REVIEW PAPER ON MOBILE CLOUD COMPUTING SECURITY

Authors

  • RAUT PD (M.E.) Computer Science and Engineering G.H.Raisoni College Of Engineering and Management, Amravati Amravati, Maharashtra 444701, India
  • DATAR DS G.H.Raisoni College Of Engineering and Management, Amravati Amravati, Maharashtra 444701, India

Keywords:

Mobile Cloud Computing, Mobile Computing, Cloud Computing, Mobile Cloud Computing security, Data security

Abstract

Nowadays smart-phones are being capable of supporting a broad range of applications, many of which demand an increasing computational power. This leads to a challenge because smart-phones are resourceconstrained devices with finite computation power, memory, storage, and energy. With the development of mobility and cloud computing, mobile cloud computing (MCC) has introduced and become a point of research. With the need of extendibility and on-demand self-service, it can provide the good infrastructure, platform and software services in a cloud to mobile clients through the mobile network. Therefore, Cloud computing is anticipated to bring an innovation in mobile computing, where the mobile devices can make use of clouds for data processing, storage and other intensive operations. Despite the surprising advancement achieved by MCC, the clients of MCC are still below expectations due to the related risks in terms of security and confidentiality. The more and more information is placed onto the cloud by individuals and enterprises, the more the security issue begins to grow. This paper presents the various security issues that arise about how secure the mobile cloud computing environment is.

References

Gellman R., “Privacy in clouds: Risks to security and confidentiality with cloud computing,” The World Privacy Forum, 2009.

http://www.worldprivacyforum.org/WPF_Cloud_Privacy_Report.pdf.

Grossman R. L., “The Case for Cloud Computing,” IT Professional, vol. 11(2), pp. 23-27, Mar-April, 2009, ISSN: 1520-9202, INSPEC Accession Number: 10518970, DOI: 10.1109/MITP.2009.40.

Dinh H. T., Chonho Lee, Dusit Niyato and Ping Wang, “A survey of mobile cloud computing: infrastructure, applications, and approaches,” Wirel. Commun. Mob. Comput. ,2011.

Ingthorsson Olafur; “Improving the Mobile Cloud”, July 18, 2011 in Cloud Computing and Mobile Cloud Computing. http://cloudcomputingtopics.com/2011/07/improvingthe- mobile-cloud/.

Itani W., A. Kayssi, A. Chehab, “Energyefficient incremental cryptography for securing storage in mobile cloud computing,” in: Proc. Int. Conference on Energy Aware Computing, ICEAC ’10, Cairo, Egypt, Dec. 2010.

Jensen Meiko, Jorg Schwenk, Nils Gruschka, Luigi Lo Iacon, “On technical Security Issues in Cloud Computing,” Proc. of IEEE International Conference on Cloud Computing (CLOUD-II, 2009), pp. 109-116, India, 2009.

Kaufman Lori M., “Data security in the world of cloud computing,” IEEE Security and Privacy Journal, vol. 7, issue. 4, pp. 61-64, July- Aug 2009, ISSN: 1540-7993, INSPEC Accession Number: 10805344, DOI: 10.1109/MSP.2009.87.

(2009, Sept) Mobile cloud computing subscribers to total nearly one billion by 2014. [Online]. Available: http://www.abiresearch.com/press/1484

Downloads

Published

2024-02-26

How to Cite

RAUT, P. D., & DATAR, D. S. (2024). REVIEW PAPER ON MOBILE CLOUD COMPUTING SECURITY. COMPUSOFT: An International Journal of Advanced Computer Technology, 4(05), 1822–1825. Retrieved from https://ijact.in/index.php/j/article/view/319

Issue

Section

Review Article

Similar Articles

<< < 21 22 23 24 25 26 27 28 29 30 > >> 

You may also start an advanced similarity search for this article.