Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Empowered by Trust: A Secure Mobile

Cloud Computing Infrastructure


Muhammad Zulkifl Hasan Muhammad Zunnurain Hussain Nadeem Sarwar
Faculty of Computer Science and Department of Computer Science Department of Computer Science,
Bahria University Lahore Campus Bahria University Lahore Campus,
Information Technology University of
zunnurain.bulc@bahria.edu.pk Nadeem_srwr@yahoo.com
Central Punjab zulkifl.hasan@ucp.edu.pk
[0000-0002-6071-1029] [0000-0001-8681-6382]
[0000-0002-2733-5527]

Zaka Ullah Intakhab Alam Asma Irshad


Department of Computer Science and Cyber Department of Information Technology School of Biochemistry and
Security University of Sialkot, Biotechnology
Air University Aerospace and Aviation Sialkot, Pakistan University of the Punjab,
Campus Kamra, Pakistan Intakhab.alam@uskt.edu.pk Lahore, Pakistan
zakaullah@aack.au.edu.pk asmairshad76@yahoo.com

infrastructure by creating applications to accomplish


Abstract— Nowadays, practically everyone has a limitless versatility, robotized on request from the IT
smartphone with them. These smart devices store foundation. Programming as a service (SaaS),
several types of personal information, such as images, platform as a service (PaaS), and foundation as a
files, credit card pins, etc., and are used for service are examples of
communication purposes. Consider the possibility that
someone could gain access to it without our knowledge.
How could they possibly use it? One of the most critical distributed computing administrations. Clients of CC
security concerns is data and privacy in terms of stolen can be corporations, partnerships, or individuals. A
data and malicious file behavior. However, private and few models exist for increasing distributed
delicate data are required for these practical uses. computing, handling speed, and freeing up extra
Similarly, connected phones’ other weak points are space.
their limited battery life, slow processor speed, and
unpatched vulnerabilities. To overcome such limitations,
mobile cloud computing (MCC) is introduced, which Regardless, some difficulties still need to be solved,
analyzes data in the cloud and returns the findings to the such as the battery's life span and execution. This
smartphone. However, MCC increased the effectiveness impacts continuous intuitive apps that can't handle
of several programs. MCC also considered several types delays caused by outsourcing work to the cloud, and
of issues, such as real-time communication data
results will be displayed after some time. Another
confidentiality. Further, safety, speed, and customer
satisfaction are the three fundamental parameters of demerit of using 3G or LTE is that it consumes a cell
mobile cloud services that will be highlighted in this phone's battery a lot, which is relative to the time spent
article. Finally, a model concept is also elaborate for going to the store and showing the errand. The more
demonstration purposes to employ the trust-based efficient cloud-gathering arrangement allows for minor
assignment system to enhance safety ratios, showing the delays and power consumption. Security and execution
perfection of the five portable cloud computing are the other two challenges that cannot be isolated.
architecture. The choice to use more intricate number juggling in
safer encryption calculations is not determined by the
Keywords— Smartphone, Vulnerabilities, Mobile Cloud exhibition level desired by the clients. In addition,
Computing, Data Confidentiality more excellent security prerequisites suggest utilizing
more mindboggling encryption calculations and
I. INTRODUCTION calculations that disperse more power. The cloudlet
Secure mobile cloud computing is the most common based MCC model solves the problems and issues
tool for phone devices to access apps and services on discussed above. Cloudlet (CL) implementation
the Internet, and it is a blend of mobile Web and improves the presentation for continuous intuitive
cloud computing (CC). Because of the immense applications by reducing correspondence dormancy. In
improvements in innovation currently, cell phones any event, the main point of data security is how to
have become a fundamental part of our lives. Most of protect the client's data from others. In this study, we
us use our sleek cell phones to check email, introduce the cloudlet MCC model and look at the
communicate via virtual entertainment, shop online, types of administrative Quality of Service (QoS)
receive instructions, and perform frequently. boundaries that this cloudlet model can provide.
