Security and Privacy Issues and Solutions of Mobile Cloud Computing

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Security and Privacy Issues and Solutions of

Mobile Cloud Computing


*Note: Sub-titles are not captured in Xplore and should not be used

line 1: 1st Given Name Surname line 1: 2nd Given Name Surname line 1: 3rd Given Name Surname
line 2: dept. name of organization line 2: dept. name of organization line 2: dept. name of organization
(of Affiliation) (of Affiliation) (of Affiliation)
line 3: name of organization line 3: name of organization line 3: name of organization
(of Affiliation) (of Affiliation) (of Affiliation)
line 4: City, Country line 4: City, Country line 4: City, Country
line 5: email address or ORCID line 5: email address or ORCID line 5: email address or ORCID

line 1: 4th Given Name Surname line 1: 5th Given Name Surname line 1: 6th Given Name Surname
line 2: dept. name of organization line 2: dept. name of organization line 2: dept. name of organization
(of Affiliation) (of Affiliation) (of Affiliation)
line 3: name of organization line 3: name of organization line 3: name of organization
(of Affiliation) (of Affiliation) (of Affiliation)
line 4: City, Country line 4: City, Country line 4: City, Country
line 5: email address or ORCID line 5: email address or ORCID line 5: email address or ORCID

Abstract—Simplicity usage, accessibility and the lack of every month (one Exabyte=1018 bytes) at the CAGR
internationally agreed overall service access / safety protocols (compound annual growth rate) of 53% between 2015 and
allow the mobile cloud vulnerable to various forms of violence. 2020, as shown in the report published by Cisco (2016) [2].
The introduction of smartphones and the extensive usage of However, there is no technology that has only benefits and
other technology such as smartphones has brought significant no issues at all. Similarly, the main challenge in mobile cloud
changes to cloud storage, providing a higher level of versatility computing today is still having privacy and security issues.
in data access, and thus increasing the need for security In virtual business and healthcare technologies, these are
protocols. Unlike many problems, when dealing with business
extremely crucial and represented by confidential and
goals, financial activity and health care, protection and
lengthy transactions, which involve both the protection of
confidentiality are critical. In this study, we discuss mobile
cloud computing in detail, then the model and role of the whole
data and confidentiality of the users [3]. A range of
technology. Finally, we dragged some solutions for the three influences is behind this design thinking process. Initially,
level security and privacy concerns. their extreme capacity limitation is a prominent problem of
mobile platforms, because they may be made up of small
Keywords—Mobile cloud computing, Technology, privacy detectors or chips which have restricted computing power
issues, security and speed. This makes it difficult to implement complex and
dynamic encryption algorithms. In contrast to their cabled
I. INTRODUCTION equivalents, implementing protection was often a serious
Mobile cloud computing has become a buzzword since hurdle because of their intrinsic storage and broadcasting
2009 in the technology world. Statistical analysis from IDC 's distribution, and because of their system limitations.
Worldwide Quarterly Cloud IT Infrastructure Tracker, Secondly, unified traffic, unforeseeable shifts in topology,
International Data Corporation (IDC 2016) published a varying distributions in nodes, large network levels, and high
quarterly cloud revenue report for different clouds . This list bit error ratios dominate interaction across the mobile source
demonstrates the number of servers, hard disks, and and the network. Thirdly, the mistakes of a user using a cloud
peripheral equipment installed in the cloud system. As shown network to handle confidential and cost-effective data may
by IDC in 2015, cloud IT technology software provider's result in a high risk for data robbery transmitted from the
gross profit rose 21.9 percent every year to $29.0 billion [1]. cloud to the tablet or smartphone. [4] The purpose of the
It is a significant invention as the resource limitations like- study is to introduce the main challenges and privacy issues
memory shortage, battery, and processing power of the in mobile cloud computing that have become the main
handful of devices are resolved. In the busy schedule of concern of every mobile cloud computing user and
today's world, it is obviously a great technology to keep users researchers. Focusing on the previous studies, here the
comfortable to work with useful data anytime from solutions are provided that may be effective to resolve the
anywhere. As the area of wide-ranging wireless networking problem.
