Security in Mobile Computing
VerifiedAdded on 2023/01/18
|25
|5600
|67
AI Summary
This report discusses the topic of security in mobile computing, focusing on the works of various authors and their related articles. It explores the need for security measures in the mobile computing sector and provides insights into potential security breaches and their prevention. The report also covers the different sectors that are vulnerable to such attacks. The research aims to enhance understanding of the security aspects that can be enforced within the mobile computing platform.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: SECURITY IN MOBILE COMPUTING
Security in Mobile Computing
Name of the Student
Student ID
Author’s note
Security in Mobile Computing
Name of the Student
Student ID
Author’s note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1SECURITY IN MOBILE COMPUTING
Abstract
The discussion in this report is mainly based over focusing over the works of various authors and
their related articles. The research is based on the topic of security in the platform of mobile
computing. In the recent times, there have been major topics of security breaches that have
occurred within the area of mobile computing. In this article, we have researched over these
article in order to understand about the various aspects of security within the mobile computing
sector and thus understand about the various kind of steps, which could be approached in order
to mitigate the chances of problems within the sector. All the associated sectors that could be
prone to such kind of attacks have also been discussed in this part of the report. Thus this
research would be helpful in understanding about the needs of security aspects that could be
enforced within the mobile computing platform.
Abstract
The discussion in this report is mainly based over focusing over the works of various authors and
their related articles. The research is based on the topic of security in the platform of mobile
computing. In the recent times, there have been major topics of security breaches that have
occurred within the area of mobile computing. In this article, we have researched over these
article in order to understand about the various aspects of security within the mobile computing
sector and thus understand about the various kind of steps, which could be approached in order
to mitigate the chances of problems within the sector. All the associated sectors that could be
prone to such kind of attacks have also been discussed in this part of the report. Thus this
research would be helpful in understanding about the needs of security aspects that could be
enforced within the mobile computing platform.
2SECURITY IN MOBILE COMPUTING
Table of Contents
1. Literature Review – Broad Scan and Reading.............................................................................3
1.1 Round 1..................................................................................................................................3
1.1.1 Search Keyword..............................................................................................................3
1.1.2 Result..............................................................................................................................3
1.2 Round 2..................................................................................................................................6
1.2.1 Search Keyword..............................................................................................................6
1.2.2 Result..............................................................................................................................6
1.3 Round 3................................................................................................................................10
1.3.1 Search Keyword............................................................................................................10
1.3.2 Result............................................................................................................................10
2. Literature Review – Focused Reading.......................................................................................13
2.1 Detail Reading of Article 1..................................................................................................13
2.2 Detail Reading of Article 2..................................................................................................15
2.3 Detail Reading of Article 3..................................................................................................17
2.4 Detail Reading of Article 4..................................................................................................19
3. Proposed Research.....................................................................................................................21
References......................................................................................................................................23
Table of Contents
1. Literature Review – Broad Scan and Reading.............................................................................3
1.1 Round 1..................................................................................................................................3
1.1.1 Search Keyword..............................................................................................................3
1.1.2 Result..............................................................................................................................3
1.2 Round 2..................................................................................................................................6
1.2.1 Search Keyword..............................................................................................................6
1.2.2 Result..............................................................................................................................6
1.3 Round 3................................................................................................................................10
1.3.1 Search Keyword............................................................................................................10
1.3.2 Result............................................................................................................................10
2. Literature Review – Focused Reading.......................................................................................13
2.1 Detail Reading of Article 1..................................................................................................13
2.2 Detail Reading of Article 2..................................................................................................15
2.3 Detail Reading of Article 3..................................................................................................17
2.4 Detail Reading of Article 4..................................................................................................19
3. Proposed Research.....................................................................................................................21
References......................................................................................................................................23
3SECURITY IN MOBILE COMPUTING
1. Literature Review – Broad Scan and Reading
1.1 Round 1
1.1.1 Search Keyword
I was researching over the factors that lead to the security issues in mobile computing.
There were a lot of research that was conducted in choosing the proper keywords and would lead
to the issues that were arising in the field of mobile computing.
Keyword Source/research database Number of results
Mobile security, MDM, Mobile Botnets,
MAM, BYOD
Google Scholar 3,180,000
1.1.2 Result
Title Author Journal/conference Year
BYOD: Current State
and Security
Challenges
Meisam Eslahi,
Maryam Var Naseri,
H. Hashim, N.M.
Tahir, Ezril Hisham
Mat Saad
IEEE Symposium on Computer
Applications and Industrial
Electronics (ISCAIE)
2014, April
Security of self-
organizing networks:
MANET, WSN,
WMN, VANET
Pathan, Al-Sakib
Khan
CRC press 2016
Mobile malware
security challeges and
cloud-based detection
Penning, Nicholas,
Michael Hoffman,
Jason Nikolai, and
Yong Wang
International Conference on
Collaboration Technologies
and Systems (CTS)
2014
Mobile app
recommendations
with security and
privacy awareness
Zhu, Hengshu, Hui
Xiong, Yong Ge, and
Enhong Chen
In Proceedings of the 20th
ACM SIGKDD international
conference on Knowledge
discovery and data mining
2014
Privacy and security
in mobile health
apps: a review and
recommendations
Martínez-Pérez,
Borja, Isabel De La
Torre-Díez, and
Miguel López-
Coronado
Journal of medical systems 2015
1. Literature Review – Broad Scan and Reading
1.1 Round 1
1.1.1 Search Keyword
I was researching over the factors that lead to the security issues in mobile computing.
There were a lot of research that was conducted in choosing the proper keywords and would lead
to the issues that were arising in the field of mobile computing.
Keyword Source/research database Number of results
Mobile security, MDM, Mobile Botnets,
MAM, BYOD
Google Scholar 3,180,000
1.1.2 Result
Title Author Journal/conference Year
BYOD: Current State
and Security
Challenges
Meisam Eslahi,
Maryam Var Naseri,
H. Hashim, N.M.
Tahir, Ezril Hisham
Mat Saad
IEEE Symposium on Computer
Applications and Industrial
Electronics (ISCAIE)
2014, April
Security of self-
organizing networks:
MANET, WSN,
WMN, VANET
Pathan, Al-Sakib
Khan
CRC press 2016
Mobile malware
security challeges and
cloud-based detection
Penning, Nicholas,
Michael Hoffman,
Jason Nikolai, and
Yong Wang
International Conference on
Collaboration Technologies
and Systems (CTS)
2014
Mobile app
recommendations
with security and
privacy awareness
Zhu, Hengshu, Hui
Xiong, Yong Ge, and
Enhong Chen
In Proceedings of the 20th
ACM SIGKDD international
conference on Knowledge
discovery and data mining
2014
Privacy and security
in mobile health
apps: a review and
recommendations
Martínez-Pérez,
Borja, Isabel De La
Torre-Díez, and
Miguel López-
Coronado
Journal of medical systems 2015
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4SECURITY IN MOBILE COMPUTING
Software-defined
mobile networks
security Mobile
Networks and
Applications
Chen, Min, Yongfeng
Qian, Shiwen Mao,
Wan Tang, and
Ximin Yang
Mobile Networks and
Applications
2016
Exploring the far side
of mobile health:
information security
and privacy of mobile
health apps on iOS
and Android
Dehling, Tobias,
Fangjian Gao,
Stephan Schneider,
and Ali Sunyaev
JMIR mHealth and uHealth 2015
Security and privacy
in mobile
crowdsourcing
networks: challenges
and opportunities
Yang, Kan, Kuan
Zhang, Ju Ren, and
Xuemin Shen
IEEE communications
magazine
2015
Security
enhancements for
mobile ad hoc
networks with trust
management using
uncertain reasoning
Wei, Zhexiong,
Helen Tang, F.