However, we must acknowledge that our astute Furthermore, considering trust assignment, safe
frameworks and platforms, such as Microsoft Azure execution of the proposed MCC cloudlet-based model
and MCC, use portable innovation and CC. The use is described to provide a high level of security.
of distributed computing solved many problems with
cell phones. For example, they have restricted assets
(capacity, battery duration, and transfer speed). Now
comes the advantage of cloud processing, a
boundless innovation that offers helpful assistance in
simple and easily accessible ways [1]. Besides, CC
aids organizations to further develop the IT
combines programming-defined capacity (SDStore)
with programming-defined security (SDSec) to
improve execution and maintain nearly equal
security. Then again, energy utilization in MCC is a
test since versatile gadgets experience the ill effects
of short battery life because of the energy channel. As
a result, we can conclude that improving energy
efficiency in portable cloud frameworks is a critical
requirement for achieving green MCC, as it affects
the display and security of data kept on those
frameworks. Elgendy et al. [6] described a novel
paradigm for offloading expensive processing
activities from mobile devices to the cloud. This
system employs an optimization model to
dynamically decide offloading decisions based on
four major parameters: energy consumption, Central
Processing Unit (CPU) utilization, execution time,
and memory use. A new security layer is also offered
to secure transmitted data in the cloud from any
assault. The testing findings show that the framework
FIGURE 1. Cloud Computing can pick an appropriate offloading option for various
mobile application workloads while significantly
II. BACKGROUND RESEARCH improving performance. In addition, unlike earlier
solutions, the framework can safeguard application
This section covers earlier MCC and cloudlet design data from danger. To support mobile computational
work and related execution difficulties and clouds, Nawrocki et al. [7] created a new workflow
applications. The work focuses on the MCC model that is security aware. The Filtration Algorithm
innovation, which combines cell phones (portability and Prediction Module are two specialized algorithm
feature) with cloud administration to overcome cell models we established to build the best safe system
phone limitations [2]. The designers presented an architecture for processing tasks and data and ensure
extremely broad cloudlet (a more modest cloud the best use of cloud resources and services. Analyses
framework) model for the MCC arrangement. The based on experimental data have shown that our
portable client can connect to the cloudlet via WiFi model performs well. Results of the tests demonstrate
rather than 3G or Long-Term Evolution (LTE). Al- that, compared to a configuration where calculation
Ayyoub et al. [2] discussed a productive MCC model time is the primary criterion for task processing
based on the cloudlet concept. The approach explains optimization, our flow model dramatically improves
how to optimally incorporate MCC for data collection the security level of computations.
into large-scale enterprises. Jararweh et al. [3]
III. LITERATURE REVIEW
expanded the work of Al-Ayyoub et al. [2], presenting
a new adaptable cloudlet structure for the MCC model. Through a current innovation in matrix
The model explains the best way to involve MCC in processing, this distributed computing innovation
information assortment in enormous-scale transmits a different paradigm for data and
organizations. administration. CC, which allows assets to be shared
via the Internet, allows broad organization access.
The goal of the proposed flexible framework is to Furthermore, this innovation uses the Internet
reduce power consumption and postpone the framework to communicate between client-side and
arrangement of sight and sound applications while server-side assistance applications. Furthermore,
using MCC [3]. However, the display issue in cloudspecialist organizations in distributed
portable registration is almost as important as computing provide cloud stages for their clients to
security and battery conservation. Lo’ai et al. [4] create and use web-based administrations. Sharing
focused on the influence of using the cloudlet model hardware and software assets is possible in the cloud
on the display of intelligent and versatile cloud with the web's assistance, typically overseen and
applications. Their findings reveal that dormancy is maintained by an outside cloud specialist
reduced and throughput is increased when the organization. These days, distributed computing has
cloudlet portable cloud architecture is used. become one of the most significant and famous
Information security is one of the main problems exploration regions in software engineering. Many
faced by the distributed computing and portable open examination issues are available in distributed
cloud industries. Information owners must ensure that computing, and analysts have also proposed excellent
their critical and essential data is kept private and solutions by developing new procedures and
protected from unauthorized access. Tawalbeh et al. productive calculations. This paper examines a
[5] examined an information privacy system for nittygritty lesson about distributed computing, its
distributed computing because of information order. fundamental ideas, history, virtualization method, and
As such, important information gets more assurance cloud administration.
