SECURITY FRAMEWORKS FOR MOBILE CLOUD COMPUTING: A SURVEY

被引:0
|
作者
Kulkarni, Pallavi [1 ]
Khanai, Rajashri [2 ]
Bindagi, Gururaj
机构
[1] DSATM, E&C, Bangalore, Karnataka, India
[2] KLES Dr MSSCE, E&C, Belgaum, India
关键词
Mobile Computing (MC); Mobile Cloud Computing (MCC); Mobile Cloud Security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud Computing is the long envisaged vision of computing as a utility. Innovative advances in hardware, networking, middleware, and virtual machine technologies have led to an emergence of new, globally distributed computing platforms, namely cloud computing. Cloud Computing provides computation facilities and storage as services accessible from anywhere via the Internet without investing in new infrastructure, training, or software licensing. In other words, Cloud Computing is a way to increase the capacity or add capabilities dynamically. The main advantage of Cloud Computing is that users only utilize what they require and only pay for what they really use. With an exponential growth of the mobile applications and evolution of cloud computing concept, Mobile Cloud Computing (MCC) has been presented as a potential technology for mobile services. MCC incorporates the cloud computing into the mobile environment. Mobile Cloud Computing refers to an infrastructure where data processing and storage can happen away from mobile device. Mobile Cloud Computing (MCC) has transformed the way in which mobile users across the globe leverage services on the go. The obstacles related to performance (e. g. battery life, storage, and bandwidth), environment (e. g. heterogeneity, scalability, availability) and security (e. g. reliability and privacy) are overcome by integrating cloud computing into the mobile environment using MCC. Mobile cloud is a service model, where a mobile device can use the cloud for information storage, searching, data mining and multimedia processing. Cloud Computing technology also brings forth many new challenges for data security and access control when users store sensitive data on cloud servers. As the users no longer have physical possession of the outsourced data, makes the data integrity, privacy and authenticity protection in Cloud Computing a very challenging and potentially difficult task. Though the Cloud Computing benefits are clear, surrendering physical possession of user data, inevitably poses new security risks. In this paper, we discuss Mobile Cloud Computing Security frameworks found in the literature related to Cloud Computing and its environment.
引用
收藏
页码:2507 / 2511
页数:5
相关论文
共 50 条
  • [31] Review of Data Security Frameworks for Secure Cloud Computing
    Umrigar, Kunaal
    Mathew, Rejo
    PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 933 - 941
  • [32] Security Issues and Challenges of Mobile Cloud Computing
    Shahzad, Abid
    Hussain, Mureed
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2013, 6 (06): : 37 - 49
  • [33] Mobile cloud computing and other mobile technologies: Survey
    Abunaser, Amal
    Alshattnawi, Sawsan
    Journal of Mobile Multimedia, 2013, 8 (04): : 241 - 252
  • [34] Computation Offloading for Mobile Cloud Computing Frameworks and Techniques
    Abusaimeh, Hesham
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2022, 11 (03): : 1042 - 1046
  • [35] Security Issues in Cloud and Mobile cloud: A Comprehensive Survey
    Srikanth, G. Umarani
    Jaffrin, Lijetha. C.
    INFORMATION SECURITY JOURNAL, 2022, 31 (06): : 686 - 710
  • [36] Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues
    Bhatia, Tarunpreet
    Verma, A. K.
    JOURNAL OF SUPERCOMPUTING, 2017, 73 (06): : 2558 - 2631
  • [37] Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues
    Tarunpreet Bhatia
    A. K. Verma
    The Journal of Supercomputing, 2017, 73 : 2558 - 2631
  • [38] A survey on top security threats in cloud computing
    Kazim, Muhammad
    Zhu, Shao Ying
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (03) : 109 - 113
  • [39] Cloud Computing Security Issues and Challenges: A Survey
    Verma, Amandeep
    Kaushal, Sakshi
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 4, 2011, 193 : 445 - 454
  • [40] A Survey of Security in Cloud, Edge, and Fog Computing
    Ometov, Aleksandr
    Molua, Oliver Liombe
    Komarov, Mikhail
    Nurmi, Jari
    SENSORS, 2022, 22 (03)