SECURITY, PRIVACY AND CHALLENGES IN MOBILE CLOUD COMPUTING (MCC)
Vol. 2, Jan-Dec 2016 | Page: 58-68
Abstract
Mobile Cloud Computing (MCC) is a combination of three main parts; they are mobile device, cloud computing and mobile internet. With the help of MCC, a mobile user gets a rich application delivered over the Internet and powered by cloud-backed infrastructure. The importance of Cloud Computing is increasing and it is receiving a growing attention in the scientific and industrial communities. Now a day’s the major concern for mobile user is security and protection in mobile cloud computing. MCC refers to the availability of cloud computing services in a mobile environment. There are number of loopholes and challenges exist in the security policies of MCC. This paper present a review of MCC, its security & privacy issues and vulnerabilities affecting cloud computing systems, analysed andcomparedvarious possibleapproaches proposedbytheresearcherstoaddress securityandprivacyissues inMCC.
References
- Hoang T. Dinh, Chonho Lee, Dusit Niyato, and Ping Wang. “A survey of Mobile Cloud Computing: Architecture, Applications, and Approaches,” Wireless Communications and Mobile Computing,2011.
- S.c. Hsueh, lY. Lin, M.Y. Lin, Secure cloud storage for conventional data archive of smart phones, in: Proc. 15th IEEE Int. Symposium on Consumer Electronics, TSCE ' II, Singapore, June2011
- W. Jla, H. Zhu, Z. Cao, L. Wei, X. Lin, SDSM: a secure data service mechanism in mobile cloud computing, in: Proc. IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS, Shanghai, China, Apr.2011.
- Abdul Nasir Khana, M.L. Mat Kiah a, Samee U. Khanb, Saljad A Madanic, "Towards secure mobile cloud computing: A survey", Future Generation Computer Systems, August2012.
- Dimitrios Zissis, Dimitrios Lekkas," Addressing cloud computing security issues", Future Generation Computer Systems Volume 28, Issue 3, March 2012, Pages583-592
- HuiSuo,ZhuohuaLiu,JiafuWan“SecurityandPrivacyinMobileCloudComputing”978-1-4673-2480- 9©2013IEEE
- Ranbijay Kumar, Dr. S. Rajalakshmi “Mobile Cloud Computing Standard approach to protecting and securing of mobile cloud ecosystems” 2013 IEEE International Conference on Computer Sciences andApplications
- Ahmad Salah Al-Ahmad, Syed Ahmad Aljunid “Mobile Cloud Computing Testing Review” 2013 IEEE International Conference on Advanced Computer Science Applications andTechnologies
- N. Fernando, S. W. Loke, and W. Rahayu, “Mobile cloud computing: A survey,” Future Generation Computer Systems, vol. 29, no. 1, pp. 84– 106, January2013.
- H. T. Dinh, C. Lee, D. Niyato, and P. Wang, “A survey of mobile cloud computing: Architecture, applications, and approaches,” Wireless Communications and Mobile Computing,2013.
- Khanai, R. ; Dept. of Electr. & Electron. Eng., Gogte Inst. of Tech., Belgaum, India; Kulkarni, G.H. ; Torse, D.A. "Neural Crypto-Coding as DES: Turbo over Land Mobile Satellite (LMS) channel" Published in Communications and Signal Processing (ICCSP), 2014 International Conference on 3-5 April 2014 ,Melmaruvathur.
- Rajashri Khanai, G. H. Kulkarni, "Crypto-Coding as DES-Convolution for Land Mobile Satellite Channel", International Journal of Computer Applications © 2014 by IlCA Journal Volume 86 - Number 18 Year of Publication:2014
- Honggang Wang, Shaoen Wu, Min Chen, Huazhong ,Wei Wang, Secunty ProtectIOn between Users and the Mobile Media Cloud" IEEE Communications Magazine ,Volume 52,issue 3, March2014
- Dr. Vineet Shanna, Preeti Garg “An Efficient and Secure Data Storage in Mobile Cloud Computing through RSA and Hash Function” 978-1- 4799-2900-9 ©2014IEEE
- Iehab AL Rassan, Hanan AlShaher “Securing Mobile Cloud Computing using Biometric Authentication (SMCBA) ” 2014 IEEE International Conference on Computational Science and ComputationalIntelligence
- Dipayan Dev, Krishna Lal Baishnab “A Review and Research towards Mobile Cloud Computing” 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
- Z. Sanaei, S. Abolfazli, A. Gani, and R. Buyya, “Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges,” IEEE Communications Surveys and Tutorials, vol. 16, no. 1, 2014, pp.369-392.