by utilizing more grounded and safer encryption
calculations. Tawalbeh et al. [5] used MCC Furthermore, research issues in distributed
foundations to define efficient and secure computing are additionally examined [8]. Similarly,
programming. The proposed designs take advantage communication elements make developing a trust
of the strengths of the verified information ownership connection more difficult in a circulated and dynamic
configuration used for asset-based cell phones and cloud climate. As of late, trust has been perceived as a
the benefit of trust in thinking innovation. The significant variable in further developing cloud
proposed system is a product-defined framework that
security and has turned into an exploration area of server farms. These patterns have brought about the
interest. In this paper, we propose a new staggered requirement for an assortment of new processing
trust model to oversee cloud elements' relationships models that future cloud frameworks will present.
from the perspective of a "virtual association subspace These designs are expected to impact connecting people
and devices, information focused processing, the help
element" and measure trust connections
space, and self-learning frameworks [13].
mathematically. By continuing to refresh the trust
data, the model can recognize different substance IV. MOBILE CLOUD COMPUTING WITH CLOUDLET-
types and safeguard awful elements' ways of BASED ARCHITECTURE
behaving, advancing asset portions. The results show In the non-cloudlet MCC model, cell phones are
that this model can detect malevolent substances and connected to the cloud via 3G or 4G to communicate
works on the proportion of administration that with the venture cloud, resulting in increased
necessitates a response. So this model has excellent idleness. This is the main issue, particularly in mobile
protection capacity and can provide an ideal, secure applications requiring a significant investment
connection in a short time. The cloudlet MCC model
cloud climate [9]. However, the researchers present a
shown in Figure 1 is closer to the cell phone and
meta-examination of distributed computing research interfaces through less expensive improvements (Wi-
in data frameworks to check out their writing and their Fi or streak with LAN) and can complete similar
related exploration structures, research philosophy, chores with better execution than the non-cloud
topographical conveyance, level of examination, and model. Similarly, using the cloudlet MCC model
patterns of these investigations over 7 years. A total of aims to improve QoS by increasing access to
285 articles from 67 friend survey diaries from 2009 information, increasing processing speed,
to 2015 were utilized in the analysis. The discoveries maintaining battery life, and providing better QoS.
demonstrate that surviving distributed computing will
slant towards the mechanical aspect to the
disadvantage of other underexploited elements, for
example, business, conceptualization, and application
space. While there has been a consistent expansion in
distributed computing throughout recent years, a
critical number of these examinations have not been
supported by hypothetical structures and models. This
study contributes to distributed computing research by
providing in-depth experiences on topics, procedures,
research systems, topographical attentiveness, and
future research directions [10].
Another area of investigation is how CC is required
for instructional regions, especially in colleges, to FIGURE 2. Using cloudlet, a mobile cloud computing
paradigm
facilitate all organization and knowledge admission. So,
the foundation of distributed computing must be the
college's point. In distributed computing, infrastructure The second diagram of QoS mainly applies to
as a service (IaaS) has issues such as assets, security, most of the running applications and discusses three
and money. This study follows the Kitchenham parameters of QoS used in Cloudlet model
convention to investigate the difficulties in deliberately evaluation. Those three parameters used in the
using cloud registration as a framework for cloudlet model are availability, performance, and
administration for schooling field writing and then scalability. Availability is one of MCC's most
inspecting their methods, which can involve all of the efficient QoS elements among all three cloudlet
colleges in Indonesia. This study suggests that IaaS models. By requesting a service from the cloudlet
administration should be viewed to achieve the best instead of the business cloud itself, the cloudlet
results from distributed computing [11]. The various design lowers congestion that can arise when a lot of
MCC solutions are qualitatively reviewed by Ahmed et users try to use the cloud service. This will spread the
al. [12]. As a result, a taxonomy for MCC is offered, load and speed up service provision, reducing the
taking into account key research areas, including energy possibility of failure.
