Recent Advances Delivered in Mobile Cloud Computing's Security and Management Challenges

Author(s):  
Christos Stergiou ◽  
Kostas E. Psannis

Mobile cloud computing provides an opportunity to restrict the usage of huge hardware infrastructure and to provide access to data, applications, and computational power from every place and in any time with the use of a mobile device. Furthermore, MCC offers a number of possibilities but additionally creates several challenges and issues that need to be addressed as well. Through this work, the authors try to define the most important issues and challenges in the field of MCC technology by illustrating the most significant works related to MCC during recent years. Regarding the huge benefits offered by the MCC technology, the authors try to achieve a more safe and trusted environment for MCC users in order to operate the functions and transfer, edit, and manage data and applications, proposing a new method based on the existing AES encryption algorithm, which is, according to the study, the most relevant encryption algorithm to a cloud environment. Concluding, the authors suggest as a future plan to focus on finding new ways to achieve a better integration MCC with other technologies.

Author(s):  
Christos Stergiou ◽  
Kostas E. Psannis

Mobile cloud computing provides an opportunity to restrict the usage of huge hardware infrastructure and to provide access to data, applications, and computational power from every place and in any time with the use of a mobile device. Furthermore, MCC offers a number of possibilities but additionally creates several challenges and issues that need to be addressed as well. Through this work, the authors try to define the most important issues and challenges in the field of MCC technology by illustrating the most significant works related to MCC during recent years. Regarding the huge benefits offered by the MCC technology, the authors try to achieve a more safe and trusted environment for MCC users in order to operate the functions and transfer, edit, and manage data and applications, proposing a new method based on the existing AES encryption algorithm, which is, according to the study, the most relevant encryption algorithm to a cloud environment. Concluding, the authors suggest as a future plan to focus on finding new ways to achieve a better integration MCC with other technologies.


2019 ◽  
pp. 1273-1300
Author(s):  
Abhishek Majumder ◽  
Samir Nath ◽  
Avijit Das

With the help of cloud computing Mobile Cloud Computing (MCC) overcomes the limitations of a mobile device such as security, performance and environment. But, security of the data stored in the cloud is a very challenging issue. Since the cloud cannot be fully trusted, data stored in the cloud is not fully secured. Integrity of the stored data is very important for the data owner. Therefore, it is a big problem to maintain the integrity of the data stored in the cloud environment. This chapter discusses existing schemes for data integrity in the mobile cloud environment. In this chapter a scheme has been proposed for enhancing data integrity in Mobile Cloud Environment. To make integrity checking fast the size of the data file is used. It has also been shown that how fast the integrity loss can be detected if the file size is considered. Finally, the proposed scheme is compared with some of the existing scheme.


Author(s):  
Abhishek Majumder ◽  
Samir Nath ◽  
Avijit Das

With the help of cloud computing Mobile Cloud Computing (MCC) overcomes the limitations of a mobile device such as security, performance and environment. But, security of the data stored in the cloud is a very challenging issue. Since the cloud cannot be fully trusted, data stored in the cloud is not fully secured. Integrity of the stored data is very important for the data owner. Therefore, it is a big problem to maintain the integrity of the data stored in the cloud environment. This chapter discusses existing schemes for data integrity in the mobile cloud environment. In this chapter a scheme has been proposed for enhancing data integrity in Mobile Cloud Environment. To make integrity checking fast the size of the data file is used. It has also been shown that how fast the integrity loss can be detected if the file size is considered. Finally, the proposed scheme is compared with some of the existing scheme.


2021 ◽  
Vol 48 (3) ◽  
Author(s):  
Santosh K. Yadav ◽  
◽  
Rakesh Kumar ◽  

The mobile device has become an essential utility tool for more effective computation, storage, and power, making it suitable for mobile cloud computing. The cloudlet is used as a connectivity establishment link between the mobile device and the cloud. The objective of this paper is to focus on mobile cloud computing facilitated with cloudlet-based computation. The latter possesses inter-cloudlet communication, which had been proposed within the mobile cloudletbased computing environment framework. The same had been further enhanced to scalable critical parameter yield of resources framework. Nevertheless, this was not taken to the criteria, which would impact the yield factor, in terms of availability. The present research endeavor aims to improve the algorithm by considering some more criterion and provides a new mobile cloud computing framework for data execution as a service using cloudlet. The outcome shows a positive result in the cloud- cloudlet based computation.


2018 ◽  
Author(s):  
Mohammed-Ali Anwar

Mobile Cloud Computing (MCC) is a recent technological development, which has emerged from two popular technology trends; mobile computing and cloud. In essence it revolutionises the capabilities of mobile devices by integrating both storage and processing of the cloud environment with mobile computing and in doing so providing greater optimisation and operating power, allowing for transparent and seamless use of resources provided by the cloud. However, expanding the capability of resource constrained mobile devices in this manner comes at a price. There are many risks associated with the security of data within the cloud environment and as MCC essentially uses the cloud, it also inherits any security issues that are associated with cloud computing. The aim of this survey is to identify potential data security issues, and analyse and present some pioneering security mechanisms and finally suggest some future directions for better data security with MCC.


