Management of security and privacy issues of application development in mobile cloud environment: A survey

Author(s):  
Debasish Jana ◽  
Debasis Bandyopadhyay
2018 ◽  
Vol 7 (1.9) ◽  
pp. 238
Author(s):  
S. Iniyan ◽  
M. Senthilraja ◽  
R. Srinivasan ◽  
A. Palaniraj

Cell phones are turning into a basic piece of our day by day life because of most proficient and powerful specialized devices without time and space boundation. Everybody has a portable, tablet, tablet with calling office i.e. Fablet. Distributed computing (DC) has been broadly perceived as the cutting edge's registering foundation with the fast development of portable applications and the support of Cloud Computing for an assortment of administrations, the Mobile Cloud Computing (MCC) is presented as an incorporation of Cloud Computing into the Mobile Environment. Portable Cloud Computing is picking up stream. MCC is alluded to as the framework where both the information stockpiling and the information handling occur outside the cell phone. In MCC condition, Cloud Computing, Mobile Computing and Application confront a few difficulties like Mobile Computation Offloading, Seamless Connectivity, Vendor/Data Lock-in, Long WAN Latency, Live VM (Virtual Machine) relocation issues, Low Bandwidth, Energy-Efficient Transmissions and Trust-Security and Privacy Issues. In this paper, I have talked about around a few difficulties and issues identified with the Mobile Cloud Computing. This paper gives data about Mobile Cloud Computing Application, Security and Issues.


2020 ◽  
pp. 34-47
Author(s):  
Gomathy B ◽  
Ramesh SM ◽  
Shanmugavadivel G

A systematic and comprehensive review of privacy preserving and security challenges in cloud environment is presented in this literature. Since, cloud supports various applications, it requires immediate attention for serious security and privacy issues. Research must focus on efficient security mechanism for cloud-based networks, also it is essential to explore the techniques to maintain the integrity and confidentiality of the data. This paper highlights research challenges and directions concerning the security as a comprehensive study through intensive analysis of various literatures in the last decade, and it is summarized in terms of architecture types, evaluation strategies and security model. We surveyed, investigated and reviewed the articles in every aspect related to security and privacy preserving concepts and identified the following tasks: 1) architecture of wireless body area networks in cloud, 2) security and privacy in cloud based WBAN, 3), Cloud security and privacy issues in cloud 4) diverse authentication and cryptographic approaches, 4) optimization strategies to improve the security performance.


2018 ◽  
Vol 19 (4) ◽  
pp. iii
Author(s):  
Rajkumar Rajasekaran

We are happy to present this special issue of thee Scientific Journal Scalable Computing: Practice and Experience. In this special issue on Mobile Cloud Applications and Challenges (Volume 19 No 4 December 2018), we have selected five papers, which gone through a peer review according to the journal policy. All the papers represents novel results in the field of Mobile and Cloud Applications.   The first paper presents overview of mobile cloud computing, cloudlet technology, security and privacy issues and limitations of mobile cloud commuting. The second paper presents a spatial partition, global index and map reduce operation were studied. The trail results that the proposed indexing cloud framework performs improved results. The third paper proposes an authentication model along with data security in a public cloud storage environment which successful detects the unauthenticated access or any anomaly in data. The fourth paper analyses the student success ratio which uses a cloud based technology to implement and design SaaS. Graph based complex network are used for analysing the course. The fifth paper presents Overlapping community detection in social networks. The proposed algorithm uses parallel processing engine to resolve the delay problem.  


2018 ◽  
Vol 09 (1) ◽  
pp. 83-91
Author(s):  
Rashid Alakbarov ◽  
◽  
Ogtay Alakbarov ◽  

Author(s):  
Boubakeur Annane ◽  
Osman Ghazali

The principle constraints of mobile devices are their limited resources such as processing capability, storage space and battery life. While cloud computing offers a vast computing resources services. A new idea emerged by including the cloud computing into mobile devices to augment the capacities of the mobile devices resources such as smartphones, tablet, and other personal digital assistant (PDA) which provides a robust technology called Mobile Cloud Computing (MCC). Although MCC have brought many advantages for the mobile users, it also stills suffer from security and privacy side of data while hosted on virtual machines (VM) on remote cloud’s servers. Currently, the eyes of the security expert’s community turned towards the virtualization-based security technique either on the Cloud or on the mobile devices. The new challenge is to develop secure methods in order to authenticate high sensitive digital content. This paper investigates the main challenges regarding the security and privacy issues in mobile cloud exactly focusing on the virtualization issue layer and give clear strengths and weaknesses of recent relevant virtualization security techniques existing in the literature. Hence, the paper provides perspectives for researchers in order to achieve as a future work.


2017 ◽  
Vol 1 (4) ◽  
pp. 143
Author(s):  
Mohammad Bin Ghudayyer ◽  
Yasir Javed ◽  
Mamdouh Alenezi

Security is one of the main concerns of those who want to adopt and migrate to cloud computing technology. Security issues raised by cloud technology reveals that mobile cloud computing is raising the privacy and security issues such as identification and authentication issue, as sometimes the identity and the authentication of the owner of the device or the owner of the data contained in the cloud was not strictly remote. These are some examples that could be considered as major setbacks to the mobile cloud computing adaptation and the reason why some entities are still reluctant of embracing, adopting and migrating to this technology. This research reviews the phenomenon of mobile cloud computing, and the security and privacy issues intrinsic within the area of mobile application and cloud computing with more emphasis on the security and privacy considerations to embrace and migrate to Mobile Cloud Computing.


Sign in / Sign up

Export Citation Format

Share Document