awareness, security, applications, and advancements in
QoS awareness. Each of these topics is rigorously
examined with comparisons that consider contemporary
developments. The analysis of measurements and
implementation settings used to assess the effectiveness
of current strategies is provided. Finally, based on the
critical and qualitative literature evaluation for
researchers, some open research questions and future
challenges are indicated. The CC landscape has
fundamentally changed over the last ten years. Not only
are many dealers and administration contributions
grouped into the space, but cloud frameworks that were
usually limited to single-supplier server farms are
advancing. In this paper, we first describe the changing
cloud framework, first and foremost, and we consider
the use of the framework by numerous suppliers and the
advantage of decentralizing registration away from
FIGURE 4. SOAP Working

FIGURE 3. Categories of QoS

VI. MOBILE APPLICATIONS AND THE ADVANTAGE OF


CLOUD RESOURCES
The third QoS criterion is efficiency, which is the
time taken to complete a task and is determined by Here are a few examples of popular mobile CC
response time and bandwidth. The cloudlet approach applications:
avoids high latency caused by WAN connectivity to A. Digital Social Platforms
the cloud and sophisticated management, resulting in Let's start with the most widely used application.
improved performance. Another critical aspect of Mobile social networking allows users to save data
QoS is scalability, which refers to the system's and share films in real time, so your friends and
capacity to grow without compromising or followers won't have to wait for the latest kitten video.
deteriorating the version of its operating applications. Everyone and their extended family appear on
The cloudlet concept may be scaled up to a limited Facebook, Twitter, Instagram, TikTok, or other social
number of customers at any moment with minimal media sites.
effort and control. B. Webmail Service
V. DEPLOYING THE RESILIENT CLOUDLET MCC Another general mobile cloud computing
PARADIGM
application. Those who check their emails presumably
Users' privacy must still be safeguarded in our use applications like Outlook, Gmail, or Yahoo Mail.
cloudlet paradigm when they use cloud resources or However, consumers appear more inclined to log into
corporate cloud solutions. Two instances show the their social network accounts than examine their new
need for this: the first instance occurs when the emails every morning. That is due to the never-ending
cloudlet serves as an intermediary component spam deluge. So, if you're viewing your emails on a
between the cloud platform and the portable internet. mobile device like a smartphone, you're utilizing
In this instance, the cloudlet connects to the EC on mobile cloud technologies.
the client's screen. As a result, some methods should C. Business and Financial Strategies
be employed to verify the claimed user. The Do you use a banking app on your phone to keep
following scenario is when a current job is still in track of your checking account balances? Similarly, do
progress whenever a smartphone user switches from you shop on eBay or Amazon with your tablet? If so,
the service area of cloud environment 1 (CL1) to that's mobile cloud computing at work with scalable
cloudlet 2 (CL2). The responsibility is then handed processing power.
off to CL2, who should contact CL1 and ask for the
necessary information. In this situation, we must D. Medical and Health Sector
confirm that the mobile user himself requested the While the general public does not widely use this
CL2 request in the first place. Utilizing trust for program, it is critical for healthcare personnel. A
delegation is the answer. The Trust Delegation specialist must review a patient's medical history and
security mechanism provides a solution for the trust the reason for their referral [16]. Healthcare providers
concerns discussed above. In this method, the mobile can rapidly access patient records, which is crucial
user assigns tasks to the connected CL to interact for referrals. Vast amounts of data can be stored or
with other CLs or the Enterprise Cloud (EC) on their accessed instantly using a mobile device due to cloud
behalf. The message is split into two sections by the computing.
Simple Object Access Protocol (SOAP) protocol. The
E. Digital Learning Environment
optional header contains the endpoints' addresses and
other setup and security details [14]. A Security The purpose of installing these apps is to let
Assertion Markup Language (SAML) 2.0 assertion is students understand how MCC should be developed
used in the Uniform Interface to Compute Resources to supplement outdoor activities. A teaching tool
(UNICORE) to encrypt secure data. Chain validation based on cloud computing is being developed to
has two steps: the trust custodian (the root), the deliver a program for image and video creation.
issuer's signature, and additional restrictions like the Using mobile phones, students may analyze and
maximum trust chain length and type of permission assess various techniques utilized in mobile apps
[15].
(such as binarizing, denoising, face recognition, and E. Fortifying Goals within MCC
photo enhancement) [17].
