Mobile Cloud Computing in Wireless Network and Security Issues
VerifiedAdded on 2023/06/08
|25
|5515
|177
AI Summary
This thesis focuses on security issues in the mobile cloud computing in wireless networks. The research is a complete package of mobile cloud computing and its security issues and challenges over the wireless networks. The security architecture of mobile cloud computing have been discussed in the research.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND
SECURITY ISSUES
Mobile cloud computing in wireless network and security issues
Name of the Student
Name of the University
Author’s Note
SECURITY ISSUES
Mobile cloud computing in wireless network and security issues
Name of the Student
Name of the University
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Abstract
This thesis focuses on security issues in the mobile cloud computing in wireless networks. Cloud
computing has been a great approach to the IT field. Various organization has been benefited by
the cloud computing. It is the duty of the mobile cloud environment providers to assure their
customer to enforce certain limitations over the data being shared and the privacy assurance as
well as the transparency degree of the data. The aim of the research is to identify security issues
in mobile computing in wireless networks. There has been many cases reported related to the
data breach and loss in the cloud computing. The solutions to the challenges have been provided
in the research. The research is a complete package of mobile cloud computing and its security
issues and challenges over the wireless networks. The security architecture of mobile cloud
computing have been discussed in the research.
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Abstract
This thesis focuses on security issues in the mobile cloud computing in wireless networks. Cloud
computing has been a great approach to the IT field. Various organization has been benefited by
the cloud computing. It is the duty of the mobile cloud environment providers to assure their
customer to enforce certain limitations over the data being shared and the privacy assurance as
well as the transparency degree of the data. The aim of the research is to identify security issues
in mobile computing in wireless networks. There has been many cases reported related to the
data breach and loss in the cloud computing. The solutions to the challenges have been provided
in the research. The research is a complete package of mobile cloud computing and its security
issues and challenges over the wireless networks. The security architecture of mobile cloud
computing have been discussed in the research.
3
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Acknowledgement
Firstly, I would like to express my sincere gratitude to my advisor Prof. _______ for the
continuous support of related research, for his patience, motivation, and immense knowledge.
His guidance helped me in all the time of research and writing of this thesis. I could not have
imagined having a better advisor and mentor for my study. Besides my advisor, I would like to
thank the rest of my thesis committee: Prof. __________, for their insightful comments and
encouragement, but also for the hard question which incented me to widen my research from
various perspectives. My sincere thanks also goes to Dr. _________, who provided me an
opportunity to join their team as intern, and who gave access to the laboratory and research
facilities. Without they precious support it would not be possible to conduct this research.
I thank my fellow labmates in for the stimulating discussions, for the sleepless nights we were
working together before deadlines, and for all the fun we have had in the last four years. Also I
thank my friends in the following institution __________________________ . In particular, I am
grateful to Dr. Chen Fan for enlightening me the first glance of research.
Last but not the least, I would like to thank my family: my parents and to my brothers and sister
for supporting me spiritually throughout writing this thesis and my my life in general.
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Acknowledgement
Firstly, I would like to express my sincere gratitude to my advisor Prof. _______ for the
continuous support of related research, for his patience, motivation, and immense knowledge.
His guidance helped me in all the time of research and writing of this thesis. I could not have
imagined having a better advisor and mentor for my study. Besides my advisor, I would like to
thank the rest of my thesis committee: Prof. __________, for their insightful comments and
encouragement, but also for the hard question which incented me to widen my research from
various perspectives. My sincere thanks also goes to Dr. _________, who provided me an
opportunity to join their team as intern, and who gave access to the laboratory and research
facilities. Without they precious support it would not be possible to conduct this research.
I thank my fellow labmates in for the stimulating discussions, for the sleepless nights we were
working together before deadlines, and for all the fun we have had in the last four years. Also I
thank my friends in the following institution __________________________ . In particular, I am
grateful to Dr. Chen Fan for enlightening me the first glance of research.
Last but not the least, I would like to thank my family: my parents and to my brothers and sister
for supporting me spiritually throughout writing this thesis and my my life in general.
4
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Statement of Originality
I certify that this thesis contains no material which has been accepted for the award of any other
degree or diploma in any institute, college or university, and that, to the best of my knowledge
and belief, it contains no material previously published or written by another person, except
where due references are made in the text of the thesis.
-----------------------------
Xxxxy Yyyyy
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Statement of Originality
I certify that this thesis contains no material which has been accepted for the award of any other
degree or diploma in any institute, college or university, and that, to the best of my knowledge
and belief, it contains no material previously published or written by another person, except
where due references are made in the text of the thesis.
