Paper Details

SECURITY, PRIVACY AND CHALLENGES IN MOBILE CLOUD COMPUTING (MCC)

Vol. 2, Jan-Dec 2016 | Page: 58-68

Kamatchi K
Research Scholar, Department of Computer Science & Engineering, Sunrise University, Alwar

Dr. Anu Bharti
Asso. Prof., Dept of Computer Science & Engineering, Sunrise University, Alwar

Received: 08-04-2016, Accepted: 14-05-2016, Published Online: 26-05-2016


. Download Full Paper

Abstract

Mobile Cloud Computing (MCC) is a combination of three main parts; they are mobile device, cloud computing and mobile internet. With the help of MCC, a mobile user gets a rich application delivered over the Internet and powered by cloud-backed infrastructure. The importance of Cloud Computing is increasing and it is receiving a growing attention in the scientific and industrial communities. Now a day’s the major concern for mobile user is security and protection in mobile cloud computing. MCC refers to the availability of cloud computing services in a mobile environment. There are number of loopholes and challenges exist in the security policies of MCC. This paper present a review of MCC, its security & privacy issues and vulnerabilities affecting cloud computing systems, analysed andcomparedvarious possibleapproaches proposedbytheresearcherstoaddress securityandprivacyissues inMCC.

References

  1. Hoang T. Dinh, Chonho Lee, Dusit Niyato, and Ping Wang. “A survey of Mobile Cloud Computing: Architecture, Applications, and Approaches,” Wireless Communications and Mobile Computing,2011.
  2. S.c. Hsueh, lY. Lin, M.Y. Lin, Secure cloud storage for conventional data archive of smart phones, in: Proc. 15th IEEE Int. Symposium on Consumer Electronics, TSCE ' II, Singapore, June2011
  3. W. Jla, H. Zhu, Z. Cao, L. Wei, X. Lin, SDSM: a secure data service mechanism in mobile cloud computing, in: Proc. IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS, Shanghai, China, Apr.2011.
  4. Abdul Nasir Khana, M.L. Mat Kiah a, Samee U. Khanb, Saljad A Madanic, "Towards secure mobile cloud computing: A survey", Future Generation Computer Systems, August2012.
  5. Dimitrios Zissis, Dimitrios Lekkas," Addressing cloud computing security issues", Future Generation Computer Systems Volume 28, Issue 3, March 2012, Pages583-592
  6. HuiSuo,ZhuohuaLiu,JiafuWan“SecurityandPrivacyinMobileCloudComputing”978-1-4673-2480- 9©2013IEEE
  7. Ranbijay Kumar, Dr. S. Rajalakshmi “Mobile Cloud Computing Standard approach to protecting and securing of mobile cloud ecosystems” 2013 IEEE International Conference on Computer Sciences andApplications
  8. Ahmad Salah Al-Ahmad, Syed Ahmad Aljunid “Mobile Cloud Computing Testing Review” 2013 IEEE International Conference on Advanced Computer Science Applications andTechnologies
  9. N. Fernando, S. W. Loke, and W. Rahayu, “Mobile cloud computing: A survey,” Future Generation Computer Systems, vol. 29, no. 1, pp. 84– 106, January2013.
  10. H. T. Dinh, C. Lee, D. Niyato, and P. Wang, “A survey of mobile cloud computing: Architecture, applications, and approaches,” Wireless Communications and Mobile Computing,2013.
  11. Khanai, R. ; Dept. of Electr. & Electron. Eng., Gogte Inst. of Tech., Belgaum, India; Kulkarni, G.H. ; Torse, D.A. "Neural Crypto-Coding as DES: Turbo over Land Mobile Satellite (LMS) channel" Published in Communications and Signal Processing (ICCSP), 2014 International Conference on 3-5 April 2014 ,Melmaruvathur.
  12. Rajashri Khanai, G. H. Kulkarni, "Crypto-Coding as DES-Convolution for Land Mobile Satellite Channel", International Journal of Computer Applications © 2014 by IlCA Journal Volume 86 - Number 18 Year of Publication:2014
  13. Honggang Wang, Shaoen Wu, Min Chen, Huazhong ,Wei Wang, Secunty ProtectIOn between Users and the Mobile Media Cloud" IEEE Communications Magazine ,Volume 52,issue 3, March2014
