logo

Assignment on Security In Mobile Cloud Computing

The assignment is a final report for a research project on the topic of security in mobile cloud computing.

41 Pages11151 Words17 Views
   

Added on  2022-08-12

Assignment on Security In Mobile Cloud Computing

The assignment is a final report for a research project on the topic of security in mobile cloud computing.

   Added on 2022-08-12

ShareRelated Documents
Running head: SECURITY IN MCC
SECURITY IN MOBILE CLOUD COMPUTING
Name of the Student:
Name of the University:
Author Note:
Assignment on Security In Mobile Cloud Computing_1
SECURITY IN MCC1
Table of Contents
1. Introduction..............................................................................................................................2
1.1 Research background........................................................................................................5
1.2 Significance...........................................................................................................................6
1.3 Research Problem:.................................................................................................................9
1.4 Research Question:................................................................................................................9
2. Literature Review......................................................................................................................10
2.1 Mobile Cloud Computing....................................................................................................10
2.2 Security in Mobile Cloud Computing..................................................................................12
Security of Mobile Network User..............................................................................................13
Securing Information on the Cloud...........................................................................................17
2.3 Related works in security of mobile cloud computing........................................................18
Application Security..................................................................................................................18
Security of Data.........................................................................................................................19
2.4 Security Issues in Mobile Cloud Computing.......................................................................19
2.5 Solution................................................................................................................................22
2.6 The Future of Cloud.............................................................................................................24
2.7 Effectiveness in Business Organizations.............................................................................25
3. Methodology..............................................................................................................................27
3.1 Introduction to Methodology:..............................................................................................27
3.2 Research Philosophy:...........................................................................................................27
3.3 Research Design:.................................................................................................................28
3.4 Method for collecting the data for the research:..................................................................28
3.5 Research Ethics:...................................................................................................................30
3.6 Research Limitations:..............................................................................................................30
4. Future Research......................................................................................................................31
5. Conclusion..............................................................................................................................32
References......................................................................................................................................34
Assignment on Security In Mobile Cloud Computing_2
SECURITY IN MCC2
1. Introduction
MCC (Mobile Cloud Computing) is a technology with the help of which data processing as
well as storage is performed. It provides more than one IT resources and services to the mobile
network for on-demand self-service (Kumar 2020). Mobile service providers give different types
of services and facilities to the consumers. It can be performed by taking entire benefit of the
cloud computing. Resources in the MCC are situated in many virtual distributed computer
systems. There are many companies who offer various cloud based products like android.
Google maps and Geographic search are new cloud based products in Google.
Security is a crucial problem in this particular context. There are three levels of security in
the system of MCC:
Mobile terminal
This is a kind of open operating system. It provides wireless access to the internet.
It also provides support to the third party software and personalisation (Ibtihal and
Hassan 2020). For that reason, this can be said that, security issues of MCC are a big
deal. Following are some security issues in the mobile cloud computing.
Malware
This helps intruders to get necessary access of a particular user (Labati et
al. 2020). They are able to down load all the details of the users automatically. A
huge number of anti-malware software is developed. But they do not have many
resources. There is a huge capacity of the mobile terminals that are significant to
the various computing resources.
Assignment on Security In Mobile Cloud Computing_3
SECURITY IN MCC3
Software vulnerabilities
For application software, the log in creadentials are moved to the
network with the help of File Transfer Protocol (Stergiou et al. 2020). These
are preserved as a clear text. These provide an unauthorized access of the cell
phones from computers within similar network. For that reason, personal
information is not at all secured.
Mobile Network Security
Mobile gadgets has the ability for accessing the network by adopting various