-----------------------------
Xxxxy Yyyyy
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
5
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Table of Contents
Abstract............................................................................................................................................2
Acknowledgement...........................................................................................................................3
Statement of Originality..................................................................................................................4
Table of Contents.............................................................................................................................5
List of Figures..................................................................................................................................6
Chapter 1: Introduction....................................................................................................................7
Chapter 2: Background...................................................................................................................8
Chapter 3: Review of Related Work..............................................................................................13
3.1 Mobile security service layers.............................................................................................13
3.2 Schemes of mobile cloud computing...................................................................................13
3.3 Different architectures of mobile cloud computing.............................................................14
3.4 Security issues related to mobile cloud computing.............................................................16
Chapter 4: Conclusion...................................................................................................................19
References......................................................................................................................................20
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Table of Contents
Abstract............................................................................................................................................2
Acknowledgement...........................................................................................................................3
Statement of Originality..................................................................................................................4
Table of Contents.............................................................................................................................5
List of Figures..................................................................................................................................6
Chapter 1: Introduction....................................................................................................................7
Chapter 2: Background...................................................................................................................8
Chapter 3: Review of Related Work..............................................................................................13
3.1 Mobile security service layers.............................................................................................13
3.2 Schemes of mobile cloud computing...................................................................................13
3.3 Different architectures of mobile cloud computing.............................................................14
3.4 Security issues related to mobile cloud computing.............................................................16
Chapter 4: Conclusion...................................................................................................................19
References......................................................................................................................................20
6
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
List of Figures
Figure 1: Cloud computing..............................................................................................................9
Figure 2: Security issues in mobile cloud computing....................................................................11
Figure 3: System Architecture.......................................................................................................15
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
List of Figures
Figure 1: Cloud computing..............................................................................................................9
Figure 2: Security issues in mobile cloud computing....................................................................11
Figure 3: System Architecture.......................................................................................................15
7
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Chapter 1: Introduction
In modern world, individuals have been using a lot of computing resources and devices
including mobile phones, computers, video games consoles and set-up boxes. Some of the boxes
are wired while others are wireless. These wireless devices are mainly connected with the help of
wireless networks including Wi-Fi to mobile network. However, these devices connect to a large
area and devices form a single punt. Therefore, the use in the wireless networks has been
promoted in the market [1]. The implementation of cloud computing in the wireless networks
have been a great step towards the data storage. Wireless networks have been collecting data and
information from various sources. Therefore, it becomes difficult for storing huge amount of data
at time and place. Cloud computing has helped in storing a mass amount of data and information
over the internet. Various devices have been connected with the cloud computing with respect to
get a large space for storing data and information. There is a need of awareness about the storing
data and information over the cloud. The cloud computing have been helping in providing a
keen approach ti the development of the services provided to the users over the market. The
technical achievement of the cloud computing have been helping in maintaining the services
prodded to the users of storing their data and information to internet [2]. The use of cloud
computing have been maintaining security of data and information. However, the security issues
in the cloud computing have been arising in each step of development in the technology. The
popularity of the cloud computing has been increasing in a daily basis in the market. The security
threats in the cloud computing have been issues fir the researchers sun the marketed. The use of
the cloud computing has been mainlining the services provided by cloud providers in the market.
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Chapter 1: Introduction
In modern world, individuals have been using a lot of computing resources and devices
including mobile phones, computers, video games consoles and set-up boxes. Some of the boxes
are wired while others are wireless. These wireless devices are mainly connected with the help of
wireless networks including Wi-Fi to mobile network. However, these devices connect to a large
area and devices form a single punt. Therefore, the use in the wireless networks has been
promoted in the market [1]. The implementation of cloud computing in the wireless networks
have been a great step towards the data storage. Wireless networks have been collecting data and
information from various sources. Therefore, it becomes difficult for storing huge amount of data
at time and place. Cloud computing has helped in storing a mass amount of data and information
over the internet. Various devices have been connected with the cloud computing with respect to
get a large space for storing data and information. There is a need of awareness about the storing
data and information over the cloud. The cloud computing have been helping in providing a
keen approach ti the development of the services provided to the users over the market. The
technical achievement of the cloud computing have been helping in maintaining the services
prodded to the users of storing their data and information to internet [2]. The use of cloud
computing have been maintaining security of data and information. However, the security issues
in the cloud computing have been arising in each step of development in the technology. The
popularity of the cloud computing has been increasing in a daily basis in the market. The security
threats in the cloud computing have been issues fir the researchers sun the marketed. The use of
the cloud computing has been mainlining the services provided by cloud providers in the market.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
8
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Therefore, it can be analyzed that cloud computing has been creating a new class of technology
in the market related to the data storage services.
The use of the mobile has been increased in the market by users. The retail mobile
adoption in this century has been exponentially growing in the market. Various new mobile
manufacturing companies have been opened din the market. The availability of the mobile
phones have been increased in the market. Therefore, the adoption of the cloud computing have
been increased in the market. The use of mobile has been versatile in every cases. Therefore,
adoption of cloud computing in the mobile phones have been a common cause for the
manufacturers in the market. Smartphones have been the next generation of the mobile phones.
Therefore, these smartphones have been utilizing the importance of cloud computing in the
marmite. The core technology of the cloud computing has been installed in the smartphones for
beneficiary effect of h cloud computing.
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Therefore, it can be analyzed that cloud computing has been creating a new class of technology
in the market related to the data storage services.
The use of the mobile has been increased in the market by users. The retail mobile
adoption in this century has been exponentially growing in the market. Various new mobile
manufacturing companies have been opened din the market. The availability of the mobile
phones have been increased in the market. Therefore, the adoption of the cloud computing have
been increased in the market. The use of mobile has been versatile in every cases. Therefore,
adoption of cloud computing in the mobile phones have been a common cause for the
manufacturers in the market. Smartphones have been the next generation of the mobile phones.
Therefore, these smartphones have been utilizing the importance of cloud computing in the
marmite. The core technology of the cloud computing has been installed in the smartphones for
beneficiary effect of h cloud computing.
9
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Chapter 2: Background
Cloud computing has been an emerging technology in the market. Therefore, there has
been many issues in the cloud computing including data security issues. Cloud computing has
been beneficial for an easy storage of data and information over the cloud. The use of cloud
computing in the technical world has been providing a lot of benefits in the organizations.
Various organization have been using the cloud computing in order to store their personal and
critical data and documents over the cloud [3]. The cloud providers are providing various offers
to the organizations for using their services. However, data issues have been an important
challenge faced by every company in the market. The use of thee mobile cloud computing has
been in trend for recent years. Mobile phones have been used by most of the user instead of
carrying a laptop of any there computing devices. The smartphones have been a revolution in
the mobile world. Various games and applications are running user the smartphone in order to
provide ease of accessing ti the users. Various facilities including data storage, portable networks
and important accessories are available over the smartphones.
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Chapter 2: Background
Cloud computing has been an emerging technology in the market. Therefore, there has
been many issues in the cloud computing including data security issues. Cloud computing has
been beneficial for an easy storage of data and information over the cloud. The use of cloud
computing in the technical world has been providing a lot of benefits in the organizations.
Various organization have been using the cloud computing in order to store their personal and
critical data and documents over the cloud [3]. The cloud providers are providing various offers
to the organizations for using their services. However, data issues have been an important
challenge faced by every company in the market. The use of thee mobile cloud computing has
been in trend for recent years. Mobile phones have been used by most of the user instead of
carrying a laptop of any there computing devices. The smartphones have been a revolution in
the mobile world. Various games and applications are running user the smartphone in order to
provide ease of accessing ti the users. Various facilities including data storage, portable networks
and important accessories are available over the smartphones.