technology, including Wi-Fi, 5th-generation/advanced 5G- II. OVERVIEW OF MOBILE CLOUD COMPUTING
mm-wave connectivity is going to make for smartphone
users to use cloud infrastructure easier than before. Also, A. Mobile Cloud Computing
mobile cloud computing has become an important trigger for In brief, the Mobile Cloud Computing is a combination of
the expanding popularity of mobile devices and cloud mobile computing and cloud computing. In this technology,
services. The different types of mobile cloud computing data are kept in cloud repositories and the main operation in
conducted by mobile gadgets include video play, voice video the cloud system is moved in such a way that even a mobile
sharing, data storage, web surfing, networking sites. The user is clear of practical limitations on current handheld
cellular data traffic is anticipated to raise 30.6 Exabytes for devices. In addition, cloud computing services are used by

XXX-X-XXXX-XXXX-X/XX/$XX.00 ©20XX IEEE


wireless media for connectivity among mobile platforms and operators enables customers to access their own
clouds. [5] The main three components for this technology connections, regulate the traffic and communicate to
are- mobile devices, wireless connection channels, and cloud. servers. [10] For example- OpenStack Network
As the authors claim in their studies (Sanaei et al. , 2012), the Service.
Mobile Cloud Computing is an enriched mobile computer
technology, which uses standardized flexible resources of  Mobile Web as a service (MIaaS): The service
various clouds and network infrastructure to provide providers provide cloud infrastructure and storage
unregulated connectivity, space and mobility and, for mobile users in this service model. Examples of
irrespective of constrained systems and frameworks, serves this are- the iCloud drive and Google drive for
numerously portable devices anywhere on Web [6]. mobile users.
 Mobile Data as a service (MDaaS): The service
providers offer database-related services in this
B. Mobile Cloud Application model to allow mobile users to control their records,
Since the skyrocketing growth of mobile devices, transactions, and other information-related activities.
companies are developing emerging forms of application for For instance- mobile cloud data from the service
these devices and many provide cloud-based services since Oracle and cloud DB.
robust usability. [7] Mobile users can gain enriched cloud  Mobile App as a Service (MAppaaS): This system of
solutions and services even on resource-limited devices from service allows users in all wireless networks to enter,
these apps. Size-up or downgrade of these systems must be use and perform cloud-based mobile applications.
done immediately to meet both desktop and mobile device Example: Google Play Store applications
standards. The program needs to be split into mobile cloud (www.play.google.com / store / apps).
applications and components in accordance with the
specifications. Applications that involve local mobile tools,  Mobile Multimedia as a Service (MMaaaS): In here
such as various sensors, need not be downloaded into the users can manage and control multimedia
cloud. But the modules that are extremely resource-intensive applications, such as tv shows or game consoles, in
must be discharged into the cloud. rich devices via the cellular network.
These apps can thus be classified into three main categories,  Mobile community as a Service (MCaaS): A mobile
like customer-based, customer-cloud based, and cloud-based user team can construct and maintain a mobile social
models.[8] The main implementation of the app is on a network or a group, in which the usages social
mobile device in a customer- cloud-based model. This networks or community programs can be obtained to
customer-cloud based model on the application is divided the user.[11]
into subsystems and portable devices and remote cloud run
these subsystems. In the cloud models, however, the cloud is D. Advantages of Mobile Cloud Computing
part of the app in which the app operates. Increasingly people actually enjoy internet access via
portable devices such as mobile phones and laptop
C. Mobile Cloud Computing Model computers. In reality, however, the mobile device storage
The traditional Mobile Cloud computing model consists space is reduced to ensure the used resources acquired are
of three main components- mobile devices, mobile networks, lower. So, in comparison with a PC, the calculation capacity
and the cloud. [9] of mobile devices is small and the longevity of batteries and
the sharing of information with a Computer are low. Mobile
cloud computing prevails for all these purposes and solves
those problems. Firstly, it is to cross the constraints of the
hardware. Mobile cloud computing allows complicated data
analysis and big data storage in the cloud. [12] The workload
of computation and processing on mobile devices is therefore
lessened. Secondly, it is smarter for load balancing and
electricity saving. Thus the mobile cloud computing can fix
the issues of battery maintenance and enhance the power
consumption of mobile devices. Thirdly, this technology
enables efficient access to data. Fourthly, it reduces the cost
of maintenance by self-service.
