This article discusses the implementation of cloud computing in mobile applications, security issues, and challenges faced. It also covers the distinction between mobile knowledge workers and mobile field workers and their unique requirements for mobile support. The methodology used in research is case study methodology. Both articles adequately cover the applicable existing research literature for research. The study is ethical and supported by evidence.