Richard Yu, Maoyu
Wang, and Peter
Mason
IEEE Transactions on
Vehicular Technology
2014
Mobile device
security
considerations for
small-and medium-
sized enterprise
business mobility
A. Harris, Mark, and
Karen P. Patten
Information Management &
Computer Security
2014
The untapped
potential of trusted
execution
environments on
mobile devices
Ekberg, Jan-Erik,
Kari Kostiainen, and
N. Asokan
IEEE Security & Privacy 2014
Always connected,
but are smart mobile
users getting more
security savvy? A
survey of smart
mobile device users.
Imgraben, James,
Alewyn Engelbrecht,
and Kim-Kwang
Raymond Choo
Behaviour & Information
Technology
2014
Mobile security Kravets, Alla G., In Joint Conference on 2014
Software-defined
mobile networks
security Mobile
Networks and
Applications
Chen, Min, Yongfeng
Qian, Shiwen Mao,
Wan Tang, and
Ximin Yang
Mobile Networks and
Applications
2016
Exploring the far side
of mobile health:
information security
and privacy of mobile
health apps on iOS
and Android
Dehling, Tobias,
Fangjian Gao,
Stephan Schneider,
and Ali Sunyaev
JMIR mHealth and uHealth 2015
Security and privacy
in mobile
crowdsourcing
networks: challenges
and opportunities
Yang, Kan, Kuan
Zhang, Ju Ren, and
Xuemin Shen
IEEE communications
magazine
2015
Security
enhancements for
mobile ad hoc
networks with trust
management using
uncertain reasoning
Wei, Zhexiong,
Helen Tang, F.
Richard Yu, Maoyu
Wang, and Peter
Mason
IEEE Transactions on
Vehicular Technology
2014
Mobile device
security
considerations for
small-and medium-
sized enterprise
business mobility
A. Harris, Mark, and
Karen P. Patten
Information Management &
Computer Security
2014
The untapped
potential of trusted
execution
environments on
mobile devices
Ekberg, Jan-Erik,
Kari Kostiainen, and
N. Asokan
IEEE Security & Privacy 2014
Always connected,
but are smart mobile
users getting more
security savvy? A
survey of smart
mobile device users.
Imgraben, James,
Alewyn Engelbrecht,
and Kim-Kwang
Raymond Choo
Behaviour & Information
Technology
2014
Mobile security Kravets, Alla G., In Joint Conference on 2014
5SECURITY IN MOBILE COMPUTING
solution for enterprise
network
Ngoc Duong Bui, and
Mohammed Al-
Ashval
Knowledge-Based Software
Engineering
Mobile security
testing approaches
and challenges
Wang, Yong, and
Yazan Alshboul
First Conference on Mobile
and Secure Services
(MOBISECSERV)
2015
Security threats to
mobile multimedia
applications: Camera-
based attacks on
mobile phones.
Wu, Longfei,
Xiaojiang Du, and
Xinwen Fu
IEEE Communications
Magazine
2014
Outsourcing mobile
security in the cloud
Hurel, Gaëtan, Rémi
Badonnel,
Abdelkader Lahmadi,
and Olivier Festor
IFIP International Conference
on Autonomous Infrastructure,
Management and Security
2014
Security and privacy
in mobile social
networks: challenges
and solutions
Liang, Xiaohui, Kuan
Zhang, Xuemin Shen,
and Xiaodong Lin
IEEE Wireless
Communications
2014
A mean field game
theoretic approach for
security
enhancements in
mobile ad hoc
networks
Wang, Yanwei, F.
Richard Yu, Helen
Tang, and Minyi
Huang
IEEE transactions on wireless
communications
2014
Handbook of Mobile
Radio Networks
Tabbane, Sami Artech House Mobile
Communications Library
2014
Security and privacy
challenges in mobile
cloud computing:
Survey and way
ahead
Mollah, Muhammad
Baqer, Md Abul
Kalam Azad, and
Athanasios Vasilakos
Journal of Network and
Computer Applications
2017
Review and Summary – After conducting a review over the search results based on the
keywords, I could find that the mobile devices are not fully protected as compared to the
computer devices and computer networks. In case of mobile based devices, the users pay a little
attention towards the security updates that are provided to an application. During the initial
solution for enterprise
network
Ngoc Duong Bui, and
Mohammed Al-
Ashval
Knowledge-Based Software
Engineering
Mobile security
testing approaches
and challenges
Wang, Yong, and
Yazan Alshboul
First Conference on Mobile
and Secure Services
(MOBISECSERV)
2015
Security threats to
mobile multimedia
applications: Camera-
based attacks on
mobile phones.
Wu, Longfei,
Xiaojiang Du, and
Xinwen Fu
IEEE Communications
Magazine
2014
Outsourcing mobile
security in the cloud
Hurel, Gaëtan, Rémi
Badonnel,
Abdelkader Lahmadi,
and Olivier Festor
IFIP International Conference
on Autonomous Infrastructure,
Management and Security
2014
Security and privacy
in mobile social
networks: challenges
and solutions
Liang, Xiaohui, Kuan
Zhang, Xuemin Shen,
and Xiaodong Lin
IEEE Wireless
Communications
2014
A mean field game
theoretic approach for
security
enhancements in
mobile ad hoc
networks
Wang, Yanwei, F.
Richard Yu, Helen
Tang, and Minyi
Huang
IEEE transactions on wireless
communications
2014
Handbook of Mobile
Radio Networks
Tabbane, Sami Artech House Mobile
Communications Library
2014
Security and privacy
challenges in mobile
cloud computing:
Survey and way
ahead
Mollah, Muhammad
Baqer, Md Abul
Kalam Azad, and
Athanasios Vasilakos
Journal of Network and
Computer Applications
2017
Review and Summary – After conducting a review over the search results based on the
keywords, I could find that the mobile devices are not fully protected as compared to the
computer devices and computer networks. In case of mobile based devices, the users pay a little
attention towards the security updates that are provided to an application. During the initial
6SECURITY IN MOBILE COMPUTING
search over the keywords within the article, it was also found that the security of mobile devices
has become a critical issue in BYOD. In certain cases, employees are more concerned to make
use of their personal devices to access the data and systems within an organisation. Hence, this
article discusses about the critical aspects in relation to security in mobile computing technology.
1.2 Round 2
1.2.1 Search Keyword
Keyword Source/research database Number of results
Privacy, Security, Fog computing,
Mobile cloud computing, Mobile edge
computing.
Google Scholar 1,260,000
1.2.2 Result
Title Author Journal/conference Year
Mobile edge computing, fog
et al.: A survey and analysis
of security threats and
challenges
Roman, Rodrigo, Javier
Lopez, and Masahiro
Mambo
Future Generation
Computer Systems
2018
The fog computing
paradigm: Scenarios and
security issues
Stojmenovic, Ivan, and
Sheng Wen
Federated Conference
on Computer Science
and Information
Systems
2014
Finding your way in the
fog: Towards a
comprehensive definition of
fog computing
Vaquero, Luis M., and Luis
Rodero-Merino
ACM SIGCOMM
Computer
Communication
Review
2014
Fog computing: A platform
for internet of things and
analytics
Bonomi, Flavio, Rodolfo
Milito, Preethi Natarajan,
and Jiang Zhu
In Big data and
internet of things: A
roadmap for smart
environments
2014
Heterogeneity in mobile
cloud computing: taxonomy
and open challenges
Sanaei, Zohreh, Saeid
Abolfazli, Abdullah Gani,
and Rajkumar Buyya
IEEE
Communications
Surveys & Tutorials
2014
Decentralized computation Chen, Xu IEEE Transactions on 2015
search over the keywords within the article, it was also found that the security of mobile devices
has become a critical issue in BYOD. In certain cases, employees are more concerned to make
use of their personal devices to access the data and systems within an organisation. Hence, this
article discusses about the critical aspects in relation to security in mobile computing technology.
1.2 Round 2
1.2.1 Search Keyword
Keyword Source/research database Number of results
Privacy, Security, Fog computing,
Mobile cloud computing, Mobile edge
computing.