Multiple goals must be taken into account and
VII. ANALYSIS accomplished simultaneously in MCC. Energy
A relatively modern technology known as "cloud consumption must also be considered for improved
computing" enables customers to exchange their data MD performance when attaining efficient and
online in cloud-based systems, distribute it with dependable job computing. As a result, a rigorous
others, and view it from various devices. The use of examination of multi-objective optimization is
the cloud is here to stay and will be for a very long required for increased MCC efficiency [18].
time. It is utilized by everybody, from small F. Boundaries of mobile device resources
businesses to enormous corporations. It has many Despite ongoing improvements, mobile devices'
benefits, and safety is just one of them. Files are not limited resources still pale in contrast to a conventional
kept on your storage disk since they are kept in the computer. For instance, running programs that
cloud instead. A hacker can access your information consume much energy on mobile devices are
if he gains access to your machine. Your data is safe ineffective. Utilizing the cloud to execute apps and
in the cloud backup if you lose your device. Because tasks, the computational offloading approach can
of the several advantages they provide to overcome the difficulty of running mobile applications
organizations, many corporations are now adopting [19].
cloud services. The cloud can offer a broader range of
communication platforms, and many businesses G. Data reliability
reportedly find an improvement in the effectiveness Users of mobile devices can access the MCC's
of their collaboration. resources whenever and wherever they are. To resolve
Nevertheless, it is well known that cloud data integrity, correctness, and consistency in MCC,
computing services have unique qualities that could data integrity and recovery are therefore crucial, and
call for risk evaluations in many places, including they need a consistent storage and management
data recovery, data integrity, privacy, and a critical architecture [20–24].
review of specific legal challenges involving H. Transformation of services
compliance requirements, monitoring, and e-
MCC wants to provide mobile devices with access
discovery. Customers of systems are encouraged to
to PC-like services. The transition from wired to
request openness and to shun suppliers who are
secretive about their safety precautions. They should wireless data transfer and between fixed and mobile
device characteristics makes service transformation
challenge operations, programmers, legislators,
equipment and devices, and hazard control processes. difficult. Such a transformation requires economic
planning and pricing schemes to build eco-friendly
You must be aware of the leading cloud issues: business and service models that coordinate with QoS
and Service Level Agreements (SLAs). However,
A. Trust Delegation Meets Internal Cloud: A further work is needed to address issues with service
Secure Mix for MCC transition between various mobile devices and cloud
storage [25–28].
The majority of businesses now prefer private
cloud environments over public cloud services. Many I. Expanded secure storage for critical file
think hiding this kind of cloud behind a barrier will systems
boost security. This is untrue; companies must realize Customers of these services need to exercise
that securing the cloud with a network does not caution when storing private data on the cloud. The
ensure a secure solution. problem is where and how to decrypt encrypted data,
B. Safety Risks Occur Due to Low Sight so the answer is to protect your data. It's advised never
to keep the encoding key and encrypted files
Since most cloud suppliers are anonymous,
combined. The issue with many organizations is that
companies may be at risk of security issues. Because
they don't consider their genuine dangers and don't
there will be no agency to handle potential hazards
plausibly run their businesses. NAWAH chose to have
linked with this activity, businesses should make an
a network with no trace. No networks were involved;
educated choice when shifting their data to the cloud.
all users connected straight from their laptops to cloud-
C. Exposed Digital Applications hosted or managed applications. This made it
For a very long time, standard safety apps have unnecessary to safeguard our network, allowing us to
garnered much interest. The program can be rewritten concentrate on troubleshooting.
to offer a dependable installation for cloud services.
The software applications will become more robust
because of this decision. It is critical to understand VIII. ADOPTING CLOUD COMPUTING SECURITY
that your cloud hosting will not assist you. MEASURES
D. Resource Allocation in a Decentralized We must use a top-down risk assessment technique
Manner to evaluate cloud technology's security. Examine the
current international standards that detail security
Due to the possibility of a single enormous task controls, such as Cloud Controls Matrix (CCM) v.3.0.1
having subtasks, more technical resource allocation (2014). It can be downloaded for free. After that,
techniques for task scheduling, task migration, and research the control zones you want to simulate. There
load balancing that consider both Mobile Devices are enough of them to draw them all. And you'll
(MDs) and CC constraints need to be researched and probably conclude that there isn't a magical cure for
developed for energy-efficient mobile computing cloud security. There are up to six references to security
devices and cloud computing systems. A small amount standards, and almost any cloud security risk you can
of study has been done [16]. imagine is listed there. Of course, there are some
measures for which there are no standards, such as taxonomy and challenges," Journal of Computer Networks
phone-to-cloud security, but this highlights the areas in and Communications, vol. 2020, 2020.