III. SECURITY AND PRIVACY CHALLENGES
Privacy and confidentiality are key concerns in mobile
cloud formulation and construction. The main challenges of
security and privacy issues are discussed below-
A. Mobile nodes
Figure 1: Traditional Mobile Cloud Computing Model
Mobile terminals usually have the basic specifications
Wireless devices for cloud connectivity, such as like- free operating system, third-party app support;
smartphones, laptops, computers, etc. are referred to as "personalization;" wireless Internet access wherever or
mobile devices. The protection and privacy concerns are whenever. That's why mobile terminal security problems are
covered with these three factors in the mobile cloud very severe. The following will discuss malware, security
computing infrastructure. problems of software, and other applications.
 Mobile Network as a Service (MNaaS): This model  Malware: The mobile terminal's accessibility and
provides the network infrastructure of network flexibility always capture the ire of hackers. A lot of
malware, along with helpful programs and systems, cybercriminal is to snatch useful information or services.
can instantly be downloaded and brought Attacks can arise from fraudulent foreign, illegal cloud
unidentified to the user. This allows the malware to computing users or inside cloud operators' employees. On the
have unauthorized entry, control the flow, and charge other hand, malicious assailant has the intention of closing
automatically without the user operating. This will the cloud platform. For example- DOS attacks would break
cause users to suffer economically from the mobile connectivity to the network and disable the cloud service.
terminal impact or the spillage of data. Some security [16] When clients supply the cloud service providers with all
providers have built up virus protection for mobile their details without choosing a costly backup and restoration
service they face an accident and poses the risks of data loss.
devices to target malware [13]. Such events occurred over and over in recent years in cloud
 Application software: The key mobile device is providers. That’s why, The cloud supplier has to incorporate
actually the smartphone. And most cell phone users the existing security technology to make sure that the service
use the mobile managerial system to run the is accessible and also, the customers should not rely too
telephone by handling mobile telephone data via much on the cloud supplier.
content syncing between the phone and the
computer. This method normally involves the FTP The proprietorship and control of the information are isolated
(File Transfer Protocol). The username and password in the cloud and users are thus made a major barrier to the
of FTP are transmitted through the network and rising popularity of mobile cloud computing by their worries
about their own information infrastructure. The user
saved in clear text in the config file. [14] In the end, information is also a random manner placed in the shared
unethical access on mobile phones via FTP will lead infrastructure around the world and consumers do not realize
to the leakage of personal data and unauthorized where their data is kept. This increases the risk of sensitivity
disclosure by deliberate deletion and harmful to personal information from users. So, a single method is
activities from computer systems on the same not adequate to establish a secure connection. A complete
network. security solution is only workable in this case.
 Operating system: The Operating system is
responsible for hardware and software resources IV. CHALLENGES
management and operation. And the program is so The mobile cloud computing uses many conventional and
complicated that programming bugs are eliminated. modern technologies, like segmentation, offloading,
Such vulnerabilities are used in certain cases to harm optimization, outsourced backup, mobile cloud-based
useful data by hackers. application, etc., and focuses on a range of new security
 Misoperate by the Users: Sometimes the security issues alongside critical issues. Here is the list of possible
issues in mobile terminals are caused by users. The security and privacy issues inside mobile cloud computing- 
users are unaware of the security of cell phones and  Segmenting and Offloading security challenge
misoperate the device. Allocation to the cloud via mobile networks is required at
the time of offloading procedure. As mobile device users
have no access and influence over their offloading
B. Network Security operations, the possibility of illegal access to offloaded
Compared with the existing network, the mobile network material thus exists. And there's always the risk of breaching
improves the versatility of the network node and its the privacy and confidentiality of offloaded data because of
connectivity. The network node can be expanded to include offloading of data activities in cloud or edge servers instead
mobile devices such as smart telephones, tablets, etc.; of tablet or smartphone. The credibility difficulty comes
mobile devices are able to access the system in a wide range because after operation of offloaded material the mobile
of ways such as smartphone users using telephone and short devices cannot conveniently verify the accuracy of the
messaging apps or other Internet services through 3G/4G/5G outcomes if the consequence is not completely right or
networks. Moreover, on a smartphone, it can also access the modified. Certain problems, furthermore, involve assault on
network via Bluetooth and Wi-Fi. This will lead to greater the usage and risks to illegal material. The jamming attack
security threats like a responsive leak of data or harmful that can impact the accessibility of cloud services among
activities. data / application and mobile device throughout
segmentation as well as between mobile device and server
For example, different types of social spaces (for example, when offloading. 'And also the existence of inappropriate
cafeteria, restaurants, hotel) offer free Wi-Fi, and many content between the segmentation and offloading phase can
individuals have a laptop and free Wi-Fi internet access. In violate the personal privacy of useful information.