Google Scholar 1,260,000
1.2.2 Result
Title Author Journal/conference Year
Mobile edge computing, fog
et al.: A survey and analysis
of security threats and
challenges
Roman, Rodrigo, Javier
Lopez, and Masahiro
Mambo
Future Generation
Computer Systems
2018
The fog computing
paradigm: Scenarios and
security issues
Stojmenovic, Ivan, and
Sheng Wen
Federated Conference
on Computer Science
and Information
Systems
2014
Finding your way in the
fog: Towards a
comprehensive definition of
fog computing
Vaquero, Luis M., and Luis
Rodero-Merino
ACM SIGCOMM
Computer
Communication
Review
2014
Fog computing: A platform
for internet of things and
analytics
Bonomi, Flavio, Rodolfo
Milito, Preethi Natarajan,
and Jiang Zhu
In Big data and
internet of things: A
roadmap for smart
environments
2014
Heterogeneity in mobile
cloud computing: taxonomy
and open challenges
Sanaei, Zohreh, Saeid
Abolfazli, Abdullah Gani,
and Rajkumar Buyya
IEEE
Communications
Surveys & Tutorials
2014
Decentralized computation Chen, Xu IEEE Transactions on 2015
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7SECURITY IN MOBILE COMPUTING
offloading game for mobile
cloud computing
Parallel and
Distributed Systems
Communicating while
computing: Distributed
mobile cloud computing
over 5G heterogeneous
networks
Barbarossa, Sergio, Stefania
Sardellitti, and Paolo Di
Lorenzo
IEEE Signal
Processing Magazine
2014
EMC: Emotion-aware
mobile cloud computing in
5G
Chen, Min, Yin Zhang,
Yong Li, Shiwen Mao, and
Victor CM Leung
IEEE Network 2015
User profiling for energy
optimisation in mobile
cloud computing
Benkhelifa, Elhadj, Thomas
Welsh, Loai Tawalbeh,
Yaser Jararweh, and Anas
Basalamah
Procedia Computer
Science
2015
VCMIA: A novel
architecture for integrating
vehicular cyber-physical
systems and mobile cloud
computing
Wan, Jiafu, Daqiang Zhang,
Yantao Sun, Kai Lin,
Caifeng Zou, and Hu Cai
VCMIA: A novel
architecture for
integrating vehicular
cyber-physical
systems and mobile
cloud computing
2014
Computation offloading for
service workflow in mobile
cloud computing
Deng, Shuiguang, Longtao
Huang, Javid Taheri, and
Albert Y. Zomaya
IEEE Transactions on
Parallel and
Distributed Systems
2015
Accelerating mobile-cloud
computing: A survey
Soyata, Tolga, He Ba,
Wendi Heinzelman,
Minseok Kwon, and Jiye
Shi
Cloud Technology:
Concepts,
Methodologies, Tools,
and Applications
2015
Device-to-device-based
heterogeneous radio access
network architecture for
mobile cloud computing
Jo, Minho, Taras
Maksymyuk, Bohdan
Strykhalyuk, and Choong-
Ho Cho
IEEE Wireless
Communications
2015
Intrusion detection
techniques for mobile cloud
computing in heterogeneous
5G
Gai, Keke, Meikang Qiu,
Lixin Tao, and Yongxin
Zhu
Security and
Communication
Networks
2016
The future of mobile cloud
computing: integrating
cloudlets and mobile edge
computing
Jararweh, Yaser, Ahmad
Doulat, Omar AlQudah,
Ejaz Ahmed, Mahmoud Al-
Ayyoub, and Elhadj
Benkhelifa
23rd International
conference on
telecommunications
(ICT)
2016
offloading game for mobile
cloud computing
Parallel and
Distributed Systems
Communicating while
computing: Distributed
mobile cloud computing
over 5G heterogeneous
networks
Barbarossa, Sergio, Stefania
Sardellitti, and Paolo Di
Lorenzo
IEEE Signal
Processing Magazine
2014
EMC: Emotion-aware
mobile cloud computing in
5G
Chen, Min, Yin Zhang,
Yong Li, Shiwen Mao, and
Victor CM Leung
IEEE Network 2015
User profiling for energy
optimisation in mobile
cloud computing
Benkhelifa, Elhadj, Thomas
Welsh, Loai Tawalbeh,
Yaser Jararweh, and Anas
Basalamah
Procedia Computer
Science
2015
VCMIA: A novel
architecture for integrating
vehicular cyber-physical
systems and mobile cloud
computing
Wan, Jiafu, Daqiang Zhang,
Yantao Sun, Kai Lin,
Caifeng Zou, and Hu Cai
VCMIA: A novel
architecture for
integrating vehicular
cyber-physical
systems and mobile
cloud computing
2014
Computation offloading for
service workflow in mobile
cloud computing
Deng, Shuiguang, Longtao
Huang, Javid Taheri, and
Albert Y. Zomaya
IEEE Transactions on
Parallel and
Distributed Systems
2015
Accelerating mobile-cloud
computing: A survey
Soyata, Tolga, He Ba,
Wendi Heinzelman,
Minseok Kwon, and Jiye
Shi
Cloud Technology:
Concepts,
Methodologies, Tools,
and Applications
2015
Device-to-device-based
heterogeneous radio access
network architecture for
mobile cloud computing
Jo, Minho, Taras
Maksymyuk, Bohdan
Strykhalyuk, and Choong-
Ho Cho
IEEE Wireless
Communications
2015
Intrusion detection
techniques for mobile cloud
computing in heterogeneous
5G
Gai, Keke, Meikang Qiu,
Lixin Tao, and Yongxin
Zhu
Security and
Communication
Networks
2016
The future of mobile cloud
computing: integrating
cloudlets and mobile edge
computing
Jararweh, Yaser, Ahmad
Doulat, Omar AlQudah,
Ejaz Ahmed, Mahmoud Al-
Ayyoub, and Elhadj
Benkhelifa
23rd International
conference on
telecommunications
(ICT)
2016
8SECURITY IN MOBILE COMPUTING
A context sensitive
offloading scheme for
mobile cloud computing
service
Zhou, Bowen, Amir Vahid
Dastjerdi, Rodrigo N.
Calheiros, Satish Narayana
Srirama, and Rajkumar
Buyya
IEEE 8th
International
Conference on Cloud
Computing
2015
Application optimization in
mobile cloud computing:
Motivation, taxonomies,
and open challenges
Ahmed, Ejaz, Abdullah
Gani, Mehdi Sookhak, Siti
Hafizah Ab Hamid, and
Feng Xia
Journal of Network
and Computer
Applications
2015
A game-theoretic approach
to computation offloading
in mobile cloud computing
Cardellini, Valeria, Vittoria
De Nitto Personé, Valerio
Di Valerio, Francisco
Facchinei, Vincenzo Grassi,
Francesco Lo Presti, and
Veronica Piccialli
Mathematical
Programming
2016
Application partitioning
algorithms in mobile cloud
computing: Taxonomy,
review and future directions
Liu, Jieyao, Ejaz Ahmed,
Muhammad Shiraz,
Abdullah Gani, Rajkumar
Buyya, and Ahsan Qureshi
Journal of Network
and Computer
Applications
2015
A privacy-aware
authentication scheme for
distributed mobile cloud
computing services
Tsai, Jia-Lun, and Nai-Wei
Lo
IEEE systems journal 2015
Mobile cloud computing
model and big data analysis
for healthcare applications
Lo’ai, A. Tawalbeh, Rashid
Mehmood, Elhadj
Benkhlifa, and Houbing
Song
IEEE Access 2016
Authentication in mobile
cloud computing: A survey
Alizadeh, Mojtaba, Saeid
Abolfazli, Mazdak Zamani,
Sabariah Baharun, and
Kouichi Sakurai
Journal of Network
and Computer
Applications
2016
Mobile edge computing:
Progress and challenges
Li, Hongxing, Guochu
Shou, Yihong Hu, and
Zhigang Guo
IEEE international
conference on mobile
cloud computing,
services, and
engineering
(MobileCloud)
2016
The promise of edge
computing
Shi, Weisong, and
Schahram Dustdar
Computer 2016
A context sensitive
offloading scheme for
mobile cloud computing
service
Zhou, Bowen, Amir Vahid
Dastjerdi, Rodrigo N.
