Security in Mobile Cloud Computing

2015 ◽  
pp. 1548-1560
Author(s):  
Hero Modares ◽  
Jaime Lloret ◽  
Amirhossein Moravejosharieh ◽  
Rosli Salleh

Cloud computing is a new and promising technology that is transforming the paradigm of traditional Internet computing and probably the whole IT industry. Cloud computing is predicted to expand in the mobile environment leveraging on the rapid advances in wireless access technologies. These mobile applications are built around mobile cloud computing techniques and models. In the Mobile Cloud environment, users can remotely store their data as well as enjoy high quality on-demand cloud applications without the limitations of having to purchase and maintain their own local hardware and software. However, data security is still a major concern and is the main obstacle preventing cloud computing from being more widely adopted. This concern originates from the fact that sensitive data stored in the public clouds is managed by commercial service providers who might not be totally trustworthy. As such, there are several security and privacy issues that need to be addressed. This chapter gives an overview on the cloud computing concept followed by a description on mobile cloud computing and the different security issues pertinent to the mobile cloud computing environment.

Author(s):  
Hero Modares ◽  
Jaime Lloret ◽  
Amirhossein Moravejosharieh ◽  
Rosli Salleh

Cloud computing is a new and promising technology that is transforming the paradigm of traditional Internet computing and probably the whole IT industry. Cloud computing is predicted to expand in the mobile environment leveraging on the rapid advances in wireless access technologies. These mobile applications are built around mobile cloud computing techniques and models. In the Mobile Cloud environment, users can remotely store their data as well as enjoy high quality on-demand cloud applications without the limitations of having to purchase and maintain their own local hardware and software. However, data security is still a major concern and is the main obstacle preventing cloud computing from being more widely adopted. This concern originates from the fact that sensitive data stored in the public clouds is managed by commercial service providers who might not be totally trustworthy. As such, there are several security and privacy issues that need to be addressed. This chapter gives an overview on the cloud computing concept followed by a description on mobile cloud computing and the different security issues pertinent to the mobile cloud computing environment.


2018 ◽  
Vol 7 (1.9) ◽  
pp. 238
Author(s):  
S. Iniyan ◽  
M. Senthilraja ◽  
R. Srinivasan ◽  
A. Palaniraj

Cell phones are turning into a basic piece of our day by day life because of most proficient and powerful specialized devices without time and space boundation. Everybody has a portable, tablet, tablet with calling office i.e. Fablet. Distributed computing (DC) has been broadly perceived as the cutting edge's registering foundation with the fast development of portable applications and the support of Cloud Computing for an assortment of administrations, the Mobile Cloud Computing (MCC) is presented as an incorporation of Cloud Computing into the Mobile Environment. Portable Cloud Computing is picking up stream. MCC is alluded to as the framework where both the information stockpiling and the information handling occur outside the cell phone. In MCC condition, Cloud Computing, Mobile Computing and Application confront a few difficulties like Mobile Computation Offloading, Seamless Connectivity, Vendor/Data Lock-in, Long WAN Latency, Live VM (Virtual Machine) relocation issues, Low Bandwidth, Energy-Efficient Transmissions and Trust-Security and Privacy Issues. In this paper, I have talked about around a few difficulties and issues identified with the Mobile Cloud Computing. This paper gives data about Mobile Cloud Computing Application, Security and Issues.


Author(s):  
Vandanapu Uday ◽  
Advin Manhar

Cloud Computing refers to various services that are accessible through the Internet. These essential sources encompass servers, databases, storage, analytics, software, and different applications. Mobile cloud computing (MCC) is the availability of cloud computing offerings in a cell environment. Mobile Cloud Computing at its simplest refers to an infrastructure where both the storage and therefore, the processing of information happens outside the mobile device. Users can remotely store their data also enjoy high-quality on-demand cloud applications without the restrictions of getting to get and maintain your local hardware and software. Despite the surprising advancement achieved by MCC, the clients of MCC remains below expectations. Thanks to the related risks regarding security and confidentiality. The more and more information is placed onto the cloud by the individuals and enterprises, the more the safety issue begins to grow. This paper gives a summary of the cloud computing concept followed by an outline of mobile cloud computing, and therefore, the different security issues pertinent to the mobile cloud computing environment.


2018 ◽  
Vol 7 (2) ◽  
pp. 80-85
Author(s):  
Lakshna Arun ◽  
T. N. Ravi

Mobile cloud computing (MCC) is the availability of cloud computing services in a mobile environment. By providing optimal services for mobile users, MCC incorporates the elements of mobile networks and cloud computing. In mobile cloud computing, all the data and complicated computing modules can be processed in clouds, and mobile devices do not need a powerful configuration like CPU speed, memory capacity, etc. However, the mobile devices are facing up with many struggles in their resources (e.g., battery life, storage, and bandwidth) and communications (e.g., privacy, mobility, and security). These challenges have a significant effect on the improvement of service qualities. In this paper, a literature survey on the MCC and security issues in MCC has presented.