10
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Figure 1: Cloud computing
According to Cisco IBSG (Internet Business Solution Group), almost 80% of population
of the world has been accessing mobile phones and new advanced devices including Android
smartphones, iPhones, palmtops and tablets [4]. Therefore, mobile cloud computing has been an
important aspect in then Cloud computing arena. With the rapid growth of the cloud computing
and mobile devices, the security of data and information has been increasing on a daily basis.
There has been many cases reported related to the data breach and loss in the cloud computing.
This technology is useful in augmenting the potential of devices which are resource constrained.
With the combination of cloud technology as well as mobile devices, the content providers will
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Figure 1: Cloud computing
According to Cisco IBSG (Internet Business Solution Group), almost 80% of population
of the world has been accessing mobile phones and new advanced devices including Android
smartphones, iPhones, palmtops and tablets [4]. Therefore, mobile cloud computing has been an
important aspect in then Cloud computing arena. With the rapid growth of the cloud computing
and mobile devices, the security of data and information has been increasing on a daily basis.
There has been many cases reported related to the data breach and loss in the cloud computing.
This technology is useful in augmenting the potential of devices which are resource constrained.
With the combination of cloud technology as well as mobile devices, the content providers will
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
11
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
get an opportunity to access billing capabilities and network capabilities through a number of
network. The technical advances have been showing both positive and negative results in the
market. The rapid growth of the internet has been creating several cases in the organization.
Cloud computing has helped in storing a mass amount of data and information over the internet
[5]. Mobile cloud computing has been creating several challenges and issues including privacy,
security, telecommunication capacity, anonymity, reliability and liability.
This thesis will throw light on identification of security challenges and issues in mobile
cloud computing. The research will help in analyses impact of the mobile cloud computing on
development of users in the market. The solutions to the challenges have been provided in the
research. The research is a complete package of mobile cloud computing and its security issues
and challenges over the wireless networks. The security architecture of mobile cloud computing
have been discussed in the research.
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
get an opportunity to access billing capabilities and network capabilities through a number of
network. The technical advances have been showing both positive and negative results in the
market. The rapid growth of the internet has been creating several cases in the organization.
Cloud computing has helped in storing a mass amount of data and information over the internet
[5]. Mobile cloud computing has been creating several challenges and issues including privacy,
security, telecommunication capacity, anonymity, reliability and liability.
This thesis will throw light on identification of security challenges and issues in mobile
cloud computing. The research will help in analyses impact of the mobile cloud computing on
development of users in the market. The solutions to the challenges have been provided in the
research. The research is a complete package of mobile cloud computing and its security issues
and challenges over the wireless networks. The security architecture of mobile cloud computing
have been discussed in the research.
12
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Figure 2: Security issues in mobile cloud computing
The availability of cloud computing and its slow emergence in the mobile domain have
provided the potential for a mobile cloud computing environment which is interconnected and
globally available. With the rise of wireless and handheld devices promising information on the
go anytime and from anywhere, the fundamental lives of people have changed [6]. The rise of
fast mobile networks has allowed millions of people all around the world to share ubiquitous
connectivity. The number of mobile devices and the consecutive applications it uses has risen
exponentially since 2013 and it has been universally accepted that mobile terminals like Wi-Fi
sensors, tablets, PDAs, mobile devices and thin clients are low in computational power (disk
capacity, memory size and processor speed). With the advancement in hardware, there will
always be a situation where the static hardware will lead to resource poor operations. The
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Figure 2: Security issues in mobile cloud computing
The availability of cloud computing and its slow emergence in the mobile domain have
provided the potential for a mobile cloud computing environment which is interconnected and
globally available. With the rise of wireless and handheld devices promising information on the
go anytime and from anywhere, the fundamental lives of people have changed [6]. The rise of
fast mobile networks has allowed millions of people all around the world to share ubiquitous
connectivity. The number of mobile devices and the consecutive applications it uses has risen
exponentially since 2013 and it has been universally accepted that mobile terminals like Wi-Fi
sensors, tablets, PDAs, mobile devices and thin clients are low in computational power (disk
capacity, memory size and processor speed). With the advancement in hardware, there will
always be a situation where the static hardware will lead to resource poor operations. The
13
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
concept of cloud computing can deliver in these aspect which has resulted in significant interest
for the technology from both the industry as well as the academia [7]. To remove the issues of a
mobile platform, the resources need to be collected from an external source such as the platforms
related to cloud computing.
This technology is useful in augmenting the potential of devices which are resource
constrained [56]. With the combination of cloud technology as well as mobile devices, the
content providers will get an opportunity to access billing capabilities and network capabilities
through a number of network. The cloud services in the mobile environment will allow the
services to experience enhanced mobility which will open up new possibilities for the mobile
applications to interact with the environment [8]. With enhanced cloud computing power and
optimization, the service providers can provide the users with underutilized capabilities with
high performance cloud computing featuring a new range of applications that can take advantage
of the software platform. Mobile cloud computing is still new with respect to the other
technologies that have been around. It is a range of mobile apps and service that have a data
center which is centralized like a tablet or a smartphone [9]. The cloud computing feature allows
a gateway access to the full feature of the mobile platform. Just like cloud computing, it is
primary to know about the privacy risks and security features of mobile cloud computing so that
effective and efficient solutions can be devised.
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
concept of cloud computing can deliver in these aspect which has resulted in significant interest
for the technology from both the industry as well as the academia [7]. To remove the issues of a
mobile platform, the resources need to be collected from an external source such as the platforms
related to cloud computing.
