scholarly journals Challenges of Confidentiality and Security in Mobile Cloud Computing and Protective Measures

2019 ◽  
Vol IV (I) ◽  
pp. 154-163
Author(s):  
Dost Muhammad Khan ◽  
Tariq Aziz Rao ◽  
Faisal Shahzad

Mobile Cloud Computing (MCC) has a significant potential to provide scalability, reliability, extra battery life, and additional storage capacity. Due to the flexible infrastructure and simplicity of access, cloud computing has become widespread. Energy consumption and execution time have also considerably enhanced by shifting the execution of resources consuming tasks that bring the benefit to mobile users. However, security and privacy is the major barrier to this growing trend of computing aptitude. Noteworthy efforts have already been made by the academic and research organizations to build secure computing infrastructures but various challenges are stay alive in security procedure of MCC. This manuscript provides a broad analysis of confidentiality and security challenges in mobile cloud computing and also discusses how to overcome these loopholes.

2018 ◽  
Vol 19 (4) ◽  
pp. 309-337 ◽  
Author(s):  
Rama Subbareddy Somula ◽  
Sasikala R

In recent years, the mobile devices become popular for communication and running advanced real time applications such as face reorganization and online games. Although, mobile devices advanced for providing significant benefits for mobile users. But still, these devices suffers with limited recourses such as computation power, battery and storage space due to the portable size. However, The Cloud Technology overcome the limitations of mobile computing with better performance and recourses. The cloud technology provides enough computing recourses to run mobile applications as storage computing power on cloud platform. Therefore, the novel technology called mobile cloud computing (MCC) is introduced by integrating two technologies (Mobile Computing, Cloud Computing) in order to overcome the limitations(such as Battery life, Storage capacity, Processing capacity) of Mobile Devices by offloading application to recourse rich Remote server. This paper presents an overview of MCC, the advantages of MCC, the related concepts and the technology beyond various offloading frameworks, the architecture of the MCC, Cloudlet technology, security and privacy issues and limitations of mobile cloud computing. Finally, we conclude with feature research directions in MCC.


2020 ◽  
Vol 10 (51) ◽  
pp. 212-222
Author(s):  
Boubakeur Annane ◽  
Adel Alti ◽  
Osman Ghazali

Recently, mobile computing is known as a fast-growing utilization of people's daily life. However, the main is the limited mobile devices’ resources such as processing capability, storage space and battery life. With the development of cloud computing, mobile devices’ resources are improved with the help of cloud services, which resulted an emerged technology named Mobile Cloud Computing (MCC). Although the MCC has several advantages for mobile users, it is also challenged by many critical issues like security and privacy of the mobile user's data that offloaded on the cloud’ servers and processed on the virtual machines (VMs). In virtualization, various investigations showed that malicious users are able to break down the cloud security methods by spreading their VMs in order to alter or violate the user sensitive data that executed on cloud’ VMs. This paper deeply analyzes the recent MCC based virtualization approaches and methods by criticizing them. We found out that no approach protects the data from being stolen while distributed VMs that deployed on different cloud servers exchanging data. Hence, the paper provides practical gaps related to virtualization in MCC and future perspectives.


Author(s):  
Boubakeur Annane ◽  
Osman Ghazali

The principle constraints of mobile devices are their limited resources such as processing capability, storage space and battery life. While cloud computing offers a vast computing resources services. A new idea emerged by including the cloud computing into mobile devices to augment the capacities of the mobile devices resources such as smartphones, tablet, and other personal digital assistant (PDA) which provides a robust technology called Mobile Cloud Computing (MCC). Although MCC have brought many advantages for the mobile users, it also stills suffer from security and privacy side of data while hosted on virtual machines (VM) on remote cloud’s servers. Currently, the eyes of the security expert’s community turned towards the virtualization-based security technique either on the Cloud or on the mobile devices. The new challenge is to develop secure methods in order to authenticate high sensitive digital content. This paper investigates the main challenges regarding the security and privacy issues in mobile cloud exactly focusing on the virtualization issue layer and give clear strengths and weaknesses of recent relevant virtualization security techniques existing in the literature. Hence, the paper provides perspectives for researchers in order to achieve as a future work.


