REVIEW PAPER ON MOBILE CLOUD COMPUTING SECURITY
Keywords:
Mobile Cloud Computing, Mobile Computing, Cloud Computing, Mobile Cloud Computing security, Data securityAbstract
Nowadays smart-phones are being capable of supporting a broad range of applications, many of which demand an increasing computational power. This leads to a challenge because smart-phones are resourceconstrained devices with finite computation power, memory, storage, and energy. With the development of mobility and cloud computing, mobile cloud computing (MCC) has introduced and become a point of research. With the need of extendibility and on-demand self-service, it can provide the good infrastructure, platform and software services in a cloud to mobile clients through the mobile network. Therefore, Cloud computing is anticipated to bring an innovation in mobile computing, where the mobile devices can make use of clouds for data processing, storage and other intensive operations. Despite the surprising advancement achieved by MCC, the clients of MCC are still below expectations due to the related risks in terms of security and confidentiality. The more and more information is placed onto the cloud by individuals and enterprises, the more the security issue begins to grow. This paper presents the various security issues that arise about how secure the mobile cloud computing environment is.
References
Gellman R., “Privacy in clouds: Risks to security and confidentiality with cloud computing,” The World Privacy Forum, 2009.
http://www.worldprivacyforum.org/WPF_Cloud_Privacy_Report.pdf.
Grossman R. L., “The Case for Cloud Computing,” IT Professional, vol. 11(2), pp. 23-27, Mar-April, 2009, ISSN: 1520-9202, INSPEC Accession Number: 10518970, DOI: 10.1109/MITP.2009.40.
Dinh H. T., Chonho Lee, Dusit Niyato and Ping Wang, “A survey of mobile cloud computing: infrastructure, applications, and approaches,” Wirel. Commun. Mob. Comput. ,2011.
Ingthorsson Olafur; “Improving the Mobile Cloud”, July 18, 2011 in Cloud Computing and Mobile Cloud Computing. http://cloudcomputingtopics.com/2011/07/improvingthe- mobile-cloud/.
Itani W., A. Kayssi, A. Chehab, “Energyefficient incremental cryptography for securing storage in mobile cloud computing,” in: Proc. Int. Conference on Energy Aware Computing, ICEAC ’10, Cairo, Egypt, Dec. 2010.
Jensen Meiko, Jorg Schwenk, Nils Gruschka, Luigi Lo Iacon, “On technical Security Issues in Cloud Computing,” Proc. of IEEE International Conference on Cloud Computing (CLOUD-II, 2009), pp. 109-116, India, 2009.
Kaufman Lori M., “Data security in the world of cloud computing,” IEEE Security and Privacy Journal, vol. 7, issue. 4, pp. 61-64, July- Aug 2009, ISSN: 1540-7993, INSPEC Accession Number: 10805344, DOI: 10.1109/MSP.2009.87.
(2009, Sept) Mobile cloud computing subscribers to total nearly one billion by 2014. [Online]. Available: http://www.abiresearch.com/press/1484
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2015 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.