This technology is useful in augmenting the potential of devices which are resource
constrained [56]. With the combination of cloud technology as well as mobile devices, the
content providers will get an opportunity to access billing capabilities and network capabilities
through a number of network. The cloud services in the mobile environment will allow the
services to experience enhanced mobility which will open up new possibilities for the mobile
applications to interact with the environment [8]. With enhanced cloud computing power and
optimization, the service providers can provide the users with underutilized capabilities with
high performance cloud computing featuring a new range of applications that can take advantage
of the software platform. Mobile cloud computing is still new with respect to the other
technologies that have been around. It is a range of mobile apps and service that have a data
center which is centralized like a tablet or a smartphone [9]. The cloud computing feature allows
a gateway access to the full feature of the mobile platform. Just like cloud computing, it is
primary to know about the privacy risks and security features of mobile cloud computing so that
effective and efficient solutions can be devised.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
14
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Chapter 3: Review of Related Work
3.1 Mobile security service layers
There are three different layers to maintain the security infrastructure of the mobile cloud
computing environment namely Application and platform layer, backbone layer and
infrastructure layer. The security surveillance of the entire mobile cloud infrastructure is
constituted in the backbone layer. It helps in checking the machines and servers that are present
in the mobile cloud infrastructure [10]. The monitoring of the virtual machines present in the
cloud environment is monitored by the infrastructure layer. It constitutes a number of processes
such as cloud host serving, risk audits and evaluation, VM isolation, monitoring of the cloud
services and VM migration. Services such as data integration, encryption, authorization,
authentication, key management and user management are all carried out by the application
layer.
3.2 Schemes of mobile cloud computing
To avoid the limitations of mobile terminals like Wi-Fi sensors and mobile devices lack
of computational resources, power and communication, mobile cloud computing was created.
The mobile cloud computing can be broadly defined into two main schemes namely mobile
device as cloud service and cloud computing for mobile devices. The former helps to increase
the mobile device resources such as network connectivity, memory capacity and processing
power for better communication and data hungry computing within the network of mobile
devices [11]. This is perfect for situations where there are weak or no internet connectivity and
allows the migration of a number of functions of the applications to the nearby mobile device.
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Chapter 3: Review of Related Work
3.1 Mobile security service layers
There are three different layers to maintain the security infrastructure of the mobile cloud
computing environment namely Application and platform layer, backbone layer and
infrastructure layer. The security surveillance of the entire mobile cloud infrastructure is
constituted in the backbone layer. It helps in checking the machines and servers that are present
in the mobile cloud infrastructure [10]. The monitoring of the virtual machines present in the
cloud environment is monitored by the infrastructure layer. It constitutes a number of processes
such as cloud host serving, risk audits and evaluation, VM isolation, monitoring of the cloud
services and VM migration. Services such as data integration, encryption, authorization,
authentication, key management and user management are all carried out by the application
layer.
3.2 Schemes of mobile cloud computing
To avoid the limitations of mobile terminals like Wi-Fi sensors and mobile devices lack
of computational resources, power and communication, mobile cloud computing was created.
The mobile cloud computing can be broadly defined into two main schemes namely mobile
device as cloud service and cloud computing for mobile devices. The former helps to increase
the mobile device resources such as network connectivity, memory capacity and processing
power for better communication and data hungry computing within the network of mobile
devices [11]. This is perfect for situations where there are weak or no internet connectivity and
allows the migration of a number of functions of the applications to the nearby mobile device.
15
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
This removes the data charges in difficult areas such as roaming areas and are known to be cost
effective [12]. The later scheme allows for more cloud services to be used as additional and
exclusive services. These scheme allows for extended cloud computing services with context
features such as mobility characteristics, voice and camera.
3.3 Different architectures of mobile cloud computing
The architecture basically consists of augmentation approaches which are computational
in nature through which mobile devices which are resource constrained can use different cloud
services through computational power [13]. The cloud resources that are used in mobile cloud
computing are differentiated into four different categories namely proximate mobile, proximate
immobile, immobile clouds and a combination of the three models or hybrid [14]. So, from the
two parts of mobile and distributed computing, the mobile cloud computing is a mix of the two
advancements, an improvement of lattice and concentrated calculations and have a lot of
prospects for application [24].
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
This removes the data charges in difficult areas such as roaming areas and are known to be cost
effective [12]. The later scheme allows for more cloud services to be used as additional and
exclusive services. These scheme allows for extended cloud computing services with context
features such as mobility characteristics, voice and camera.
3.3 Different architectures of mobile cloud computing
The architecture basically consists of augmentation approaches which are computational
in nature through which mobile devices which are resource constrained can use different cloud
services through computational power [13]. The cloud resources that are used in mobile cloud
computing are differentiated into four different categories namely proximate mobile, proximate
immobile, immobile clouds and a combination of the three models or hybrid [14]. So, from the
two parts of mobile and distributed computing, the mobile cloud computing is a mix of the two
advancements, an improvement of lattice and concentrated calculations and have a lot of
prospects for application [24].
16
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Figure 3: System Architecture
There are primarily three cloud computing service models such as SaaS, PaaS and IaaS.
SaaS or Application software as a model is a software deployment model in mobile cloud
computing where licenses of the applications are given by a provider and the customers can use
the applications on demand as a service [15]. The end users can use the applications over the
cloud infrastructure as a service model and users can access the software through a client
interface for example a web enabled browser or email, The users do not have the authority to
change the capabilities of the individual applications, storage, operating systems, servers and
network infrastructure [16]. This architecture of mobile cloud computing is provided by several
companies such as Zoho, Microsoft, Salesforce and Google. The next architecture of Mobile
cloud computing is known as PaaS where the solution stack and the computing platform is
provided as a service. The end users are provided with the capability to use the platform as per
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Figure 3: System Architecture
There are primarily three cloud computing service models such as SaaS, PaaS and IaaS.