Calheiros, Satish Narayana
Srirama, and Rajkumar
Buyya
IEEE 8th
International
Conference on Cloud
Computing
2015
Application optimization in
mobile cloud computing:
Motivation, taxonomies,
and open challenges
Ahmed, Ejaz, Abdullah
Gani, Mehdi Sookhak, Siti
Hafizah Ab Hamid, and
Feng Xia
Journal of Network
and Computer
Applications
2015
A game-theoretic approach
to computation offloading
in mobile cloud computing
Cardellini, Valeria, Vittoria
De Nitto Personé, Valerio
Di Valerio, Francisco
Facchinei, Vincenzo Grassi,
Francesco Lo Presti, and
Veronica Piccialli
Mathematical
Programming
2016
Application partitioning
algorithms in mobile cloud
computing: Taxonomy,
review and future directions
Liu, Jieyao, Ejaz Ahmed,
Muhammad Shiraz,
Abdullah Gani, Rajkumar
Buyya, and Ahsan Qureshi
Journal of Network
and Computer
Applications
2015
A privacy-aware
authentication scheme for
distributed mobile cloud
computing services
Tsai, Jia-Lun, and Nai-Wei
Lo
IEEE systems journal 2015
Mobile cloud computing
model and big data analysis
for healthcare applications
Lo’ai, A. Tawalbeh, Rashid
Mehmood, Elhadj
Benkhlifa, and Houbing
Song
IEEE Access 2016
Authentication in mobile
cloud computing: A survey
Alizadeh, Mojtaba, Saeid
Abolfazli, Mazdak Zamani,
Sabariah Baharun, and
Kouichi Sakurai
Journal of Network
and Computer
Applications
2016
Mobile edge computing:
Progress and challenges
Li, Hongxing, Guochu
Shou, Yihong Hu, and
Zhigang Guo
IEEE international
conference on mobile
cloud computing,
services, and
engineering
(MobileCloud)
2016
The promise of edge
computing
Shi, Weisong, and
Schahram Dustdar
Computer 2016
9SECURITY IN MOBILE COMPUTING
A cooperative scheduling
scheme of local cloud and
internet cloud for delay-
aware mobile cloud
computing
Zhao, Tianchu, Sheng Zhou,
Xueying Guo, Yun Zhao,
and Zhisheng Niu
IEEE Globecom
Workshops (GC
Wkshps)
2015
Review and Summary – Based on the search of the initial search results over the article,
I have been able to discuss and understand about the certain requirements that would be
extremely crucial for developing several applications. It has been seen that in the recent years, a
vast number of technologies such as fog computing, mobile cloud computing, mobile edge
computing have evolved. Based on the review over the article, I have been also able to
understand about analysing security challenges, threats and other mechanisms that would be
inherent in various edge paradigms.
A cooperative scheduling
scheme of local cloud and
internet cloud for delay-
aware mobile cloud
computing
Zhao, Tianchu, Sheng Zhou,
Xueying Guo, Yun Zhao,
and Zhisheng Niu
IEEE Globecom
Workshops (GC
Wkshps)
2015
Review and Summary – Based on the search of the initial search results over the article,
I have been able to discuss and understand about the certain requirements that would be
extremely crucial for developing several applications. It has been seen that in the recent years, a
vast number of technologies such as fog computing, mobile cloud computing, mobile edge
computing have evolved. Based on the review over the article, I have been also able to
understand about analysing security challenges, threats and other mechanisms that would be
inherent in various edge paradigms.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10SECURITY IN MOBILE COMPUTING
1.3 Round 3
1.3.1 Search Keyword
Keyword Source/research database Number of results
Multi-tenancy, web services,
Virtualization, Security, Cloud
computing
Google Scholar 23,000
1.3.2 Result
Title Author Journal/conference Year
Security in cloud
computing:
Opportunities and
challenges
Ali, Mazhar, Samee U.
Khan, and Athanasios V.
Vasilakos
Information sciences 2015
Multi‐tenancy
authorization models for
collaborative cloud
services
Tang, Bo, Ravi Sandhu, and
Qi Li
Concurrency and
Computation:
Practice and
Experience
2015
Multi-tenancy in cloud
computing
AlJahdali, Hussain,
Abdulaziz Albatli, Peter
Garraghan, Paul Townend,
Lydia Lau, and Jie Xu
IEEE 8th
International
Symposium on
Service Oriented
System Engineering
2014
Defining multi-tenancy:
A systematic mapping
study on the academic
and the industrial
perspective
Kabbedijk, Jaap, Cor-Paul
Bezemer, Slinger Jansen, and
Andy Zaidman
Journal of Systems
and Software
2015
Resource management
for bursty streams on
multi-tenancy cloud
environments
Tolosana-Calasanz, Rafael,
José Ángel Bañares,
Congduc Pham, and Omer F.
Rana
Future Generation
Computer Systems
2016
Network function
virtualization:
Challenges and
opportunities for
innovations
Han, Bo, Vijay
Gopalakrishnan, Lusheng Ji,
and Seungjoon Lee
IEEE
Communications
Magazine
2015
1.3 Round 3
1.3.1 Search Keyword
Keyword Source/research database Number of results
Multi-tenancy, web services,
Virtualization, Security, Cloud
computing
Google Scholar 23,000
1.3.2 Result
Title Author Journal/conference Year
Security in cloud
computing:
Opportunities and
challenges
Ali, Mazhar, Samee U.
Khan, and Athanasios V.
Vasilakos
Information sciences 2015
Multi‐tenancy
authorization models for
collaborative cloud
services
Tang, Bo, Ravi Sandhu, and
Qi Li
Concurrency and
Computation:
Practice and
Experience
2015
Multi-tenancy in cloud
computing
AlJahdali, Hussain,
Abdulaziz Albatli, Peter
Garraghan, Paul Townend,
Lydia Lau, and Jie Xu
IEEE 8th
International
Symposium on
Service Oriented
System Engineering
2014
Defining multi-tenancy:
A systematic mapping
study on the academic
and the industrial
perspective
Kabbedijk, Jaap, Cor-Paul
Bezemer, Slinger Jansen, and
Andy Zaidman
Journal of Systems
and Software
2015
Resource management
for bursty streams on
multi-tenancy cloud
environments
Tolosana-Calasanz, Rafael,
José Ángel Bañares,
Congduc Pham, and Omer F.
Rana
Future Generation
Computer Systems
2016
Network function
virtualization:
Challenges and
opportunities for
innovations
Han, Bo, Vijay
Gopalakrishnan, Lusheng Ji,
and Seungjoon Lee
IEEE
Communications
Magazine
2015
11SECURITY IN MOBILE COMPUTING
ClickOS and the art of
network function
virtualization
Martins, Joao, Mohamed
Ahmed, Costin Raiciu,
Vladimir Olteanu, Michio
Honda, Roberto Bifulco, and
Felipe Huici
{USENIX}
Symposium on
Networked Systems
Design and
Implementation
({NSDI}
2014
Network virtualization
in multi-tenant
datacenters
Koponen, Teemu, Keith
Amidon, Peter Balland,
Martín Casado, Anupam
Chanda, Bryan Fulton, Igor
Ganichev et al.
