for resilient and scalable data dissemination over large-scale complex critical infrastructures is presented, based on the adoption of epidemic dissemination algorithms between peer groups, combined with the semi-active replication of group leaders to tolerate failures and assure the resilient delivery of data.
...
1
2
...