this scenario, the likely disclosure of data will occur. In  Security barriers of virtualization
addition to this public Wi-Fi system, even private Wi-Fi Cloud infrastructure providers distribute cloud storage in
faces security hazards because of the vulnerability of the mobile cloud computing using technologies for the
Wi-Fi encryption and decryption process. [15] The virtualization of phone devices. In cloud end, a picture of the
interaction also occurs through various platforms among mobile computer virtual machine (VM) is pre-installed and
mobile devices and cloud service companies which are the set ups are completed. For handling, the mobile device is
increasing security risks every moment. offloaded to the VM. The Virtual Machine is often known as
a thin VM, or computer clone. The key virtualization feature
is to have multiple VMs that run on the same physical
C. Mobile Cloud machine or mobile apps and VMs are segregated one from
the other. Another one kernel layer called hypervisor or VM
The cloud infrastructure is vulnerable to exploitation due to Monitor or Manager (VMM). This allows VMs and their
its high volume of user data resources. The goal of the
other virtual to be built, operated and managed small software from the cloud to the mobile terminal to
systems.  delete the malware. This legal app allows for
 Challenges concerning privacy authentication, certification, and restoration in the
Privacy is one of the biggest hurdles, as sensitive mobile device. CloudA V is an example of anti-
information or applications of mobile users are analyzed and malware. CloudA V is a new concept for mobile
transformed from portable devices to highly scalable cloud device malware detection focused on virus protection
servers even when various cloud services are available. Such as an in-cloud network application. [17] CloudA V
offers a number of important advantages: improved
servers are situated at various locations that only the service
malicious software detection; reduction of antivirus
providers own and operate. Here, users can not really be vulnerability impacts; cumulative holder
physically good enough to warrant the space of their identification; advanced data analysis; enriched
information and therefore data privacy and assistance related deployment and management skills. And it contains
challenges are in the grip of service providers and users are the cross-platform host operator and the network
not responsible for the missing confidentiality. Cloud support with antivirus programs and two cognitive
computing and multi-location retrieval increases privacy monitoring systems.
trouble.
Cloud computing and multi-location computation poses  Software issues: To maintain software issues, it is
privacy concerns. Service provider cloud companies are needed to careful when updating and installing any
located in various regions and countries. Google's cloud software on the mobile. Also, the user should be
looking for the validation and authenticity of the
servers, for instance, are located nearly across the world,
third-party software while installing and
including seven sites in only Americas, two locations in downloading.
Asia and three places in Europe. In addition, it is important
for users to obtain information about the cloud hosting  Maintaining user awareness: At present most of the
location, as the law varies from one country towards cybercrime or hacking occurs due to the carelessness
another. of the users. To prevent the attacks the user should
 Data privacy challenge avoid misoperating the connections. [18] For
The big data security obstacle is presented as the result of example- avoid the unexplained links to ignore
data stored or transmitted by mobile users in clouds placed fishing. Also, turn off the Bluetooth after use and it
at the ends of service providers. The issues associated with is better not to use the public Wi-Fi ofr data security.