{USENIX}
Symposium on
Networked Systems
Design and
Implementation
({NSDI}
2014
Hypervisors vs.
lightweight
virtualization: a
performance
comparison
Morabito, Roberto, Jimmy
Kjällman, and Miika Komu
International
Conference on Cloud
Engineering
2015
A survey of mobile
cloud computing
application models
Othman, Mazliza, Sajjad
Ahmad Madani, and Samee
Ullah Khan
IEEE
Communications
Surveys & Tutorials
2014
A hierarchical edge
cloud architecture for
mobile computing
Tong, Liang, Yong Li, and
Wei Gao
The 35th Annual
IEEE International
Conference on
Computer
Communications
2016
Dynamic energy-aware
cloudlet-based mobile
cloud computing model
for green computing
Gai, Keke, Meikang Qiu,
Hui Zhao, Lixin Tao, and
Ziliang Zong
Journal of Network
and Computer
Applications
2016
An experimental
analysis on cloud-based
mobile augmentation in
mobile cloud computing
Abolfazli, Saeid, Zohreh
Sanaei, Mojtaba Alizadeh,
Abdullah Gani, and Feng Xia
IEEE Transactions
on Consumer
Electronics
2014
Fog computing:
Focusing on mobile
users at the edge
Luan, Tom H., Longxiang
Gao, Zhi Li, Yang Xiang,
Guiyi Wei, and Limin Sun
arXiv preprint arXiv 2015
User profiling for
energy optimisation in
mobile cloud computing
Benkhelifa, Elhadj, Thomas
Welsh, Loai Tawalbeh,
Yaser Jararweh, and Anas
Basalamah
Procedia Computer
Science
2015
ClickOS and the art of
network function
virtualization
Martins, Joao, Mohamed
Ahmed, Costin Raiciu,
Vladimir Olteanu, Michio
Honda, Roberto Bifulco, and
Felipe Huici
{USENIX}
Symposium on
Networked Systems
Design and
Implementation
({NSDI}
2014
Network virtualization
in multi-tenant
datacenters
Koponen, Teemu, Keith
Amidon, Peter Balland,
Martín Casado, Anupam
Chanda, Bryan Fulton, Igor
Ganichev et al.
{USENIX}
Symposium on
Networked Systems
Design and
Implementation
({NSDI}
2014
Hypervisors vs.
lightweight
virtualization: a
performance
comparison
Morabito, Roberto, Jimmy
Kjällman, and Miika Komu
International
Conference on Cloud
Engineering
2015
A survey of mobile
cloud computing
application models
Othman, Mazliza, Sajjad
Ahmad Madani, and Samee
Ullah Khan
IEEE
Communications
Surveys & Tutorials
2014
A hierarchical edge
cloud architecture for
mobile computing
Tong, Liang, Yong Li, and
Wei Gao
The 35th Annual
IEEE International
Conference on
Computer
Communications
2016
Dynamic energy-aware
cloudlet-based mobile
cloud computing model
for green computing
Gai, Keke, Meikang Qiu,
Hui Zhao, Lixin Tao, and
Ziliang Zong
Journal of Network
and Computer
Applications
2016
An experimental
analysis on cloud-based
mobile augmentation in
mobile cloud computing
Abolfazli, Saeid, Zohreh
Sanaei, Mojtaba Alizadeh,
Abdullah Gani, and Feng Xia
IEEE Transactions
on Consumer
Electronics
2014
Fog computing:
Focusing on mobile
users at the edge
Luan, Tom H., Longxiang
Gao, Zhi Li, Yang Xiang,
Guiyi Wei, and Limin Sun
arXiv preprint arXiv 2015
User profiling for
energy optimisation in
mobile cloud computing
Benkhelifa, Elhadj, Thomas
Welsh, Loai Tawalbeh,
Yaser Jararweh, and Anas
Basalamah
Procedia Computer
Science
2015
12SECURITY IN MOBILE COMPUTING
Device-to-device-based
heterogeneous radio
access network
architecture for mobile
cloud computing
Jo, Minho, Taras
Maksymyuk, Bohdan
Strykhalyuk, and Choong-Ho
Cho
IEEE Wireless
Communications
2015
Computation offloading
for service workflow in
mobile cloud computing
Deng, Shuiguang, Longtao
Huang, Javid Taheri, and
Albert Y. Zomaya
IEEE Transactions
on Parallel and
Distributed Systems
2015
Energy efficient mobile
cloud computing
powered by wireless
energy transfer
You, Changsheng, Kaibin
Huang, and Hyukjin Chae
IEEE Journal on
Selected Areas in
Communications
2016
Scalable cloudlet-based
mobile computing
model
Jararweh, Yaser, Fadi
Ababneh, Abdallah
Khreishah, and Fahd Dosari
Procedia Computer
Science
2014
Mobile edge computing:
A taxonomy
Beck, Michael Till, Martin
Werner, Sebastian Feld, and
S. Schimper
In Proc. of the Sixth
International
Conference on
Advances in Future
Internet
2014
Review and Summary – The research over the article focuses over the topic of cloud
computing that helps in providing a cost-effective, elastic and easy manageable platform. With
the effective form of cloud computing technologies, it would upsurge the capabilities of the
hardware based resources based on shared and optimal utilization. I have also gained knowledge
over the security issues that would arise within the nature of mobile and cloud computing. Based
on this research, the various vulnerabilities would be presented, that would be needed to be
addressed. The discussion further ends with the discussion based on the issues that are not being
addressed.
Device-to-device-based
heterogeneous radio
access network
architecture for mobile
cloud computing
Jo, Minho, Taras
Maksymyuk, Bohdan
Strykhalyuk, and Choong-Ho
Cho
IEEE Wireless
Communications
2015
Computation offloading
for service workflow in
mobile cloud computing
Deng, Shuiguang, Longtao
Huang, Javid Taheri, and
Albert Y. Zomaya
IEEE Transactions
on Parallel and
Distributed Systems
2015
Energy efficient mobile
cloud computing
powered by wireless
energy transfer
You, Changsheng, Kaibin
Huang, and Hyukjin Chae
IEEE Journal on
Selected Areas in
Communications
2016
Scalable cloudlet-based
mobile computing
model
Jararweh, Yaser, Fadi
Ababneh, Abdallah
Khreishah, and Fahd Dosari
Procedia Computer
Science
2014
Mobile edge computing:
A taxonomy
Beck, Michael Till, Martin
Werner, Sebastian Feld, and
S. Schimper
In Proc. of the Sixth
International
Conference on
Advances in Future
Internet
2014
Review and Summary – The research over the article focuses over the topic of cloud
computing that helps in providing a cost-effective, elastic and easy manageable platform. With
the effective form of cloud computing technologies, it would upsurge the capabilities of the
hardware based resources based on shared and optimal utilization. I have also gained knowledge
over the security issues that would arise within the nature of mobile and cloud computing. Based
on this research, the various vulnerabilities would be presented, that would be needed to be
addressed. The discussion further ends with the discussion based on the issues that are not being
addressed.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13SECURITY IN MOBILE COMPUTING
2. Literature Review – Focused Reading
2.1 Detail Reading of Article 1
Title Author Journal/
conference
Year Abstract
On the security
of a privacy-
aware
authentication
scheme for
distributed
mobile cloud
computing
services
Jiang, Qi,
Jianfeng Ma,
and Fushan Wei
IEEE systems
journal
2018 In this article, the authors have discussed about the security and privacy
issues in relation to the services offered by mobile cloud computing.
Based on the research over the paper, it could be claimed that the
privacy aware authentication scheme would help the mobile based
services to achieve the standards of mutual authentication. The authors
have focused over the mobile computing paradigm that could be
integrated with cloud computing standards within the mobile
environment. This technology has been believed to have implanted new
kind of services and facilities for the various mobile users. Based on
the discussion over the article, the different issues that could be
underlined within the topic of wireless networks and mobile cloud
computing are interception, forgery, denial of service attacks. The
authors have thus discussed that a mutual authentication between the
cloud service provider and the user would be able to prevent different
forms of illegal access to the networks. This could be achieved by
defending the potential attacks over the secured networks.