phone services, sending of Short message services and other services related to the
internet (Wamsi, Pandey and Kakade 2020). Smart phones can access the Wi-Fi and
Bluetooth Network. For that reason, these accesses are responsible for security threats as
well as malicious attack.
Mobile Cloud
Security in MCC is highlighted with respect two problems- privacy protection of
data and platform reliability. These are as follows:
Platform Reliability
Cloud services give a huge amount of storage for the resources of
important resources (Xia, Jiu and Fan 2020). For that reason, there is always a
threat of being attacked. There are various types of attacks such as malwareor
any other malicious program, cloud users or insiders. Main intention of
intruders is for destroying the cloud services. The Denial of Service terminates
cloud services by dissolving the availability of the platform.
Assignment on Security In Mobile Cloud Computing_4
SECURITY IN MCC4
Prevention of data as well as privacy
The management of the users of the data stays at different
locations. The users are totally dark regarding the appropriate situation of
the infrastructure (Wamsi, Pandey and Kakade 2020). For that reason, data
protection as well as privacy is an important aspect in the MCC.
Figure 1: Mobile cloud computing model (Sharma & Bohra, 2015)
The essential keywords which are associated with this topic are described below:
Table 1: Keywords related to the research study
1. Mobile Cloud Computing MCC is treated as a latest pattern of the distributed computing
for their applications (Stergiou et al. 2020). The storage and
data handling is moved with the help of Smart mobile gadgets
to the rich resources. It has very powerful centralized centres
Assignment on Security In Mobile Cloud Computing_5
SECURITY IN MCC5
for the computation of data within the computational cloud.
2. User Authentication It is a process of performing the authentication of the
uniqueness of the mobile user to make sure that he is an
authentic user for accessing the resources of the mobile cloud
(Stergiou and Psannis 2020).
3. Information security issues There are some very common problems of the information
security issues of mobile cloud computing (Pérez et val. 2020).
These are System security of server and database, security in
networks, protection of data, protection of storage as well as
systems.
Figure 2: Table of mobile cloud computing
1.1 Research background
In this particular case, various research background of the mobile cloud computing as well as
software architecture is discussed.
Mobile Cloud Computing was invented as a very popular technology and it is used as the
replacement of the old theories of the cloud computing (Neware et al. 2020). According to a
survey, there are approximately seven million mobile devices in the entire globe. It indicates that
the number of mobile devices are enhancing five times faster than the human population (Labati
et al. 2020). It is treated as the combination of the mobile gadgets, mobile applications as well as
remote server. It also offers some portable solutions in the area of the MCC. It can be treated as
the backbone of mobile computing. It highlights some gadgets (Mahmud et al. 2020). It helps the
Assignment on Security In Mobile Cloud Computing_6
SECURITY IN MCC6
users to perform various computation of the mobile cloud computing. It helps to share various
information regarding the research.
The software architecture highlights the blueprint or high level view of particular
software. It is proved to be a successful abstraction of several complexities of various
modules of the source code (Kumar 2020). It is used to highlight some components of the
architecture. There are some main computational elements for giving the abstraction of the
complicated details. It also gives some context-sensitivity (Li and Zhu 2020). The mobile
cloud software system is observed as a layered architecture model. It gives some storage
facilities and it can be treated as a part of the layer of cloud computing.
1.2 Significance
There are various stakeholders involved in this type of the research. These are as follows:
Service
Providers
Platform
providers
Consumer
s
Assignment on Security In Mobile Cloud Computing_7
SECURITY IN MCC7
Figure 2: Stakeholder diagram
Service Providers
If strong security mechanism is applied to the mobile cloud computing services,
then service providers can easily provide the services to the consumers (Kocabas and
Soyata 2020). Service providers can provide some efficient service to their consumers.
Using the cloud services, the service providers can provide services to their potential
consumers from any location in the globe.
Consumers
If the consumers are getting secured mobile services from the service provider
then the consumers will feel secure regarding these services. As a result of that, the
number of consumers will be increased rapidly (Ibtihal and Hassan 2020). As there is no
chance of the data loss or stolen gadgets, details of the consumer will be secured. As a
result of that, it will increase the popularity of the consumers on the services. As there is
a strong security in the MCC services, then this will provide less vulnerability of the
gadgets, operating system and third party services. As a better methodology of malicious
code detection is applied in the mobile cloud computing services, so that it is possible for
service provider to provide secure services to the consumer. It automatically increases the
popularity of the services to the consumer (Bhattacharya et al. 2020). For that reason,
consumers can enjoy best services from the end of the service provider. As better security
mechanism is implemented, so that consumers can face lesser amount of risk while using
these services.
Platform providers
Assignment on Security In Mobile Cloud Computing_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Smart Park Application and Cloud Computing System Architecture
|30
|5012
|125

Cloud Computing: Overview, Strengths, Weaknesses, and Challenges
|8
|2201
|438

Research on Mobile Cloud Computing: Review, Trend and Perspectives
|8
|582
|71

The Most Demanding Software for the Users
|2
|347
|192

Cloud Computing
|9
|1933
|1

Internet Services and Security: A Case Study of Google
|21
|1111
|237