SaaS or Application software as a model is a software deployment model in mobile cloud
computing where licenses of the applications are given by a provider and the customers can use
the applications on demand as a service [15]. The end users can use the applications over the
cloud infrastructure as a service model and users can access the software through a client
interface for example a web enabled browser or email, The users do not have the authority to
change the capabilities of the individual applications, storage, operating systems, servers and
network infrastructure [16]. This architecture of mobile cloud computing is provided by several
companies such as Zoho, Microsoft, Salesforce and Google. The next architecture of Mobile
cloud computing is known as PaaS where the solution stack and the computing platform is
provided as a service. The end users are provided with the capability to use the platform as per
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
17
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
their requirements and can use the tools provided by the provider to change or modify the
contents [17]. The need users although are not allowed to modify the underlying infrastructure of
the mobile cloud environment such as the storage and operating systems, servers and networks.
This architecture also allows the users to use a combination of the application servers and
operating systems such as WAMP platform, LAM platform and XAMP [18]. The third
infrastructure that is used for mobile cloud computing is deliverance of computer infrastructure
or virtualization of the platform environment. The users are provided with the capability to use
the fundamental resources of computing, networks, storage and provisioning processes [19]. The
users also has the capability to deploy random software that can contain applications or operating
systems. The user ha control over the deployed applications, storage and operating systems but
does not control or manage the cloud infrastructure that is underlying.
3.4 Security issues related to mobile cloud computing
The issues related to saving sensitive data on the cloud and risking theft is similar in mobile
cloud computing devices. In mobile cloud computing, data security is a huge challenge that
needs to be tackled [20]. Other security issues related to mobile cloud computing devices are
risking the theft of important data, privacy rights violation, and physical security loss of access,
decryption and encryption key handling, auditing and security issues of virtual machines, data
integrity lack of standard and incompatible services due to more than one vendors.
End user mobile device attacks
Another major security issue of mobile cloud computing device is the end user mobile
device attacks. It is primary to save the device from threats such as misuse of accessible rights,
malware attacks, virus attacks and data theft from devices [21]. The information security issues
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
their requirements and can use the tools provided by the provider to change or modify the
contents [17]. The need users although are not allowed to modify the underlying infrastructure of
the mobile cloud environment such as the storage and operating systems, servers and networks.
This architecture also allows the users to use a combination of the application servers and
operating systems such as WAMP platform, LAM platform and XAMP [18]. The third
infrastructure that is used for mobile cloud computing is deliverance of computer infrastructure
or virtualization of the platform environment. The users are provided with the capability to use
the fundamental resources of computing, networks, storage and provisioning processes [19]. The
users also has the capability to deploy random software that can contain applications or operating
systems. The user ha control over the deployed applications, storage and operating systems but
does not control or manage the cloud infrastructure that is underlying.
3.4 Security issues related to mobile cloud computing
The issues related to saving sensitive data on the cloud and risking theft is similar in mobile
cloud computing devices. In mobile cloud computing, data security is a huge challenge that
needs to be tackled [20]. Other security issues related to mobile cloud computing devices are
risking the theft of important data, privacy rights violation, and physical security loss of access,
decryption and encryption key handling, auditing and security issues of virtual machines, data
integrity lack of standard and incompatible services due to more than one vendors.
End user mobile device attacks
Another major security issue of mobile cloud computing device is the end user mobile
device attacks. It is primary to save the device from threats such as misuse of accessible rights,
malware attacks, virus attacks and data theft from devices [21]. The information security issues
18
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
that are related to mobile cloud computing devices are protection of storage and systems, data
protection, user authentication, networking security and system security of database and servers.
Architectural security
From the architectural point of view, the mobile cloud computing system also faces
different security issues. Some of them are pricing, costs, agreement in service level,
interoperability, migration of services, mobile services in cloud which are aware of their context,
data access efficiency rate improvement, security of data, applications and mobile users and
computer offloading [22]. Consequently, Media Streaming of P2P for appropriating little
transmission capacity among the endorser who are found close-by in a similar zone for the
comparable substance, for example, the same video content. Existing key administration
arrangements generally consider the IDM or Identity Management as various issues. The security
issues in PaaS mobile cloud computing are related to security with relation to application
programming interface and SQL or structured query language [23]. The security issues that are
related to SaaS mobile cloud systems are related to web application scanning and vulnerability
and management of data security. The security issues that are related to mobile cloud
infrastructure has the potential to local user attacks, authentication and authorization issues,
phishing, platform level vulnerability and virtual machine attacks. Thus security issue of Mobile
cloud computing has potential to affect integrity of data that is present in cloud server.
Channel issues
Another security issue faced by the mobile cloud computing system is the security issues
related to the channel issues. Mobile cloud computing requires a lot of development in the
channel sector at a number of levels. Some of security issues for the mobile cloud computing
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
that are related to mobile cloud computing devices are protection of storage and systems, data
protection, user authentication, networking security and system security of database and servers.
Architectural security
From the architectural point of view, the mobile cloud computing system also faces
different security issues. Some of them are pricing, costs, agreement in service level,
interoperability, migration of services, mobile services in cloud which are aware of their context,
data access efficiency rate improvement, security of data, applications and mobile users and
computer offloading [22]. Consequently, Media Streaming of P2P for appropriating little
transmission capacity among the endorser who are found close-by in a similar zone for the
comparable substance, for example, the same video content. Existing key administration
arrangements generally consider the IDM or Identity Management as various issues. The security
issues in PaaS mobile cloud computing are related to security with relation to application
programming interface and SQL or structured query language [23]. The security issues that are
related to SaaS mobile cloud systems are related to web application scanning and vulnerability
and management of data security. The security issues that are related to mobile cloud
infrastructure has the potential to local user attacks, authentication and authorization issues,
phishing, platform level vulnerability and virtual machine attacks. Thus security issue of Mobile
cloud computing has potential to affect integrity of data that is present in cloud server.
Channel issues
Another security issue faced by the mobile cloud computing system is the security issues
related to the channel issues. Mobile cloud computing requires a lot of development in the
channel sector at a number of levels. Some of security issues for the mobile cloud computing
19
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
system due to the channel issues are availability attacks, authentication attacks, attacks that
compromise data integrity and attacks related to access control [24]. Some of the other major
security challenges that are faced at the communication levels are availability of limited
resources, heterogeneity, and unavailability of the desired service, problems related to latency
and issues related to low bandwidth [19]. These security challenges need to be properly resolved
to deem the mobile cloud computing as a secure medium for storing data where users can get
comfortable in storing their personal data in the mobile cloud without any hesitation.