2020 ◽  
Vol 10 (51) ◽  
pp. 212-222
Author(s):  
Boubakeur Annane ◽  
Adel Alti ◽  
Osman Ghazali

Recently, mobile computing is known as a fast-growing utilization of people's daily life. However, the main is the limited mobile devices’ resources such as processing capability, storage space and battery life. With the development of cloud computing, mobile devices’ resources are improved with the help of cloud services, which resulted an emerged technology named Mobile Cloud Computing (MCC). Although the MCC has several advantages for mobile users, it is also challenged by many critical issues like security and privacy of the mobile user's data that offloaded on the cloud’ servers and processed on the virtual machines (VMs). In virtualization, various investigations showed that malicious users are able to break down the cloud security methods by spreading their VMs in order to alter or violate the user sensitive data that executed on cloud’ VMs. This paper deeply analyzes the recent MCC based virtualization approaches and methods by criticizing them. We found out that no approach protects the data from being stolen while distributed VMs that deployed on different cloud servers exchanging data. Hence, the paper provides practical gaps related to virtualization in MCC and future perspectives.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 161
Author(s):  
Sk Sk Mahaboob Sharif ◽  
K V.V Satyanarayana ◽  
M Harsha vardhan ◽  
V Harika

Cloud Computing is an on demand service where resources like online office software and on-line storage are made available as per the users requirement. The word cloud in cloud computing is used as a symbol for internet since it offers various computing services as well as resources  like storage, servers, platforms  and applications are provided to devices over the internet. Mobile cloud computing joins the cloud computing with mobile computing and giving the shopper with limitless pool of useful resource from cloud without hampering mobility of consumer. The mobile cloud computing generation is developing rapidly many of the customers and at the equal time it introduces the early protection threats inside. A mobile user storing data on the cloud can be read by the cloud service provider or hacked by man-in-middle attack, thus affecting consumer privateers and integrity. So information saved on the cloud have to be encrypted, disallowing unauthorized user to access saved records. Mobile devices are resource constrained since they are battery powered, have less processing power and have less storage space. Any set of rules or technique used for securing mobile users statistics have to don't forget above constraints for powerful makes use of cloud for portable clients. Most of the mobile devices have nearly equal functionalities, so mobile devices will face some problems associated with security and third parties, by this paper we have given a review of different techniques for secure storage of mobile user’s data in the cloud, their merits and demerits for mobile environment.  


Author(s):  
A K M Bahalul Haque ◽  
Samira Mahmood ◽  
Maruf Ahmed ◽  
Md. Hayder Ali ◽  
Nafisa Mahbub Piyal

Presently, smartphones support a large range of applications, many of which require high computing power. This presents a problem because smartphones offer limited computing power, storage, and energy. Fortunately, Cloud computing (CC) is rapidly becoming known as the state of the art technology in the computer world. CC allows users to use unlimited dynamic resources when necessary. Mobile Cloud Computing (MCC) is integration into a mobile environment of the concept of cloud computing which eliminates barriers to the performance of mobile devices. The demand for mobile cloud applications and mobile user services is strong. This gives MCC a great opportunity to do business and research. However, security problems are a major obstacle to the adaptability of mobile cloud computing. This study presents the definitions of Cloud Computing, Mobile Computing (MC) and Mobile Cloud Computing including the architecture and applications of MCC. Furthermore, it discusses the challenges and opportunities faced in MCC.


2017 ◽  
Vol 1 (4) ◽  
pp. 143
Author(s):  
Mohammad Bin Ghudayyer ◽  
Yasir Javed ◽  
Mamdouh Alenezi

Security is one of the main concerns of those who want to adopt and migrate to cloud computing technology. Security issues raised by cloud technology reveals that mobile cloud computing is raising the privacy and security issues such as identification and authentication issue, as sometimes the identity and the authentication of the owner of the device or the owner of the data contained in the cloud was not strictly remote. These are some examples that could be considered as major setbacks to the mobile cloud computing adaptation and the reason why some entities are still reluctant of embracing, adopting and migrating to this technology. This research reviews the phenomenon of mobile cloud computing, and the security and privacy issues intrinsic within the area of mobile application and cloud computing with more emphasis on the security and privacy considerations to embrace and migrate to Mobile Cloud Computing.


Author(s):  
Ahmad Salah AlAhmad ◽  
Hasan Kahtan ◽  
Yehia Ibrahim Alzoubi ◽  
Omar Ali ◽  
Ashraf Jaradat

Sign in / Sign up

Export Citation Format

Share Document