2015 ◽  
pp. 1561-1584
Author(s):  
Hassan Takabi ◽  
Saman Taghavi Zargar ◽  
James B. D. Joshi

Mobile cloud computing has grown out of two hot technology trends, mobility and cloud. The emergence of cloud computing and its extension into the mobile domain creates the potential for a global, interconnected mobile cloud computing environment that will allow the entire mobile ecosystem to enrich their services across multiple networks. We can utilize significant optimization and increased operating power offered by cloud computing to enable seamless and transparent use of cloud resources to extend the capability of resource constrained mobile devices. However, in order to realize mobile cloud computing, we need to develop mechanisms to achieve interoperability among heterogeneous and distributed devices. We need solutions to discover best available resources in the cloud servers based on the user demands and approaches to deliver desired resources and services efficiently and in a timely fashion to the mobile terminals. Furthermore, while mobile cloud computing has tremendous potential to enable the mobile terminals to have access to powerful and reliable computing resources anywhere and anytime, we must consider several issues including privacy and security, and reliability in realizing mobile cloud computing. In this chapter, the authors first explore the architectural components required to realize a mobile cloud computing infrastructure. They then discuss mobile cloud computing features with their unique privacy and security implications. They present unique issues of mobile cloud computing that exacerbate privacy and security challenges. They also discuss various approaches to address these challenges and explore the future work needed to provide a trustworthy mobile cloud computing environment.


Author(s):  
Darshan M. Tank

With the development of cloud computing and mobility, mobile cloud computing has emerged and become a focus of research. Mobile Cloud Computing (MCC) integrates mobile computing and cloud computing aiming to extend mobile devices capabilities. By the means of on-demand self-service and extendibility, it can offer the infrastructure, platform, and software services in a cloud to mobile users through the mobile network. There is huge market for mobile based e-Commerce applications across the globe. Security and privacy are the key issues for mobile cloud computing applications. The limited processing power and memory of a mobile device dependent on inherently unreliable wireless channel for communication and battery for power leaves little scope for a reliable security layer. Thus there is a need for a lightweight secure framework that provides security with minimum communication and processing overhead on mobile devices. The security and privacy protection services can be achieved with the help of secure mobile-cloud application services.


2018 ◽  
Vol 7 (1.9) ◽  
pp. 238
Author(s):  
S. Iniyan ◽  
M. Senthilraja ◽  
R. Srinivasan ◽  
A. Palaniraj

Cell phones are turning into a basic piece of our day by day life because of most proficient and powerful specialized devices without time and space boundation. Everybody has a portable, tablet, tablet with calling office i.e. Fablet. Distributed computing (DC) has been broadly perceived as the cutting edge's registering foundation with the fast development of portable applications and the support of Cloud Computing for an assortment of administrations, the Mobile Cloud Computing (MCC) is presented as an incorporation of Cloud Computing into the Mobile Environment. Portable Cloud Computing is picking up stream. MCC is alluded to as the framework where both the information stockpiling and the information handling occur outside the cell phone. In MCC condition, Cloud Computing, Mobile Computing and Application confront a few difficulties like Mobile Computation Offloading, Seamless Connectivity, Vendor/Data Lock-in, Long WAN Latency, Live VM (Virtual Machine) relocation issues, Low Bandwidth, Energy-Efficient Transmissions and Trust-Security and Privacy Issues. In this paper, I have talked about around a few difficulties and issues identified with the Mobile Cloud Computing. This paper gives data about Mobile Cloud Computing Application, Security and Issues.


2017 ◽  
Vol 84 ◽  
pp. 38-54 ◽  
Author(s):  
Muhammad Baqer Mollah ◽  
Md. Abul Kalam Azad ◽  
Athanasios Vasilakos

Sign in / Sign up

Export Citation Format

Share Document