Privacy and Authentication of information
Just like normal cloud adopters, the mobile cloud computing system is no exception and
needs proper privacy and security measures to prevent it from becoming a failure.
Understanding the security flaws of the mobile cloud computing system helps to devise counter
measures for resolving these problems [21]. One of serious security issues is related to IAM or
Identity and Access Management. ABKM is a broad adaptation of character based cryptography
that coordinates important management and IDM to streamline key issues of management. In
ABKM, every one of the characteristics are considered to have a place with an element as its
open key [11]. Each trait can be considered as an open key part, and every one of the qualities is
additionally combined with a private key segment.
Since portable system resource is significantly littler analyzed with the conventional
systems data transmission is the one of major critical issues in mobile cloud condition. ABKM is
fundamentally an expanded form of character based cryptography, in which the character can be
viewed as different unmistakable properties. It can be utilized to speak to strategies through
legitimate administrators. Contrasted with customary PKI based key administration arrangements
where a client's private key is just known to the open proprietor, utilizing ABKM, the confided
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
system due to the channel issues are availability attacks, authentication attacks, attacks that
compromise data integrity and attacks related to access control [24]. Some of the other major
security challenges that are faced at the communication levels are availability of limited
resources, heterogeneity, and unavailability of the desired service, problems related to latency
and issues related to low bandwidth [19]. These security challenges need to be properly resolved
to deem the mobile cloud computing as a secure medium for storing data where users can get
comfortable in storing their personal data in the mobile cloud without any hesitation.
Privacy and Authentication of information
Just like normal cloud adopters, the mobile cloud computing system is no exception and
needs proper privacy and security measures to prevent it from becoming a failure.
Understanding the security flaws of the mobile cloud computing system helps to devise counter
measures for resolving these problems [21]. One of serious security issues is related to IAM or
Identity and Access Management. ABKM is a broad adaptation of character based cryptography
that coordinates important management and IDM to streamline key issues of management. In
ABKM, every one of the characteristics are considered to have a place with an element as its
open key [11]. Each trait can be considered as an open key part, and every one of the qualities is
additionally combined with a private key segment.
Since portable system resource is significantly littler analyzed with the conventional
systems data transmission is the one of major critical issues in mobile cloud condition. ABKM is
fundamentally an expanded form of character based cryptography, in which the character can be
viewed as different unmistakable properties. It can be utilized to speak to strategies through
legitimate administrators. Contrasted with customary PKI based key administration arrangements
where a client's private key is just known to the open proprietor, utilizing ABKM, the confided
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
20
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
in expert creates private key parts for every client as per his/her open properties [7]. This
approach conveys a noteworthy advantage of the utilization of ABKM, in that the private key
can be created for distinct terms or proclamations rather than utilizing an extensive irregular
number [24].
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
in expert creates private key parts for every client as per his/her open properties [7]. This
approach conveys a noteworthy advantage of the utilization of ABKM, in that the private key
can be created for distinct terms or proclamations rather than utilizing an extensive irregular
number [24].
21
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Chapter 4: Conclusion
It can be concluded that cloud computing has been helping in various IT fields. The
privacy complication is a serious issue as a single security breach can destroy the revenue
potential and brand value of the designated organization that is providing the cloud based
services. With the advancement in hardware, there will always be a situation where the static
hardware will lead to resource poor operations. To remove the issues of a mobile platform, the
resources need to be collected from an external source such as the platforms related to cloud
computing. To provide a number of other diverse services, the mobile cloud environment also
needs a number of neutral third parties that can offer help in case a security concern arises. Data
provenance is another major concern in this respect. A hacker can use the provenance
information to collect sensitive information such as access controls which are history based,
auditing and trace backs which can be challenging for the mobile cloud environment to mitigate
as the physical parameter of the shared environment is already abandoned. The private key is
shaped by different private key segments which is dispersed from a trusted expert. With the help
of cloud system, users can easily access their information from anywhere and anytime on the go.
Based on the credentials and characteristics, an identity management system is crucial for
authenticating the proper users to access their personal data.
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Chapter 4: Conclusion
It can be concluded that cloud computing has been helping in various IT fields. The
privacy complication is a serious issue as a single security breach can destroy the revenue
potential and brand value of the designated organization that is providing the cloud based
services. With the advancement in hardware, there will always be a situation where the static
hardware will lead to resource poor operations. To remove the issues of a mobile platform, the
resources need to be collected from an external source such as the platforms related to cloud
computing. To provide a number of other diverse services, the mobile cloud environment also
needs a number of neutral third parties that can offer help in case a security concern arises. Data
provenance is another major concern in this respect. A hacker can use the provenance
information to collect sensitive information such as access controls which are history based,
auditing and trace backs which can be challenging for the mobile cloud environment to mitigate
as the physical parameter of the shared environment is already abandoned. The private key is
shaped by different private key segments which is dispersed from a trusted expert. With the help
of cloud system, users can easily access their information from anywhere and anytime on the go.
Based on the credentials and characteristics, an identity management system is crucial for
authenticating the proper users to access their personal data.
22
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
References
[1] Fernando, Niroshinie, Seng W. Loke, and Wenny Rahayu. "Mobile cloud computing: A
survey." Future generation computer systems 29, no. 1 (2013): 84-106.
[2] Sanaei, Zohreh, Saeid Abolfazli, Abdullah Gani, and Rajkumar Buyya. "Heterogeneity in
mobile cloud computing: taxonomy and open challenges." IEEE Communications
Surveys & Tutorials 16, no. 1 (2014): 369-392.
[3] Khan, Abdul Nasir, ML Mat Kiah, Samee U. Khan, and Sajjad A. Madani. "Towards
secure mobile cloud computing: A survey." Future Generation Computer Systems 29, no.
5 (2013): 1278-1299.