It is also important to be careful about transmitting
data include data loss, data theft, data recovery, data
data from stranger devices. These can reduce
localization and data privacy. The loss of data and the malware spreading vastly.
misuse of data violates two security standards, such as
credibility and privacy. In this, data loss implies user data is
in unencrypted form that has been corrupted or missed
B. Mobile Network Security
during preparation, transmission or storage by some
mechanical pressing. In the case of data leak, user data is There are mainly two facts to secure a mobile network. The
being taken, replicated or used by some other unauthorized first is the encryption of data. Due to the best way that
party. communication systems navigate the mobile network is
Those two can be achieved by fraudulent intruders or by relatively safe to transmit information is that the network is
harmful applications from external sources. The issue of encrypted. Proper encryption and decryption are essential to
data recovery is yet another issue. This is a process of maintain data security in the network connection. [19] The
recovery from loss or damage, refused, subverted or lost second is the procedure on defense. Protection protocol
data from mobile users or from physical storage systems. work is the secret to reducing various stances across all sorts
However, in cloud service models, because user data is kept of accessibility methods.
in the facilities of the service providers, users need to know The authors, Alqahtani and Kouadri-Mostefaou suggest a
where their data is processed or stored, and hence the data system in their paper that is focused on transmitted multi-
locality is also a problem. Also the data of the users must be cloud storage, data encryption, and compression algorithms
kept off site from others. If the information blend of one expertise to ensure data protection in MCC. First, the data is
user combines, or confuses with the data of other users, it separated into different sections at the end of the mobile
will be much more dangerous. device according to user choice in this process, and then the
fragments are encrypted and compact. Finally, data is
V. ADVANCED STEPS FOR SECURITY AND PRIVACY maintained on shared multi-cloud. Even so, users can store
In the modern era, different steps are taken to secure one section on their own space to enhance the function of
Mobile Cloud Computing. The latest protection taken for this the security. [20]
technology is discussed here.
A. Mobile Node Security C. Mobile Cloud Security
 Protection from Malware: There are two factors to The performance and reliability of the mobile cloud
do with malware for the mobile node. The one is for computing infrastructure are important for both users and
malware identification and deletion. We should service companies. First of all, cloud services can incorporate
switch the malware detection to the cloud in order to existing security solutions including VPN technology,
resolve the resource constraints on mobile terminals. authentication and authorization, encryption, and other
With this, the identification rate can be increased and technical means, and include the continuous service available
reduce mobile terminal resource usage. So if towards various threats such as DOS attacks and information
malware is found, it is possible to delegate legal theft. [21] Secondly, cloud providers can provide a full
backup and disaster recovery method to restore data from the
users when severe attacks occur. Through this, cloud hosting and mobile cloud computing. There is no simple, uniform
will boost service value and improve the morale of the users. solution, however, that could be applied to the method.
Throughout the expected lifespan from storage to Cloud infrastructure is composed of diverse systems and
transmitting, the confidential data require encryption technologies which renders implementation of a standard
techniques. To avoid any leakage of sensitive information, security mechanism or system complicated. Cloud
the data should be stored in the cloud in the ciphertext. infrastructure is composed of diverse technologies and
Nevertheless, encryption would reduce the data usage rate, so services that makes the implementation of a secure
the emphasis is shifted to the efficient processing and authentication mechanism or system challenging. The lack of
analysis of the cipher text. The latest work on the encoding a cloud computing security framework leaves cloud services
of cipher text is the algorithm for privacy. [22] Strict key susceptible to various kinds of security and privacy risks,
management is another critical function for business users. such as VM-to-VM attacks , malicious command injection,
Once users complete the transition of data to the cloud, unwanted access , data loss, and data corruption. [28]
network security should have a significant part to play. There Furthermore, mobile cloud computing struggles from the
are two sorts of systems for network access. Owner is question and authority of information privacy which are
allocating the connection authorization to the account level national issues. Intra-cloud connectivity providers are a
and all occupants consider sharing this assigned account. The major issue which restricts users from switching between
other one is to pre-assign access privileges to relevant tenant providers of cloud services. In this article, we coherently
systems using the method of the Access Control List (ACL) discussed mobile cloud computing benefits and models, and
[23].  explored security and privacy problems through three levels,
that are mobile devices, mobile networks, and mobile cloud.