[13] B. Varghese and R. Buyya, "Next generation cloud
which there is room for fruitful study. computing: New trends and research directions," Future
Generation Computer Systems, vol. 79, pp. 849-861, 2018.
[14] L. a. Tawalbeh, Y. Haddad, O. Khamis, F. Aldosari, and E.
Benkhelifa, "Efficient software-based mobile cloud
IX. CONCLUSION
computing framework," in 2015 IEEE International
One of the most critical security concerns is data Conference on Cloud Engineering, 2015, pp. 317-322.
privacy. The MCC concept is introduced, which [15] B. Kurdi, S. Lozano, and M. R. Banaji, “Introducing the
provides data confidentiality and safe Open Affective Standardized Image Set (OASIS),” Behavior
Research Methods, vol. 49, no. 2, pp. 457–470, Apr. 2017,
communication. Smartphones, however, have a
doi: 10.3758/s13428-016-0715-3.
number of risks and limitations, and their data can be [16] Simplilearn. Mobile Cloud Computing: Definition,
maliciously stolen or encrypted. Similarly, smart Advantages, and Applications.
connected phones have limitations in terms of limited https://www.simplilearn.com/what-ismobile-cloud-
battery life, slow processor speed, and unpatched computingarticle#mobile_cloud_computing_examples_and_a
vulnerabilities. The paper also discussed the various pplications,(2022). [Retireved Online: 26 Oct 2022]
[17] L. Tiyagaraja and I. Yusof, I. Future of Cloud Computing:
MCC applications that are currently in use. Mobile Cloud Apps. “International Journal of Business and
Furthermore, for the security aspect, different Technology Management,” 4(3), 256-262, 2022.
parameters are also discussed for user awareness, [18] C. Xu, J. Ren, L. She, Y. Zhang, Z. Qin, and K. Ren,
such as safety, speed, customer satisfaction, etc. “EdgeSanitizer: Locally Differentially Private Deep Inference
at the Edge for Mobile Data Analytics,” IEEE Internet of
However, these are primary challenges when
Things Journal, vol. 6, no. 3, pp. 5140–5151, Feb. 2019, doi:
considering mobile cloud services. Finally, the 10.1109/jiot.2019.2897005.
mechanism is described to utilize cloud computing [19] W. Chen, B. Z. Tang, and K. Li, “Multi-User Multi-Task
security, like topologies that must be supported by Computation Offloading in Green Mobile Edge Cloud
your cloud provider, third-party adoption, and freely Computing,” IEEE Transactions on Services Computing, vol.
accessible OpenVPN at basic-level access. Similarly, 12, no. 5, pp. 726–738, Sep. 2019, doi:
10.1109/tsc.2018.2826544.
users may avoid using Amazon's security groups if [20] T. H. Noor, S. Zeadally, A. Alfazi, and Q. Z. Sheng, "Mobile
such parameters are correctly considered. cloud computing: Challenges and future research directions,"
Journal of Network and Computer Applications, vol. 115, pp.
REFERENCES 70-85, 2018.
[1] Frankenfield, J. (2022) What is cloud computing? pros and [21] S. Al-Janabi, I. Al-Shourbaji, M. Shojafar, and S.
cons of different types of services, Investopedia. Available at: Shamshirband, "Survey of main challenges (security and
https://www.investopedia.com/terms/c/cloud-computing.asp privacy) in wireless body area networks for healthcare
(Accessed: 08 Mar 2022). applications," Egyptian Informatics Journal, vol. 18, pp. 113-
[2] Alakberov, R.G. (2021) Clustering method of mobile cloud 122, 2017.
computing according to ... - MECS press. Available at: [22] K. Saleem, I.S. Bajwa, N., Sarwar, W. Anwar and A. Ashraf.
https://mecs-press.org/ijcnis/ijcnis-v14-n3/IJCNIS-V14-N3- IoT healthcare: intelligent and cost-effective sleep quality
6.pdf (Accessed: 18 June 2021). monitoring system design. Journal of Sensors, 2020
[3] S. Kumar, G. Stecher, M. Y. Li, C. Knyaz, and K. Tamura, [23] B. Sarwar, I.S. Bajwa, N. Jamil, S, Ramzan, and N. Sarwar.