[4] Rahimi, M. Reza, Jian Ren, Chi Harold Liu, Athanasios V. Vasilakos, and Nalini
Venkatasubramanian. "Mobile cloud computing: A survey, state of art and future
directions." Mobile Networks and Applications 19, no. 2 (2014): 133-143.
[5] Barbera, Marco V., Sokol Kosta, Alessandro Mei, and Julinda Stefa. "To offload or not to
offload? the bandwidth and energy costs of mobile cloud computing." In INFOCOM,
2013 Proceedings IEEE, pp. 1285-1293. IEEE, 2013.
[6] Chen, Xu. "Decentralized computation offloading game for mobile cloud
computing." IEEE Transactions on Parallel and Distributed Systems 26, no. 4 (2015):
974-983.
[7] Dinh, Hoang T., Chonho Lee, Dusit Niyato, and Ping Wang. "A survey of mobile cloud
computing: architecture, applications, and approaches." Wireless communications and
mobile computing 13, no. 18 (2013): 1587-1611.
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
References
[1] Fernando, Niroshinie, Seng W. Loke, and Wenny Rahayu. "Mobile cloud computing: A
survey." Future generation computer systems 29, no. 1 (2013): 84-106.
[2] Sanaei, Zohreh, Saeid Abolfazli, Abdullah Gani, and Rajkumar Buyya. "Heterogeneity in
mobile cloud computing: taxonomy and open challenges." IEEE Communications
Surveys & Tutorials 16, no. 1 (2014): 369-392.
[3] Khan, Abdul Nasir, ML Mat Kiah, Samee U. Khan, and Sajjad A. Madani. "Towards
secure mobile cloud computing: A survey." Future Generation Computer Systems 29, no.
5 (2013): 1278-1299.
[4] Rahimi, M. Reza, Jian Ren, Chi Harold Liu, Athanasios V. Vasilakos, and Nalini
Venkatasubramanian. "Mobile cloud computing: A survey, state of art and future
directions." Mobile Networks and Applications 19, no. 2 (2014): 133-143.
[5] Barbera, Marco V., Sokol Kosta, Alessandro Mei, and Julinda Stefa. "To offload or not to
offload? the bandwidth and energy costs of mobile cloud computing." In INFOCOM,
2013 Proceedings IEEE, pp. 1285-1293. IEEE, 2013.
[6] Chen, Xu. "Decentralized computation offloading game for mobile cloud
computing." IEEE Transactions on Parallel and Distributed Systems 26, no. 4 (2015):
974-983.
[7] Dinh, Hoang T., Chonho Lee, Dusit Niyato, and Ping Wang. "A survey of mobile cloud
computing: architecture, applications, and approaches." Wireless communications and
mobile computing 13, no. 18 (2013): 1587-1611.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
23
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
[8] Sanaei, Zohreh, Saeid Abolfazli, Abdullah Gani, and Rajkumar Buyya. "Heterogeneity in
mobile cloud computing: taxonomy and open challenges." IEEE Communications
Surveys & Tutorials 16, no. 1 (2014): 369-392.
[9] Liu, Jieyao, Ejaz Ahmed, Muhammad Shiraz, Abdullah Gani, Rajkumar Buyya, and
Ahsan Qureshi. "Application partitioning algorithms in mobile cloud computing:
Taxonomy, review and future directions." Journal of Network and Computer
Applications 48 (2015): 99-117. Gai, Keke, Meikang Qiu, Bhavani Thuraisingham, and
Lixin Tao. "Proactive attribute-based secure data schema for mobile cloud in financial
industry." In High Performance Computing and Communications (HPCC), 2015 IEEE
7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th
International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th
International Conference on, pp. 1332-1337. IEEE, 2015.
[10] Yan, Qiao, F. Richard Yu, Qingxiang Gong, and Jianqiang Li. "Software-defined
networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing
environments: A survey, some research issues, and challenges." IEEE Communications
Surveys & Tutorials 18, no. 1 (2016): 602-622.
[11] Chang, Victor, and Muthu Ramachandran. "Towards achieving data security with
the cloud computing adoption framework." IEEE Trans. Services Computing 9, no. 1
(2016): 138-151.
[12] Youssef, Ahmed E. "A framework for secure healthcare systems based on big
data analytics in mobile cloud computing environments." Int J Ambient Syst Appl 2, no. 2
(2014): 1-11.
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
[8] Sanaei, Zohreh, Saeid Abolfazli, Abdullah Gani, and Rajkumar Buyya. "Heterogeneity in
mobile cloud computing: taxonomy and open challenges." IEEE Communications
Surveys & Tutorials 16, no. 1 (2014): 369-392.
[9] Liu, Jieyao, Ejaz Ahmed, Muhammad Shiraz, Abdullah Gani, Rajkumar Buyya, and
Ahsan Qureshi. "Application partitioning algorithms in mobile cloud computing:
Taxonomy, review and future directions." Journal of Network and Computer
Applications 48 (2015): 99-117. Gai, Keke, Meikang Qiu, Bhavani Thuraisingham, and
Lixin Tao. "Proactive attribute-based secure data schema for mobile cloud in financial
industry." In High Performance Computing and Communications (HPCC), 2015 IEEE
7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th
International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th
International Conference on, pp. 1332-1337. IEEE, 2015.
[10] Yan, Qiao, F. Richard Yu, Qingxiang Gong, and Jianqiang Li. "Software-defined
networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing
environments: A survey, some research issues, and challenges." IEEE Communications
Surveys & Tutorials 18, no. 1 (2016): 602-622.
[11] Chang, Victor, and Muthu Ramachandran. "Towards achieving data security with
the cloud computing adoption framework." IEEE Trans. Services Computing 9, no. 1
(2016): 138-151.
[12] Youssef, Ahmed E. "A framework for secure healthcare systems based on big
data analytics in mobile cloud computing environments." Int J Ambient Syst Appl 2, no. 2
(2014): 1-11.
24
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
[13] Yang, Lei, Jiannong Cao, Yin Yuan, Tao Li, Andy Han, and Alvin Chan. "A
framework for partitioning and execution of data stream applications in mobile cloud
computing." ACM SIGMETRICS Performance Evaluation Review 40, no. 4 (2013): 23-
32.