Then, we provided suitable systems, such as anti-malware,
D. Privacy Solution privacy security, network distribution and encryption, access
The authors, Pasupuleti et al. suggest a strategy that protects control, etc., as per the problems. Hopefully, with the
the privacy of external provider data in the cloud from updating of the latest technologies mobile cloud computing
mobile devices. Probability - based methodology for the will be more reliable with the increasing security and privacy
encryption algorithms and graded keyword search method system.
are used here. Next, the mobile user creates an index for file REFERENCES
storage and it encrypts both the information and the index
before submitting it to the cloud for storage. [24] Then the
[1] IDC 2016, ‘Worldwide Cloud IT Infrastructure Spend Grew 21.9% to
user creates a trapdoor for queries and transfers them to the $29.0 Billion in 2015’, Press release, Framingham, viewed May 2016,
cloud to read the information stored in the server. Once the http://www.idc.com/getdoc.jsp?containerId=prUS41176716
trapdoor is received by the server, the server begins looking [2] Cisco 2016, ‘Cisco Visual Networking Index: Global Mobile Data
for a list of fitted data entries and their related encrypted Traffic Forecast Update, 2015–2020’, Cisco Systems, pp. 5. viewed
significance ratings. Jun 2016, http://www.cisco.com/c/en/us/solutions/collateral/service-
provider/visualnetworking-index-vni/mobile-white-paper-c11-
In 2015, Niu et al authors suggested a cache coherency 520862.htm
conscious model selection algorithm (CaDSA) to enhance [3] [Akhil Behl 2011, ‘Emerging security challenges in cloud computing:
the confidentiality of mobile users locations. In this An insight to cloud security challenges and their mitigation’, 2011
algorithm the mobile device delivers some false location to World Congress on Information and Communication Technologies,
pp. 217-222, December
location-based service providers with real location
[4] Talukdar, A. K. (2010). Mobile Computing, 2E. Tata McGraw-Hill
information as metadata. [25] So the service provider is Education.
unable to recognize the true location of the user among the [5] Stojmenovic, I. (2002). Handbook of wireless networks and mobile
fakes. computing. New York: Wiley.
Hurel et (2015) al. present an architecture to provide cloud- [6] Sanaei, Z., Abolfazli, S., Gani, A., Shiraz, M., 2012. SAMI:
based security operations for mobile devices. For routing service-based arbitrated multitier infrastructure for mobile cloud
purposes an openflow switch is incorporated with a mobile computing, in Communications in China Workshops (ICCC), 2012.
In: Proceedings of the 1st IEEE International Conference on, pp. 14–
device in this method. Enabled on the cloud side is a safety 19.
officer and openflow development based.[26] All data while [7] [Bahrami, M., Singhal, M., 2015. A Light-Weight Permutation based
connecting mobile devices and interacting with remote Method for Data Privacy in Mobile Cloud Computing, in Mobile
places via openflow control. Cloud Computing, Services, and Engineering (MobileCloud), 2015.
In: Proceedings of the 3rd IEEE International Conference on, pp.
189–198.
Conclusion [8] Flores, H., Srirama, S. N., & Paniagua, C. (2012). Towards mobile
cloud applications. International Journal of Pervasive Computing and
When technology of this nature expands, it raises business Communications.M. Young, The Technical Writer’s Handbook. Mill
Valley, CA: University Science, 1989.
organizations' interest and draws several people, including
[9] Mishra, J., Dash, S. K., & Dash, S. (2012, January). Mobile-cloud: A
critics, which poses a significant threat to any nature of framework of cloud computing for mobile applications. In
confidential information. Safety and privacy are key issues in International Conference on Computer Science and Information
mobile cloud computing, particularly when implemented for Technology (pp. 347-356). Springer, Berlin, Heidelberg.
confidential flows of information, such as medical records , [10] Yin, Z., Yu, F. R., & Bu, S. (2014, December). Joint cloud
computing and wireless networks operations: a game theoretic
financial statements and corporate strategy. [27] A mobile approach. In 2014 IEEE Global Communications Conference (pp.
cloud computing may be impacted if a service interruption or 4977-4982). IEEE.
security issue occurs in mobile devices, cloud facilities, or in [11] Sharifloo, A. M., & Metzger, A. (2017). Mcaas: Model checking in
publicity. A wide strand of research demonstrates various the cloud for assurances of adaptive systems. In Software Engineering
forms of security and privacy problems in cloud computing for Self-Adaptive Systems III. Assurances (pp. 137-153). Springer,
Cham.