The paper has also discussed bout the major security threats that could
overcome the mobile devices. One such problem that has been
discussed is the issue based on the case of wrong fingerprints, misuse
of biometric, user revocation facility and incorrect passwords. The
authors have detailed out the entire calculation flowchart that depicts
the attack over server impersonation. However, the authors have also
focused on the use of countermeasures such as bio-cryptosystem such
2. Literature Review – Focused Reading
2.1 Detail Reading of Article 1
Title Author Journal/
conference
Year Abstract
On the security
of a privacy-
aware
authentication
scheme for
distributed
mobile cloud
computing
services
Jiang, Qi,
Jianfeng Ma,
and Fushan Wei
IEEE systems
journal
2018 In this article, the authors have discussed about the security and privacy
issues in relation to the services offered by mobile cloud computing.
Based on the research over the paper, it could be claimed that the
privacy aware authentication scheme would help the mobile based
services to achieve the standards of mutual authentication. The authors
have focused over the mobile computing paradigm that could be
integrated with cloud computing standards within the mobile
environment. This technology has been believed to have implanted new
kind of services and facilities for the various mobile users. Based on
the discussion over the article, the different issues that could be
underlined within the topic of wireless networks and mobile cloud
computing are interception, forgery, denial of service attacks. The
authors have thus discussed that a mutual authentication between the
cloud service provider and the user would be able to prevent different
forms of illegal access to the networks. This could be achieved by
defending the potential attacks over the secured networks.
The paper has also discussed bout the major security threats that could
overcome the mobile devices. One such problem that has been
discussed is the issue based on the case of wrong fingerprints, misuse
of biometric, user revocation facility and incorrect passwords. The
authors have detailed out the entire calculation flowchart that depicts
the attack over server impersonation. However, the authors have also
focused on the use of countermeasures such as bio-cryptosystem such
14SECURITY IN MOBILE COMPUTING
as a fuzzy vault or fuzzy extractor based on the generation of a
biometric key. Other forms of authentication tests could also be
employed in order to remove and mitigate the errors. In order to
facilitate revocation, the SCG should also maintain the identity of the
information within their database that would be based on the use of
invalid smart card.
Based on the observations from the report, it could be analysed that an
efficient form of secure and efficient authentication scheme based on
mobile computing services could be used for the protection of the
services. The design of the technologies should be such that users
would be able to make use of such kind of technologies without the
fear of threats on their system.
as a fuzzy vault or fuzzy extractor based on the generation of a
biometric key. Other forms of authentication tests could also be
employed in order to remove and mitigate the errors. In order to
facilitate revocation, the SCG should also maintain the identity of the
information within their database that would be based on the use of
invalid smart card.
Based on the observations from the report, it could be analysed that an
efficient form of secure and efficient authentication scheme based on
mobile computing services could be used for the protection of the
services. The design of the technologies should be such that users
would be able to make use of such kind of technologies without the
fear of threats on their system.
15SECURITY IN MOBILE COMPUTING
2.2 Detail Reading of Article 2
Title Author Journal/
Conference
Year Abstract
Security and
privacy in
mobile
crowdsourcing
networks:
challenges and
opportunities
Yang, Kan,
Kuan Zhang, Ju
Ren, and
Xuemin Shen
IEEE
communications
magazine
2015 In this article, the authors have discussed about the use of mobile
crowdsourcing network (MCN), which can be defined as a network
architecture. This kind of architecture would be applying the
principles of crowdsourcing for performing several tasks based on
the involvement of mobile devices and humans. In the recent times,
there have been several forms of advances in the field of mobile
computing technologies and related software. Most of the mobile
devices are mostly equipped with fast modules of wireless
communication, larger memories, efficient and powerful processors
and many others. With the proliferation of such efficient and high-
end technologies, there has been a growth over the market of such
kind of useful components and mobile devices.
The authors have also discusses about the vast form of use of many
important components within a smartphone. These smartphones are
collectively formed of various important components such as GPS
technology, acoustic data, and contextual information. These
smartphones can also deliver data with the help of cellular networks
such as Bluetooth, NFC, Wi-Fi and many others. The research in
this article have focused about the challenges based on security and
privacy that have been based on MCNs. The different type of threats
that mainly occur within the mobile computing networks are threats
based on privacy, reliability and availability. Thus, the authors have
focused over the several opportunities that could be used for
protecting the systems based on security and privacy.
However, with the usage of such kind of devices there have been
2.2 Detail Reading of Article 2
Title Author Journal/
Conference
Year Abstract
Security and
privacy in
mobile
crowdsourcing
networks:
challenges and
opportunities
Yang, Kan,
Kuan Zhang, Ju
Ren, and
Xuemin Shen
IEEE
communications
magazine
2015 In this article, the authors have discussed about the use of mobile
crowdsourcing network (MCN), which can be defined as a network
architecture. This kind of architecture would be applying the
principles of crowdsourcing for performing several tasks based on
the involvement of mobile devices and humans. In the recent times,
there have been several forms of advances in the field of mobile
computing technologies and related software. Most of the mobile
devices are mostly equipped with fast modules of wireless
communication, larger memories, efficient and powerful processors
and many others. With the proliferation of such efficient and high-
end technologies, there has been a growth over the market of such
kind of useful components and mobile devices.
The authors have also discusses about the vast form of use of many
important components within a smartphone. These smartphones are
collectively formed of various important components such as GPS
technology, acoustic data, and contextual information. These
smartphones can also deliver data with the help of cellular networks
such as Bluetooth, NFC, Wi-Fi and many others. The research in
this article have focused about the challenges based on security and
privacy that have been based on MCNs. The different type of threats
that mainly occur within the mobile computing networks are threats
based on privacy, reliability and availability. Thus, the authors have
focused over the several opportunities that could be used for
protecting the systems based on security and privacy.
However, with the usage of such kind of devices there have been
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
16SECURITY IN MOBILE COMPUTING
also a rise in the number of challenges posed by privacy and security
issues that have mostly impeded the applications supported by
MCNs. The authors have thus described a general architecture based
on a mobile crowdsourcing network. This kind of architectural
network would mainly comprise of crowdsourcing computing and
crowdsourcing sensing. After a brief discussion over the computing
architecture, the authors have discussed about the various forms of
challenges faced by the aspects of privacy and security. Based on the
discussion over the problems, the authors have further investigated
about the different forms of solutions based on privacy that mainly
capture the issues over mobile crowdsourcing networks.
also a rise in the number of challenges posed by privacy and security
issues that have mostly impeded the applications supported by
MCNs. The authors have thus described a general architecture based
on a mobile crowdsourcing network. This kind of architectural
network would mainly comprise of crowdsourcing computing and
crowdsourcing sensing. After a brief discussion over the computing
architecture, the authors have discussed about the various forms of
challenges faced by the aspects of privacy and security. Based on the
discussion over the problems, the authors have further investigated
about the different forms of solutions based on privacy that mainly
capture the issues over mobile crowdsourcing networks.
17SECURITY IN MOBILE COMPUTING
2.3 Detail Reading of Article 3
Title Author Journal/conference Year Abstract
Security and
privacy
challenges in
mobile cloud
computing:
Survey and way
ahead
Mollah,
Muhammad
Baqer, Md Abul
Kalam Azad
and Athanasios
Vasilakos
Journal of Network
and Computer
Applications
2017 The main topic of discussion in this article is based on the different kind
of privacy and security challenges that are posed within the mobile
computing technologies. In the recent years, technology has played a
major factor and thus have helped the mobile computing platform to
implement such kind of services. In this article, the authors have
discussed about the rapid growth of the business of mobile computing,
which has become an important solution in the world of Information and
Communication Technology (ICT). Due to a constantly improvement in
the form of friendly software and hardware within the mobile devices,
there has been a high growth in the number of mobile users. In the
present times, the smartphones are vastly used by people to serve a
variety of purposes such as internet browsing, chatting, and email. It can
also be used for running a vast number of applications, sharing of files,
entertainment and also performing review and editing over documents.