[14] Wang, Yating, Ray Chen, and Ding-Chau Wang. "A survey of mobile cloud
computing applications: perspectives and challenges." Wireless Personal
Communications 80, no. 4 (2015): 1607-1623.
[15] Souza, Vitor Barbosa, Xavi Masip-Bruin, Eva Marín-Tordera, Wilson Ramírez,
and Sergio Sanchez. "Towards distributed service allocation in fog-to-cloud (F2C)
scenarios." In Global Communications Conference (GLOBECOM), 2016 IEEE, pp. 1-6.
IEEE, 2016.
[16] Mao, Yuyi, Changsheng You, Jun Zhang, Kaibin Huang, and Khaled B. Letaief.
"A survey on mobile edge computing: The communication perspective." IEEE
Communications Surveys & Tutorials 19, no. 4 (2017): 2322-2358.
[17] Han, Qilong, Shuang Liang, and Hongli Zhang. "Mobile cloud sensing, big data,
and 5G networks make an intelligent and smart world." IEEE Network 29, no. 2 (2015):
40-45.
[18] Yi, Shanhe, Zhengrui Qin, and Qun Li. "Security and privacy issues of fog
computing: A survey." In International conference on wireless algorithms, systems, and
applications, pp. 685-695. Springer, Cham, 2015.
[19] Meng, Weizhi, Duncan S. Wong, Steven Furnell, and Jianying Zhou. "Surveying
the development of biometric user authentication on mobile phones." IEEE
Communications Surveys & Tutorials 17, no. 3 (2015): 1268-1293.
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
[13] Yang, Lei, Jiannong Cao, Yin Yuan, Tao Li, Andy Han, and Alvin Chan. "A
framework for partitioning and execution of data stream applications in mobile cloud
computing." ACM SIGMETRICS Performance Evaluation Review 40, no. 4 (2013): 23-
32.
[14] Wang, Yating, Ray Chen, and Ding-Chau Wang. "A survey of mobile cloud
computing applications: perspectives and challenges." Wireless Personal
Communications 80, no. 4 (2015): 1607-1623.
[15] Souza, Vitor Barbosa, Xavi Masip-Bruin, Eva Marín-Tordera, Wilson Ramírez,
and Sergio Sanchez. "Towards distributed service allocation in fog-to-cloud (F2C)
scenarios." In Global Communications Conference (GLOBECOM), 2016 IEEE, pp. 1-6.
IEEE, 2016.
[16] Mao, Yuyi, Changsheng You, Jun Zhang, Kaibin Huang, and Khaled B. Letaief.
"A survey on mobile edge computing: The communication perspective." IEEE
Communications Surveys & Tutorials 19, no. 4 (2017): 2322-2358.
[17] Han, Qilong, Shuang Liang, and Hongli Zhang. "Mobile cloud sensing, big data,
and 5G networks make an intelligent and smart world." IEEE Network 29, no. 2 (2015):
40-45.
[18] Yi, Shanhe, Zhengrui Qin, and Qun Li. "Security and privacy issues of fog
computing: A survey." In International conference on wireless algorithms, systems, and
applications, pp. 685-695. Springer, Cham, 2015.
[19] Meng, Weizhi, Duncan S. Wong, Steven Furnell, and Jianying Zhou. "Surveying
the development of biometric user authentication on mobile phones." IEEE
Communications Surveys & Tutorials 17, no. 3 (2015): 1268-1293.
25
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
[20] Pawle, Akshay A., and Vrushsen P. Pawar. "Face recognition system (FRS) on
cloud computing for user authentication." International Journal of Soft Computing and
Engineering (IJSCE) 3, no. 4 (2013).
[21] Mollah, Muhammad Baqer, Md Abul Kalam Azad, and Athanasios Vasilakos.
"Security and privacy challenges in mobile cloud computing: Survey and way
ahead." Journal of Network and Computer Applications 84 (2017): 38-54.
[22] Zhang, Weiwen, Yonggang Wen, Kyle Guan, Dan Kilper, Haiyun Luo, and
Dapeng Oliver Wu. "Energy-optimal mobile cloud computing under stochastic wireless
channel." IEEE Transactions on Wireless Communications 12, no. 9 (2013): 4569-4581.
[23] Huang, Dijiang, and Huijun Wu. Mobile Cloud Computing: Foundations and
Service Models. Morgan Kaufmann, 2017.
[24] Hou, Xueshi, Yong Li, Min Chen, Di Wu, Depeng Jin, and Sheng Chen.
"Vehicular fog computing: A viewpoint of vehicles as the infrastructures." IEEE
Transactions on Vehicular Technology 65, no. 6 (2016): 3860-3873.
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
[20] Pawle, Akshay A., and Vrushsen P. Pawar. "Face recognition system (FRS) on
cloud computing for user authentication." International Journal of Soft Computing and
Engineering (IJSCE) 3, no. 4 (2013).
[21] Mollah, Muhammad Baqer, Md Abul Kalam Azad, and Athanasios Vasilakos.
"Security and privacy challenges in mobile cloud computing: Survey and way
ahead." Journal of Network and Computer Applications 84 (2017): 38-54.
[22] Zhang, Weiwen, Yonggang Wen, Kyle Guan, Dan Kilper, Haiyun Luo, and
Dapeng Oliver Wu. "Energy-optimal mobile cloud computing under stochastic wireless
channel." IEEE Transactions on Wireless Communications 12, no. 9 (2013): 4569-4581.
[23] Huang, Dijiang, and Huijun Wu. Mobile Cloud Computing: Foundations and
Service Models. Morgan Kaufmann, 2017.
[24] Hou, Xueshi, Yong Li, Min Chen, Di Wu, Depeng Jin, and Sheng Chen.
"Vehicular fog computing: A viewpoint of vehicles as the infrastructures." IEEE
Transactions on Vehicular Technology 65, no. 6 (2016): 3860-3873.
1 out of 25
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.