“MEGA X: Molecular Evolutionary Genetics Analysis across An intelligent fire warning application using IoT and an
Computing Platforms,” Molecular Biology and Evolution, adaptive neuro-fuzzy inference system. Sensors, 19(14),
vol. 35, no. 6, pp. 1547–1549, Jun. 2018, doi: 3150. (2019)
10.1093/molbev/msy096. [24] H. Sattar, I.S. Bajwa, R. U., Amin, N. Sarwar, N. Jamil, M.,
[4] K. Abualsaud et al., “A Survey on Mobile Crowd-Sensing Malik, A. Mahmood and U. Shafi, An IoT-based intelligent
and Its Applications in the IoT Era,” IEEE Access, vol. 7, pp. wound monitoring system. IEEE Access, 7, 144500-144515.
3855–3881, Jan. 2019, doi: 10.1109/access.2018.2885918. (2019).
[5] A. K. Singh and K. Chatterjee, “Cloud security issues and [25] K. Hameed, I.S Bajwa, N. Sarwar, W. Anwar, Z. Mushtaq,
challenges: A survey,” Journal of Network and Computer and T. Rashid. Integration of 5G and block-chain
Applications, vol. 79, pp. 88–115, Feb. 2017, doi: technologies in innovative telemedicine using IoT. Journal of
10.1016/j.jnca.2016.11.027. Healthcare Engineering, 2021.
[6] I. A. Elgendy, W.-Z. Zhang, C.-Y. Liu, and C.-H. Hsu, "An [26] W. Rafique, M. Khan, N. Sarwar, and W. Dou. A security
efficient and secured framework for mobile cloud framework to protect edge-supported software-defined
computing," IEEE Transactions on Cloud Computing, vol. 9, Internet of Things infrastructure. In International Conference
pp. 79-87, 2018. on Collaborative Computing: Networking, Applications and
[7] P. Nawrocki, J. Pajor, B. Sniezynski, and J. Kolodziej, Work-sharing, 2019, pp. 71-88. Springer, Cham.
"Security aware job allocation in mobile cloud computing," in [27] M.H. Hussain, M. Z. Hasan, N. Sarwar, J. Nasir and N.
2021 IEEE/ACM 21st International Symposium on Cluster, Aslam. Cloud application importance and challenges: A
Cloud, and Internet Computing (CCGrid), 2021, pp. 713-719. Systematic Review. In 2021 International Conference on
[8] Sadeeq, M.M. et al. (2021) IOT and cloud computing issues, Innovative Computing (ICIC), 2021, pp. 1-6. IEEE.
challenges and opportunities: A Review, Qubahan Academic [28] M.H. Hussain, M. Z. Hasan, N. Sarwar, J. Nasir and N.
Journal. Available at: Aslam. Code Vision: Learning Mobile Application. In 2021
https://journal.qubahan.com/index.php/qaj/article/view/36 International Conference on Innovative Computing (ICIC),
(Accessed: 08 July 2021). 2021, pp. 1-7. IEEE.
[9] M. Yang and L. Zhang, "Research of Cross-domain Cloud .
Trust
Model and its Defense Abilities Analysis," in Proceedings of
the 2019 7th International Conference on Information
Technology: IoT and Smart City, 2019, pp. 94-97.
[10] P. K. Senyo, E. Addae, and R. Boateng, "Cloud computing
research: A review of research themes, frameworks, methods,
and future research directions," International Journal of
Information Management, vol. 38, pp. 128-139, 2018.
[11] N. A. Wigati, A. Wibisono, and A. N. Hidayanto, "Challenges
of
Infrastructure in Cloud Computing for Education Field: A
Systematic Literature Review," ICEIS (1), pp. 351-358, 2021.
[12] A. Aliyu, A. H. Abdullah, O. Kaiwartya, S. H. Hussain
Madni, U. M. Joda, A. Ado, et al., "Mobile cloud computing:

You might also like