[12] Song, W., & Su, X. (2011, May). Review of mobile cloud [21] Koe, A. S. V., & Lin, Y. (2019). Offline privacy preserving proxy
computing. In 2011 IEEE 3rd International Conference on re-encryption in mobile cloud computing. Pervasive and Mobile
Communication Software and Networks (pp. 1-4). IEEE. Computing, 59, 101081.
[13] Kumar, R., & Rajalakshmi, S. (2013, December). Mobile cloud [22] Jiang, X., Kong, W., Jin, X., & Shen, J. (2019, September). A
computing: Standard approach to protecting and securing of mobile Cooperative Placement Method for Machine Learning Workflows and
cloud ecosystems. In 2013 International Conference on Computer Meteorological Big Data Security Protection in Cloud Computing. In
Sciences and Applications (pp. 663-669). IEEE. International Conference on Machine Learning for Cyber Security
[14] Vikas, S. S., Pawan, K., Gurudatt, A. K., & Shyam, G. (2014, (pp. 94-111). Springer, Cham.
February). Mobile cloud computing: Security threats. In 2014 [23] Sookhak, M., Yu, F. R., Khan, M. K., Xiang, Y., & Buyya, R. (2017).
international conference on electronics and communication systems Attribute-based data access control in mobile cloud computing:
(ICECS) (pp. 1-4). IEEE. Taxonomy and open issues. Future Generation Computer Systems, 72,
[15] Jo, M., Maksymyuk, T., Strykhalyuk, B., & Cho, C. H. (2015). 273-287.
Device-to-device-based heterogeneous radio access network [24] Pasupuleti, S.K., Ramalingam, S., Buyya, R., 2016. An efficient and
architecture for mobile cloud computing. IEEE Wireless secure privacypreserving approach for outsourced data of resource
Communications, 22(3), 50-58. constrained mobile devices in cloud computing. J. Netw. Comput.
[16] Yan, Q., & Yu, F. R. (2015). Distributed denial of service attacks in Appl. 64, 12–22.
software-defined networking with cloud computing. IEEE [25] Niu, B., Li, Q., Zhu, X., Cao, G., Li, H., 2015. Enhancing privacy
Communications Magazine, 53(4), 52-59. through caching in location-based services. In: Computer
[17] Liu, F., Shu, P., Jin, H., Ding, L., Yu, J., Niu, D., & Li, B. (2013). Communications (INFOCOM), 2015 IEEE Conference on, pp. 1017–
Gearing resource-poor mobile devices with powerful clouds: 1025.
architectures, challenges, and applications. IEEE Wireless [26] Hurel, G., Badonnel, R., Lahmadi, A., Festor, O., 2015. Towards
communications, 20(3), 14-22. Cloud-Based Compositions of Security Functions For Mobile
[18] Hussain, R. G., & Khan, M. F. SECURITY ISSUES IN MOBILE Devices. In: IFIP/IEEE International Symposium on Integrated
CLOUD (PLATFORM RELIABILITY, DATA PRI. Network Management (IM'15), p. 6.
[19] Li, H., Shou, G., Hu, Y., & Guo, Z. (2016, March). Mobile edge [27] Li, H., Shou, G., Hu, Y., & Guo, Z. (2016, March). Mobile edge
computing: Progress and challenges. In 2016 4th IEEE international computing: Progress and challenges. In 2016 4th IEEE international
conference on mobile cloud computing, services, and engineering conference on mobile cloud computing, services, and engineering
(MobileCloud) (pp. 83-84). IEEE. (MobileCloud) (pp. 83-84). IEEE.
[20] Alqahtani, H.S., Kouadri-Mostefaou, G., 2014. Multi-clouds Mobile [28] Xing, T., Liang, H., Huang, D., & Cai, L. X. (2012, June).
Computing for the Secure Storage of Data, in 2014 IEEE/ACM. In: Geographic-based service request scheduling model for mobile cloud
Proceedings of the 7th International Conference on Utility and Cloud computing. In 2012 IEEE 11th International Conference on Trust,
Computing, pp. 495–496. Security and Privacy in Computing and Communications (pp. 1446-
1453). IEEE.

You might also like