A Review on Security in Mobile Cloud Computing

Authors

  • Vandanapu Uday  Research Scholar, Amity University Chhattisgarh, Raipur, Chhattisgarh, India
  • Advin Manhar  Assistant Professor, Amity University Chhattisgarh, Raipur, Chhattisgarh, India

DOI:

https://doi.org/10.32628/CSEIT206638

Keywords:

Cloud Computing; Mobile Cloud Computing; Mobile Cloud Computing Security; Data Security.

Abstract

Cloud Computing refers to various services that are accessible through the Internet. These essential sources encompass servers, databases, storage, analytics, software, and different applications. Mobile cloud computing (MCC) is the availability of cloud computing offerings in a cell environment. Mobile Cloud Computing at its simplest refers to an infrastructure where both the storage and therefore, the processing of information happens outside the mobile device. Users can remotely store their data also enjoy high-quality on-demand cloud applications without the restrictions of getting to get and maintain your local hardware and software. Despite the surprising advancement achieved by MCC, the clients of MCC remains below expectations. Thanks to the related risks regarding security and confidentiality. The more and more information is placed onto the cloud by the individuals and enterprises, the more the safety issue begins to grow. This paper gives a summary of the cloud computing concept followed by an outline of mobile cloud computing, and therefore, the different security issues pertinent to the mobile cloud computing environment.

References

  1. Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., &Buyya, R. 2014. Cloud-based augmentation for mobile devices: motivation, taxonomies, and open challenges. Communications Surveys & Tutorials, IEEE, 16(1), 337-368.
  2. Liu, F., Shu, P., Jin, H., Ding, L., Yu, J., Niu, D., & Li, B. 2013. Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications. Wireless Communications, IEEE, 20(3), 14-22.
  3. Cloud Performance Evaluation: Hybrid Load Balancing Model Based on Modified Particle Swarm Optimization and Improved Metaheuristic Firefly AlgorithmsJune 2020International Journal of Advanced Science and Technology 29(5):12315-12331,Advin Manhar
  4. Liu, L., Moulic, R., & Shea, D. 2010. Cloud service portal for mobile device management. In e-Business Engineering (ICEBE), 2010 IEEE 7th International Conference on (pp. 474-478). IEEE.
  5. Qian (Andy) Wang 2011. Mobile Cloud Computing, A Thesis Submitted to the College of Graduate Studies and Research In Partial Fulfillment of the Requirements, February 2011.
  6. Satyanarayanan, M. 2011. Mobile computing: the next decade. ACM SIGMOBILE Mobile Computing and Communications Review, 15(2), 2-10.
  7. Vallina-Rodriguez, N., &Crowcroft, J. 2011. ErdOS: achieving energy savings in mobile OS. In Proceedings of the sixth international workshop on MobiArch (pp. 37-42). ACM.
  8. Marinelli, E. E. 2009. Hyrax: cloud computing on mobile devices using MapReduce (No. CMU-CS-09-164). Carnegie-mellonuniv Pittsburgh PA school of computer science, 2009.
  9. Suo, H., Liu, Z., Wan, J., & Zhou, K. 2013. Security and privacy in mobile cloud computing. In Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International (pp. 655-659). IEEE.
  10. Huang, D., Zhou, Z., Xu, L., Xing, T., &Zhong, Y. 2011. Secure data processing framework for mobile cloud computing. In Computer Communications Workshops (infocom wkshps), 2011 IEEE Conference on (pp. 614- 618). IEEE.
  11. Kumar, L., Malik, N., Agghi, G., &Anand, A. 2013. Mobile Cloud Computing. In International Conference on Computer Sciences and Applications.
  12. Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2011). A survey of mobile cloud computing: architecture, applications, and approaches. Wireless Communications and Mobile Computing,Wiley.
  13. Alizadeh, M., Hassan, W. H., Behboodian, N., & Karamizadeh, S. (2013). A Brief Review of Mobile Cloud Computing Opportunities. Research Notes in Information Science (RNIS), 12, pp. 155- 159
  14. Fernando, N., Loke, S. W., & Rahayu, W. (2012). Mobile cloud computing: A survey. Future Generation Computer Systems, 29, pp. 84-106. 13 GmbH, Z. (2011). Zimory Enterprise Cloud. http://www.zimory.de/index.php?id=75.
  15. Hsueh, S.-C., Lin, J.-Y., & Lin, M.-Y. (2011). Secure cloud storage for convenient data archive of smart phones. Paper presented at the 15th IEEE International Symposium on Consumer Electronics (ISCE) Singapore, IEEE. p. 156 - 161.
  16. Hero Modares, Jaime Lloret , Amirhossein Moravejosharieh , Rosli Salleh (2014) . Security in Mobile Cloud Computing.
  17. Kanday, R. (2012). A Survey on Cloud Computing Security. Paper presented at the Computing Sciences (ICCS), Phagwara: IEEE. p. 302 - 311.
  18. Khan, A. N., Mat Kiah, M., Khan, S. U., & Madani, S. A. (2012). Towards secure mobile cloud computing: a survey. Future Generation computer systems, 5(29), 22.
  19. Kottari, V., Kamath, V., Saldanha, L. P., & Mohan, C. (2013). A Survey on Mobile Cloud Computing: Concept, Applications and Challenges. International Journal of Academic Research (IJAR), 2(3), 487-492.
  20. S M Shamim, Angona Sarker ,Ali Newaz Bahar ,Md. Atiqur Rahman. 16, March 2015. A Review on Mobile Cloud Computing

Downloads

Published

2020-12-30

Issue

Section

Research Articles

How to Cite

[1]
Vandanapu Uday, Advin Manhar, " A Review on Security in Mobile Cloud Computing " International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 6, pp.219-224, November-December-2020. Available at doi : https://doi.org/10.32628/CSEIT206638