This article also produces a report based on the ABI research report about
the increasing form of popularity of mobile consumers. It was thus
forecasted that there would be a proliferation in the number of mobile
consumers from the year 2015 and who would make use of cloud
services. The use of such kind of services would help the organisation in
earning more than $5.2 billion as an annual revenue. The authors have
also underlined the fact that these kind of mobile based services would
help in the storage of data over the cloud based environment. The article
also introduces some of the privacy and security challenges that should
be needed to be focused in order to manage the various forms of
communication over the wireless medium. The conducted survey within
the article discusses about the challenges within the security and privacy
2.3 Detail Reading of Article 3
Title Author Journal/conference Year Abstract
Security and
privacy
challenges in
mobile cloud
computing:
Survey and way
ahead
Mollah,
Muhammad
Baqer, Md Abul
Kalam Azad
and Athanasios
Vasilakos
Journal of Network
and Computer
Applications
2017 The main topic of discussion in this article is based on the different kind
of privacy and security challenges that are posed within the mobile
computing technologies. In the recent years, technology has played a
major factor and thus have helped the mobile computing platform to
implement such kind of services. In this article, the authors have
discussed about the rapid growth of the business of mobile computing,
which has become an important solution in the world of Information and
Communication Technology (ICT). Due to a constantly improvement in
the form of friendly software and hardware within the mobile devices,
there has been a high growth in the number of mobile users. In the
present times, the smartphones are vastly used by people to serve a
variety of purposes such as internet browsing, chatting, and email. It can
also be used for running a vast number of applications, sharing of files,
entertainment and also performing review and editing over documents.
This article also produces a report based on the ABI research report about
the increasing form of popularity of mobile consumers. It was thus
forecasted that there would be a proliferation in the number of mobile
consumers from the year 2015 and who would make use of cloud
services. The use of such kind of services would help the organisation in
earning more than $5.2 billion as an annual revenue. The authors have
also underlined the fact that these kind of mobile based services would
help in the storage of data over the cloud based environment. The article
also introduces some of the privacy and security challenges that should
be needed to be focused in order to manage the various forms of
communication over the wireless medium. The conducted survey within
the article discusses about the challenges within the security and privacy
18SECURITY IN MOBILE COMPUTING
in the field of cloud computing. This kind of topic has been the major
focus of research within the academic community. The works discussed
within the article focuses over the security and privacy requirements that
should be addressed in order to focus over the open issues.
in the field of cloud computing. This kind of topic has been the major
focus of research within the academic community. The works discussed
within the article focuses over the security and privacy requirements that
should be addressed in order to focus over the open issues.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
19SECURITY IN MOBILE COMPUTING
2.4 Detail Reading of Article 4
Title Author Journal/conference Year Abstract
Cloud
computing
security: A
survey
Khalil, Issa,
Abdallah
Khreishah, and
Muhammad
Azeem
Computers 2014 In this article, based over the topic of cloud computing and mobile
computing security, it has been discussed that both of these technologies
can be defined as an emerging technological platform. These
technologies would bring about a wide range of concepts and different
forms of utility solutions similar to water systems and electricity. The
cloud and mobile computing technologies would also be able to bring
about a varied range of benefits such as economic savings, flexibility in
services and other forms of configurable computing resources.
The authors have also discussed about the new forms of concepts that are
introduced by the cloud computing technologies such as resource
sharing, outsourcing and multi-tenancy. With the introduction of such
kind of technologies, there have been an increase in the number of
challenges that have been brought to the community in relation to
security aspects. In order to address each of the faced challenges, the
authors have defined the use of various protocols for meeting with the
expectations of the customers and their daily needs. The authors have
thus identified about the various kind of vulnerabilities that could be
identified within the systems.
Based on the detected attacks over the systems, the authors have also
discussed about the ways in which the security administrators could
make use of such kind of important technologies in order to limit the
implication of such kind of attacks. In this article, the authors have
discussed about the ways in which certain security solutions could be
recommended that would be able to provide various kind of security
perspectives. The authors have also discussed about the cloud security
2.4 Detail Reading of Article 4
Title Author Journal/conference Year Abstract
Cloud
computing
security: A
survey
Khalil, Issa,
Abdallah
Khreishah, and
Muhammad
Azeem
Computers 2014 In this article, based over the topic of cloud computing and mobile
computing security, it has been discussed that both of these technologies
can be defined as an emerging technological platform. These
technologies would bring about a wide range of concepts and different
forms of utility solutions similar to water systems and electricity. The
cloud and mobile computing technologies would also be able to bring
about a varied range of benefits such as economic savings, flexibility in
services and other forms of configurable computing resources.
The authors have also discussed about the new forms of concepts that are
introduced by the cloud computing technologies such as resource
sharing, outsourcing and multi-tenancy. With the introduction of such
kind of technologies, there have been an increase in the number of
challenges that have been brought to the community in relation to
security aspects. In order to address each of the faced challenges, the
authors have defined the use of various protocols for meeting with the
expectations of the customers and their daily needs. The authors have
thus identified about the various kind of vulnerabilities that could be
identified within the systems.
Based on the detected attacks over the systems, the authors have also
discussed about the ways in which the security administrators could
make use of such kind of important technologies in order to limit the
implication of such kind of attacks. In this article, the authors have
discussed about the ways in which certain security solutions could be
recommended that would be able to provide various kind of security
perspectives. The authors have also discussed about the cloud security
20SECURITY IN MOBILE COMPUTING
framework in which the various lines of defense and dependency levels
would be developed. In this article, 28 cloud security threats have been
categorised. Hence, the article proposes the nine different forms of
general cloud based attacks and also recommends strategies for
mitigating them. An effective analysis of the various proposed
countermeasures have also been discussed within the article.
framework in which the various lines of defense and dependency levels
would be developed. In this article, 28 cloud security threats have been
categorised. Hence, the article proposes the nine different forms of
general cloud based attacks and also recommends strategies for
mitigating them. An effective analysis of the various proposed
countermeasures have also been discussed within the article.
21SECURITY IN MOBILE COMPUTING
3. Proposed Research
The proposed research discusses about the various aspects of mobile computing. This
form of computing has gained a huge upliftment in the recent times. The proposed research
focuses over the works of other authors and their views in relation to the topic. Mobile
computing is related to the use of mobile devices that are used in the recent times. There have
been a rise in the number of technologies such as GSM, Bluetooth, GPS, Wi-Fi and many others
that have been discussed within the report.
The primary aim in this research is based on the discussion about mobile computing and
the related technologies that are associated with them. The proposed area of research thus puts
emphasis over the various kind of supported technologies and software systems that are
associated with the use of mobile computing technologies. These kind of innovative technologies
have been majorly been helpful for helping the authors to put their own thoughts and views over
the topic. The approach of methodology that has been used in the area of research is based on
various forms of surveys and the works of other authors in relation to the topic.
Based on the discussion over the topic, the expected outcomes have been based over the
review over the topic of research. The proposed work is mainly based to discuss about the
various forms of challenges to the security standards. With the growth of the technologies, there
have also been a number of challenges based on security of the networks. These security based
challenges within the network should be highly addressed within the shortest possible time in
order to reduce the number of implications over the mobile devices. Hence, from the above
discussion it has been able to focus over the various kind of technologies that could be used
within the mobile computing area in order to reduce the issues over security. This would thus
3. Proposed Research
The proposed research discusses about the various aspects of mobile computing. This
form of computing has gained a huge upliftment in the recent times. The proposed research
focuses over the works of other authors and their views in relation to the topic. Mobile
computing is related to the use of mobile devices that are used in the recent times. There have
been a rise in the number of technologies such as GSM, Bluetooth, GPS, Wi-Fi and many others
that have been discussed within the report.