Author(s):  
Seada Abdu Wakene ◽  
Sisay Muleta Hababa ◽  
Gutema Seboka Daba ◽  
K S Ananda Kumar

Mobile cloud computing (MCC) combines cloud computing and mobile computing to deliver vast computational resources to mobile consumers, network operators, and cloud computing providers. You may access your data from anywhere in the globe using any mobile device that is linked to the Internet. Cloud computing provides access to data in real-time whenever and wherever want. Any conventional mobile device can benefit from MCC's infrastructure, computational capacity, software, and platform services. Network security, web application security, data access, authentication, authorization, data confidentiality, and data breach are all concerns of MCC's security. Because mobile devices lack sufficient storage and processing power, their data storage capacity is limited. Users of mobile devices may inadvertently provide sensitive information over the network or through the application. Therefore, data security is the main concern for mobile device users. The objective of this paper is to find a solution that can enhance technical requirements with relation to user’s data security and privacy in mobile cloud computing. To achieve this improved blowfish encryption algorithm is used to encrypt each user’s data security and where the shared secret key is hash down using message digest called secured hash function. Hashing can increase the integrity and privacy of user data. The proposed algorithm is evaluated with a normal blowfish algorithm and 3DES with different parameters. Improved blowfish algorithm shows better performance than normal blowfish algorithm and 3DES. In this work, we have developed web-based application where the Amazon MySQL RDS database is used for data storage.


Author(s):  
Muhammad Faheem ◽  
Mohand-Tahar Kechadi ◽  
Nhien An Le-Khac

Smartphones have become popular in recent days due to the accessibility of a wide range of applications. These sophisticated applications demand more computing resources in a resource constraint smartphone. Cloud computing is the motivating factor for the progress of these applications. The emerging mobile cloud computing introduces a new architecture to offload smartphone and utilize cloud computing technology to solve resource requirements. The popularity of mobile cloud computing is an opportunity for misuse and unlawful activities. Therefore, it is a challenging platform for digital forensic investigations due to the non-availability of methodologies, tools and techniques. The aim of this work is to analyze the forensic tools and methodologies for crime investigation in a mobile cloud platform as it poses challenges in proving the evidence.


2014 ◽  
Vol 573 ◽  
pp. 549-555
Author(s):  
P. Thanapal ◽  
M.A. Saleem Durai

Mobile cloud computing will wear down gaining quality among users, the researchers predicts these troubles by execution of mobile applications on application suppliers external to the mobile device. During this paper, we have a tendency to gift a wide survey of mobile cloud computing, whereas prominence the particular considerations in mobile cloud computing square measure as follows. (a) Highlights the present state in Application of cloud computing usage in real time world. (b) Identifies the problems in testing bandwidth and (c) provides a optimizing of the offloading that saves energy


Author(s):  
Raghvendra Kumar ◽  
Prasant Kumar Pattnaik ◽  
Priyanka Pandey

Unfortunately, most of the widely used protocols for remote desktop access on mobile devices have been designed for scenarios involving personal computers. Furthermore, their energy consumption at the mobile device has not been fully characterized. In this chapter, we specially address energy consumption of mobile cloud networking realized through remote desktop technologies. In order to produce repeatable experiments with comparable results, we design a methodology to automate experiments with a mobile device. Furthermore, we develop an application that allows recording touch events and replaying them for a certain number of times. Moreover, we analyze the performance of widely used remote desktop protocols through extensive experiments involving different classes of mobile devices and realistic usage scenarios. We also relate the energy consumption to the different components involved and to the protocol features. Finally, we provide some considerations on aspects related to usability and user experience.


Author(s):  
Raghvendra Kumar ◽  
Prasant Kumar Pattnaik ◽  
Priyanka Pandey

Unfortunately, most of the widely used protocols for remote desktop access on mobile devices have been designed for scenarios involving personal computers. Furthermore, their energy consumption at the mobile device has not been fully characterized. In this chapter, we specially address energy consumption of mobile cloud networking realized through remote desktop technologies. In order to produce repeatable experiments with comparable results, we design a methodology to automate experiments with a mobile device. Furthermore, we develop an application that allows recording touch events and replaying them for a certain number of times. Moreover, we analyze the performance of widely used remote desktop protocols through extensive experiments involving different classes of mobile devices and realistic usage scenarios. We also relate the energy consumption to the different components involved and to the protocol features. Finally, we provide some considerations on aspects related to usability and user experience.


Sign in / Sign up

Export Citation Format

Share Document