logo

Mobile Cloud Computing in Wireless Network and Security Issues

   

Added on  2023-06-08

25 Pages5515 Words177 Views
Running head: MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND
SECURITY ISSUES
Mobile cloud computing in wireless network and security issues
Name of the Student
Name of the University
Author’s Note

2
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Abstract
This thesis focuses on security issues in the mobile cloud computing in wireless networks. Cloud
computing has been a great approach to the IT field. Various organization has been benefited by
the cloud computing. It is the duty of the mobile cloud environment providers to assure their
customer to enforce certain limitations over the data being shared and the privacy assurance as
well as the transparency degree of the data. The aim of the research is to identify security issues
in mobile computing in wireless networks. There has been many cases reported related to the
data breach and loss in the cloud computing. The solutions to the challenges have been provided
in the research. The research is a complete package of mobile cloud computing and its security
issues and challenges over the wireless networks. The security architecture of mobile cloud
computing have been discussed in the research.

3
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Acknowledgement
Firstly, I would like to express my sincere gratitude to my advisor Prof. _______ for the
continuous support of related research, for his patience, motivation, and immense knowledge.
His guidance helped me in all the time of research and writing of this thesis. I could not have
imagined having a better advisor and mentor for my study. Besides my advisor, I would like to
thank the rest of my thesis committee: Prof. __________, for their insightful comments and
encouragement, but also for the hard question which incented me to widen my research from
various perspectives. My sincere thanks also goes to Dr. _________, who provided me an
opportunity to join their team as intern, and who gave access to the laboratory and research
facilities. Without they precious support it would not be possible to conduct this research.
I thank my fellow labmates in for the stimulating discussions, for the sleepless nights we were
working together before deadlines, and for all the fun we have had in the last four years. Also I
thank my friends in the following institution __________________________ . In particular, I am
grateful to Dr. Chen Fan for enlightening me the first glance of research.
Last but not the least, I would like to thank my family: my parents and to my brothers and sister
for supporting me spiritually throughout writing this thesis and my my life in general.

4
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Statement of Originality
I certify that this thesis contains no material which has been accepted for the award of any other
degree or diploma in any institute, college or university, and that, to the best of my knowledge
and belief, it contains no material previously published or written by another person, except
where due references are made in the text of the thesis.
-----------------------------
Xxxxy Yyyyy

5
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
Table of Contents
Abstract............................................................................................................................................2
Acknowledgement...........................................................................................................................3
Statement of Originality..................................................................................................................4
Table of Contents.............................................................................................................................5
List of Figures..................................................................................................................................6
Chapter 1: Introduction....................................................................................................................7
Chapter 2: Background...................................................................................................................8
Chapter 3: Review of Related Work..............................................................................................13
3.1 Mobile security service layers.............................................................................................13
3.2 Schemes of mobile cloud computing...................................................................................13
3.3 Different architectures of mobile cloud computing.............................................................14
3.4 Security issues related to mobile cloud computing.............................................................16
Chapter 4: Conclusion...................................................................................................................19
References......................................................................................................................................20

6
MOBILE CLOUD COMPUTING IN WIRELESS NETWORK AND SECURITY ISSUES
List of Figures
Figure 1: Cloud computing..............................................................................................................9
Figure 2: Security issues in mobile cloud computing....................................................................11
Figure 3: System Architecture.......................................................................................................15

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Intrusion Detection Network in Mobile Ad-Hoc Network: Comparison and Recommendations
|97
|24679
|344

Unmanned Aircraft Vehicle (UAV) Pilot Identification Using Machine Learning
|32
|6106
|32

Cloud Computing in Financial Sector: Current Security, Privacy Issues and its Solutions
|46
|14528
|272

Reducing Risk in Cloud Migration: Solutions and Recommendations
|49
|12277
|363

Unmanned Aircraft Vehicle (UAV) Pilot Identification Using Machine Learning
|194
|37026
|218

Unmanned Aircraft Vehicle (UAV) Pilot Identification Using Machine Learning
|226
|35609
|139