  14. Dr. Vineet Shanna, Preeti Garg “An Efficient and Secure Data Storage in Mobile Cloud Computing through RSA and Hash Function” 978-1- 4799-2900-9 ©2014IEEE
  15. Iehab AL Rassan, Hanan AlShaher “Securing Mobile Cloud Computing using Biometric Authentication (SMCBA) ” 2014 IEEE International Conference on Computational Science and ComputationalIntelligence
  16. Dipayan Dev, Krishna Lal Baishnab “A Review and Research towards Mobile Cloud Computing” 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
  17. Z. Sanaei, S. Abolfazli, A. Gani, and R. Buyya, “Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges,” IEEE Communications Surveys and Tutorials, vol. 16, no. 1, 2014, pp.369-392.
  18. . R.Buyya,“IntroductiontotheIEEETransactionsonCloudComputing,”IEEETransactionsonCloudCo mputing,vol.1,no.1,2014,pp.3-9.
  19. H. Hu, Y. Wen, T.S. Chua and X. Li, “Toward Scalable Systems for Big Data Analytics: A Technology Tutorial,” IEEE Access, vol. 2, 2014, pp.652-687
  20. Oberheide, J., Veeraraghavan, K., Cooke, E. and Jahanian, F.2008,Virtualized in-cloud security services for mobile devices. In Proceedings of the 1st Workshop on Virtualization in Mobile Computing (MobiVirt),31-35.
  21. Zhang, X., Schiffman, J.,. Gibbs S, Kunjithapatham, A., and Jeong S.2009,Securing elastic applications on mobile devices for cloud computing.InProceedingACMworkshoponCloud computing security,CCSW’09,Chicago,IL,USA
  22. Xiao, S. and Gong ,W.,2010. Mobility can help: protect user identity with dynamic credential.In Proceeding 11th International Conference on Mobile Data Management, MDM ’10, Missouri, USA, May2010.
  23. Wang, S .and S. Wang X.,” In-device spatial cloaking for mobile user privacy assisted by the cloud”, in Proceeding 11th Interantional ConferenceonMobileDataManagement,MDM’10,Missouri,USA,May2010.
  24. Huang, X. Zhang, M. Kang and J. Luo,” MobiCloud: building secure cloud framework for mobile computing and communication,” in Proceeding5thIEEEInternationalSymposiumonServiceOrientedSystemEngineering,SOSE’10,N anjing,China,June2010.
  25. G. Portokalidis,P. Homburg,K. Anagnostakis and H. Bos,”Paranoid Android: versatile protection for smartphones,” in Proceedings of the 26th AnnualComputerSecurityApplicationConference(ACSAC),September2010,pp.347-356.
  26. R. Chow, M. Jakobsson, R. Masuoka, J. Molina, Y. Niu, E. Shi and Z. Song,” Authentication in the clouds: a framework and its application to mobileusers,”inProceedingACMCloudComputingSecurityWorkshop,CCSW’10,Chicago,USA, Oct.2010.
  27. W. Jia, H. Zhu, Z. Cao, L. Wei and X. Lin,” SDSM: a secure data service mechanism in mobile cloud computing,” in Proceeding IEEE ConferenceonComputerCommunicationsWorkshops,INFOCOMWKSHPS,Shanghai,China,Apr .2011.
  28. J.Yang,H.Wang,J.Wang,C.TanandD.Yu1,“Provabledatapossessionofresourceconstrainedmobile devicesincloudcomputing,”Journal of Networks ,2011,pp.1033–1040.
  29. Saman Zonouz, Amir Houmansadr, Robin barthier, Nikita Borisov,William Sanders,”Secloud:A cloud based comprehensive and lightweight securitysolutionforsmartphones,”publishedinScienceDirect journal ofComputersandsecurity,Volume37,2013,pp.215-227.
  30. Vijay Varadharajan, Senior Member, IEEE, and Udaya Tupakula, Member, IEEE "Security as a Service Model for Cloud Environment" IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 11, NO. 1,MARCH 2014.
  31. 1. Qiao Yan, F. Richard Yu, Senior Member, IEEE, Qingxiang Gong, and Jianqiang Li "SoftwareDefined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges" DOI 10.1109/COMST.2015.2487361, IEEE Communications Surveys &Tutorials
  32. O. Khalid, M. Khan, S. Khan, and A. Zomaya, “Omni Suggest: A Ubiquitous Cloud based Context Aware Recommendation System for Mobile Social Networks,” IEEE Transactions on Services Computing,2014.
  33. Pallavi Kulkarni and Rajashri Khannai, Member, IEEE “Addressing Mobile Cloud Computing Security Issues: A Survey” IEEE ICCSP 2015 Conference.