The primary aim in this research is based on the discussion about mobile computing and
the related technologies that are associated with them. The proposed area of research thus puts
emphasis over the various kind of supported technologies and software systems that are
associated with the use of mobile computing technologies. These kind of innovative technologies
have been majorly been helpful for helping the authors to put their own thoughts and views over
the topic. The approach of methodology that has been used in the area of research is based on
various forms of surveys and the works of other authors in relation to the topic.
Based on the discussion over the topic, the expected outcomes have been based over the
review over the topic of research. The proposed work is mainly based to discuss about the
various forms of challenges to the security standards. With the growth of the technologies, there
have also been a number of challenges based on security of the networks. These security based
challenges within the network should be highly addressed within the shortest possible time in
order to reduce the number of implications over the mobile devices. Hence, from the above
discussion it has been able to focus over the various kind of technologies that could be used
within the mobile computing area in order to reduce the issues over security. This would thus
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
22SECURITY IN MOBILE COMPUTING
help in meeting the expected outcomes based on meeting the concerns of the people and also
help in offering them a smooth platform of mobile computing.
help in meeting the expected outcomes based on meeting the concerns of the people and also
help in offering them a smooth platform of mobile computing.
23SECURITY IN MOBILE COMPUTING
References
[1] I., Khalil, A., Khreishah and M., Azeem, Cloud computing security: A
survey. Computers, 3(1), pp.1-35, 2014.
[2] M.B., Mollah, M.A.K., Azad and A., Vasilakos, Security and privacy challenges in mobile
cloud computing: Survey and way ahead. Journal of Network and Computer Applications, 84,
pp.38-54, 2017.
[3] K., Yang, K., Zhang, J., Ren and X., Shen, Security and privacy in mobile crowdsourcing
networks: challenges and opportunities. IEEE communications magazine, 53(8), pp.75-81, 2015.
[4] Q., Jiang, J., Ma and F., Wei, On the security of a privacy-aware authentication scheme for
distributed mobile cloud computing services. IEEE systems journal, 12(2), pp.2039-2042, 2018.
[5] M., Ali, S.U., Khan and A.V., Vasilakos, Security in cloud computing: Opportunities and
challenges. Information sciences, 305, pp.357-383, 2015.
[6] R., Roman, J., Lopez and M., Mambo, Mobile edge computing, fog et al.: A survey and
analysis of security threats and challenges. Future Generation Computer Systems, 78, pp.680-
698, 2018.
[7] M., Eslahi, M.V., Naseri, H., Hashim, N.M. Tahir and E.H.M., Saad, BYOD: Current state
and security challenges. In 2014 IEEE Symposium on Computer Applications and Industrial
Electronics (ISCAIE) (pp. 189-192). IEEE, 2014, April.
[8] M., Ahmed and M.A., Hossain, Cloud computing and security issues in the
cloud. International Journal of Network Security & Its Applications, 6(1), p.25, 2014.
References
[1] I., Khalil, A., Khreishah and M., Azeem, Cloud computing security: A
survey. Computers, 3(1), pp.1-35, 2014.
[2] M.B., Mollah, M.A.K., Azad and A., Vasilakos, Security and privacy challenges in mobile
cloud computing: Survey and way ahead. Journal of Network and Computer Applications, 84,
pp.38-54, 2017.
[3] K., Yang, K., Zhang, J., Ren and X., Shen, Security and privacy in mobile crowdsourcing
networks: challenges and opportunities. IEEE communications magazine, 53(8), pp.75-81, 2015.
[4] Q., Jiang, J., Ma and F., Wei, On the security of a privacy-aware authentication scheme for
distributed mobile cloud computing services. IEEE systems journal, 12(2), pp.2039-2042, 2018.
[5] M., Ali, S.U., Khan and A.V., Vasilakos, Security in cloud computing: Opportunities and
challenges. Information sciences, 305, pp.357-383, 2015.
[6] R., Roman, J., Lopez and M., Mambo, Mobile edge computing, fog et al.: A survey and
analysis of security threats and challenges. Future Generation Computer Systems, 78, pp.680-
698, 2018.
[7] M., Eslahi, M.V., Naseri, H., Hashim, N.M. Tahir and E.H.M., Saad, BYOD: Current state
and security challenges. In 2014 IEEE Symposium on Computer Applications and Industrial
Electronics (ISCAIE) (pp. 189-192). IEEE, 2014, April.
[8] M., Ahmed and M.A., Hossain, Cloud computing and security issues in the
cloud. International Journal of Network Security & Its Applications, 6(1), p.25, 2014.
24SECURITY IN MOBILE COMPUTING
[9] M., Chen, Y., Qian, S., Mao, W. Tang and X., Yang, Software-defined mobile networks
security. Mobile Networks and Applications, 21(5), pp.729-743, 2016.
[10] D., He, S. Chan and M., Guizani, Mobile application security: malware threats and
defenses. IEEE Wireless Communications, 22(1), pp.138-144, 2015.
[11] A.S.K. ed., Pathan, Security of self-organizing networks: MANET, WSN, WMN, VANET.
CRC press, 2016.
[12] J., Zhou, Z., Cao, X., Dong and A.V., Vasilakos, Security and privacy for cloud-based IoT:
Challenges. IEEE Communications Magazine, 55(1), pp.26-33, 2017.
[13] H., Li, G., Shou, Y., Hu and Z., Guo, Mobile edge computing: Progress and challenges.
In 2016 4th IEEE international conference on mobile cloud computing, services, and
engineering (MobileCloud) (pp. 83-84). IEEE, 2016, March.
[14] Z., Shu, J., Wan, D., Li, J., Lin, A.V., Vasilakos and M., Imran, Security in software-defined
networking: Threats and countermeasures. Mobile Networks and Applications, 21(5), pp.764-
776, 2016.
[15] M., Dabbagh, B., Hamdaoui, M., Guizani and A., Rayes, Software-defined networking
security: pros and cons. IEEE Communications Magazine, 53(6), pp.73-79, 2015.
[16] M., Liyanage, A.B., Abro, M., Ylianttila and A., Gurtov, Opportunities and challenges of
software-defined mobile networks in network security. IEEE Security & Privacy, 14(4), pp.34-
44, 2016.
[9] M., Chen, Y., Qian, S., Mao, W. Tang and X., Yang, Software-defined mobile networks
security. Mobile Networks and Applications, 21(5), pp.729-743, 2016.
[10] D., He, S. Chan and M., Guizani, Mobile application security: malware threats and
defenses. IEEE Wireless Communications, 22(1), pp.138-144, 2015.
[11] A.S.K. ed., Pathan, Security of self-organizing networks: MANET, WSN, WMN, VANET.
CRC press, 2016.
[12] J., Zhou, Z., Cao, X., Dong and A.V., Vasilakos, Security and privacy for cloud-based IoT:
Challenges. IEEE Communications Magazine, 55(1), pp.26-33, 2017.
[13] H., Li, G., Shou, Y., Hu and Z., Guo, Mobile edge computing: Progress and challenges.
In 2016 4th IEEE international conference on mobile cloud computing, services, and
engineering (MobileCloud) (pp. 83-84). IEEE, 2016, March.
[14] Z., Shu, J., Wan, D., Li, J., Lin, A.V., Vasilakos and M., Imran, Security in software-defined
networking: Threats and countermeasures. Mobile Networks and Applications, 21(5), pp.764-
776, 2016.
[15] M., Dabbagh, B., Hamdaoui, M., Guizani and A., Rayes, Software-defined networking
security: pros and cons. IEEE Communications Magazine, 53(6), pp.73-79, 2015.
[16] M., Liyanage, A.B., Abro, M., Ylianttila and A., Gurtov, Opportunities and challenges of
software-defined mobile networks in network security. IEEE Security & Privacy, 14(4), pp.34-
44, 2016.
1 out of 25
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.