- . R.Buyya,“IntroductiontotheIEEETransactionsonCloudComputing,”IEEETransactionsonCloudCo mputing,vol.1,no.1,2014,pp.3-9.
- H. Hu, Y. Wen, T.S. Chua and X. Li, “Toward Scalable Systems for Big Data Analytics: A Technology Tutorial,” IEEE Access, vol. 2, 2014, pp.652-687
- Oberheide, J., Veeraraghavan, K., Cooke, E. and Jahanian, F.2008,Virtualized in-cloud security services for mobile devices. In Proceedings of the 1st Workshop on Virtualization in Mobile Computing (MobiVirt),31-35.
- Zhang, X., Schiffman, J.,. Gibbs S, Kunjithapatham, A., and Jeong S.2009,Securing elastic applications on mobile devices for cloud computing.InProceedingACMworkshoponCloud computing security,CCSW’09,Chicago,IL,USA
- Xiao, S. and Gong ,W.,2010. Mobility can help: protect user identity with dynamic credential.In Proceeding 11th International Conference on Mobile Data Management, MDM ’10, Missouri, USA, May2010.
- Wang, S .and S. Wang X.,” In-device spatial cloaking for mobile user privacy assisted by the cloud”, in Proceeding 11th Interantional ConferenceonMobileDataManagement,MDM’10,Missouri,USA,May2010.
- Huang, X. Zhang, M. Kang and J. Luo,” MobiCloud: building secure cloud framework for mobile computing and communication,” in Proceeding5thIEEEInternationalSymposiumonServiceOrientedSystemEngineering,SOSE’10,N anjing,China,June2010.
- G. Portokalidis,P. Homburg,K. Anagnostakis and H. Bos,”Paranoid Android: versatile protection for smartphones,” in Proceedings of the 26th AnnualComputerSecurityApplicationConference(ACSAC),September2010,pp.347-356.
- R. Chow, M. Jakobsson, R. Masuoka, J. Molina, Y. Niu, E. Shi and Z. Song,” Authentication in the clouds: a framework and its application to mobileusers,”inProceedingACMCloudComputingSecurityWorkshop,CCSW’10,Chicago,USA, Oct.2010.
- W. Jia, H. Zhu, Z. Cao, L. Wei and X. Lin,” SDSM: a secure data service mechanism in mobile cloud computing,” in Proceeding IEEE ConferenceonComputerCommunicationsWorkshops,INFOCOMWKSHPS,Shanghai,China,Apr .2011.
- J.Yang,H.Wang,J.Wang,C.TanandD.Yu1,“Provabledatapossessionofresourceconstrainedmobile devicesincloudcomputing,”Journal of Networks ,2011,pp.1033–1040.
- Saman Zonouz, Amir Houmansadr, Robin barthier, Nikita Borisov,William Sanders,”Secloud:A cloud based comprehensive and lightweight securitysolutionforsmartphones,”publishedinScienceDirect journal ofComputersandsecurity,Volume37,2013,pp.215-227.
- Vijay Varadharajan, Senior Member, IEEE, and Udaya Tupakula, Member, IEEE "Security as a Service Model for Cloud Environment" IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 11, NO. 1,MARCH 2014.
- 1. Qiao Yan, F. Richard Yu, Senior Member, IEEE, Qingxiang Gong, and Jianqiang Li "SoftwareDefined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges" DOI 10.1109/COMST.2015.2487361, IEEE Communications Surveys &Tutorials
- O. Khalid, M. Khan, S. Khan, and A. Zomaya, “Omni Suggest: A Ubiquitous Cloud based Context Aware Recommendation System for Mobile Social Networks,” IEEE Transactions on Services Computing,2014.
- Pallavi Kulkarni and Rajashri Khannai, Member, IEEE “Addressing Mobile Cloud Computing Security Issues: A Survey” IEEE ICCSP 2015 Conference.
Kamatchi K
Research Scholar, Department of Computer Science & Engineering, Sunrise University, Alwar
Dr. Anu Bharti
Asso. Prof., Dept of Computer Science & Engineering, Sunrise University, Alwar
Received: 08-04-2016, Accepted: 14-05-2016, Published Online: 26-05-2016