Victoria University: NIT6001 Security in Mobile Cloud Computing Report
VerifiedAdded on 2022/08/12
|41
|11151
|17
Report
AI Summary
This report investigates the critical security challenges in Mobile Cloud Computing (MCC). It begins with an introduction to MCC, its architecture, and significance, followed by an exploration of research background and stakeholder analysis. The literature review covers MCC, security issues such as malware and vulnerabilities, and related works. The report identifies key security problems and proposes solutions. The methodology section details the research philosophy, design, and data collection methods. The study also includes a discussion of future research directions and concludes with a summary of findings. The report emphasizes the importance of security for service providers, consumers, and platform providers, highlighting the need for robust security mechanisms to protect data and ensure platform reliability. The report also contains tables and figures to support its findings.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: SECURITY IN MCC
SECURITY IN MOBILE CLOUD COMPUTING
Name of the Student:
Name of the University:
Author Note:
SECURITY IN MOBILE CLOUD COMPUTING
Name of the Student:
Name of the University:
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1SECURITY IN MCC
Table of Contents
1. Introduction..............................................................................................................................2
1.1 Research background........................................................................................................5
1.2 Significance...........................................................................................................................6
1.3 Research Problem:.................................................................................................................9
1.4 Research Question:................................................................................................................9
2. Literature Review......................................................................................................................10
2.1 Mobile Cloud Computing....................................................................................................10
2.2 Security in Mobile Cloud Computing..................................................................................12
Security of Mobile Network User..............................................................................................13
Securing Information on the Cloud...........................................................................................17
2.3 Related works in security of mobile cloud computing........................................................18
Application Security..................................................................................................................18
Security of Data.........................................................................................................................19
2.4 Security Issues in Mobile Cloud Computing.......................................................................19
2.5 Solution................................................................................................................................22
2.6 The Future of Cloud.............................................................................................................24
2.7 Effectiveness in Business Organizations.............................................................................25
3. Methodology..............................................................................................................................27
3.1 Introduction to Methodology:..............................................................................................27
3.2 Research Philosophy:...........................................................................................................27
3.3 Research Design:.................................................................................................................28
3.4 Method for collecting the data for the research:..................................................................28
3.5 Research Ethics:...................................................................................................................30
3.6 Research Limitations:..............................................................................................................30
4. Future Research......................................................................................................................31
5. Conclusion..............................................................................................................................32
References......................................................................................................................................34
Table of Contents
1. Introduction..............................................................................................................................2
1.1 Research background........................................................................................................5
1.2 Significance...........................................................................................................................6
1.3 Research Problem:.................................................................................................................9
1.4 Research Question:................................................................................................................9
2. Literature Review......................................................................................................................10
2.1 Mobile Cloud Computing....................................................................................................10
2.2 Security in Mobile Cloud Computing..................................................................................12
Security of Mobile Network User..............................................................................................13
Securing Information on the Cloud...........................................................................................17
2.3 Related works in security of mobile cloud computing........................................................18
Application Security..................................................................................................................18
Security of Data.........................................................................................................................19
2.4 Security Issues in Mobile Cloud Computing.......................................................................19
2.5 Solution................................................................................................................................22
2.6 The Future of Cloud.............................................................................................................24
2.7 Effectiveness in Business Organizations.............................................................................25
3. Methodology..............................................................................................................................27
3.1 Introduction to Methodology:..............................................................................................27
3.2 Research Philosophy:...........................................................................................................27
3.3 Research Design:.................................................................................................................28
3.4 Method for collecting the data for the research:..................................................................28
3.5 Research Ethics:...................................................................................................................30
3.6 Research Limitations:..............................................................................................................30
4. Future Research......................................................................................................................31
5. Conclusion..............................................................................................................................32
References......................................................................................................................................34

2SECURITY IN MCC
1. Introduction
MCC (Mobile Cloud Computing) is a technology with the help of which data processing as
well as storage is performed. It provides more than one IT resources and services to the mobile
network for on-demand self-service (Kumar 2020). Mobile service providers give different types
of services and facilities to the consumers. It can be performed by taking entire benefit of the
cloud computing. Resources in the MCC are situated in many virtual distributed computer
systems. There are many companies who offer various cloud based products like android.
Google maps and Geographic search are new cloud based products in Google.
Security is a crucial problem in this particular context. There are three levels of security in
the system of MCC:
Mobile terminal
This is a kind of open operating system. It provides wireless access to the internet.
It also provides support to the third party software and personalisation (Ibtihal and
Hassan 2020). For that reason, this can be said that, security issues of MCC are a big
deal. Following are some security issues in the mobile cloud computing.
Malware
This helps intruders to get necessary access of a particular user (Labati et
al. 2020). They are able to down load all the details of the users automatically. A
huge number of anti-malware software is developed. But they do not have many
resources. There is a huge capacity of the mobile terminals that are significant to
the various computing resources.
1. Introduction
MCC (Mobile Cloud Computing) is a technology with the help of which data processing as
well as storage is performed. It provides more than one IT resources and services to the mobile
network for on-demand self-service (Kumar 2020). Mobile service providers give different types
of services and facilities to the consumers. It can be performed by taking entire benefit of the
cloud computing. Resources in the MCC are situated in many virtual distributed computer
systems. There are many companies who offer various cloud based products like android.
Google maps and Geographic search are new cloud based products in Google.
Security is a crucial problem in this particular context. There are three levels of security in
the system of MCC:
Mobile terminal
This is a kind of open operating system. It provides wireless access to the internet.
It also provides support to the third party software and personalisation (Ibtihal and
Hassan 2020). For that reason, this can be said that, security issues of MCC are a big
deal. Following are some security issues in the mobile cloud computing.
Malware
This helps intruders to get necessary access of a particular user (Labati et
al. 2020). They are able to down load all the details of the users automatically. A
huge number of anti-malware software is developed. But they do not have many
resources. There is a huge capacity of the mobile terminals that are significant to
the various computing resources.

3SECURITY IN MCC
Software vulnerabilities
For application software, the log in creadentials are moved to the
network with the help of File Transfer Protocol (Stergiou et al. 2020). These
are preserved as a clear text. These provide an unauthorized access of the cell
phones from computers within similar network. For that reason, personal
information is not at all secured.
Mobile Network Security
Mobile gadgets has the ability for accessing the network by adopting various
phone services, sending of Short message services and other services related to the
internet (Wamsi, Pandey and Kakade 2020). Smart phones can access the Wi-Fi and
Bluetooth Network. For that reason, these accesses are responsible for security threats as
well as malicious attack.
Mobile Cloud
Security in MCC is highlighted with respect two problems- privacy protection of
data and platform reliability. These are as follows:
Platform Reliability
Cloud services give a huge amount of storage for the resources of
important resources (Xia, Jiu and Fan 2020). For that reason, there is always a
threat of being attacked. There are various types of attacks such as malwareor
any other malicious program, cloud users or insiders. Main intention of
intruders is for destroying the cloud services. The Denial of Service terminates
cloud services by dissolving the availability of the platform.
Software vulnerabilities
For application software, the log in creadentials are moved to the
network with the help of File Transfer Protocol (Stergiou et al. 2020). These
are preserved as a clear text. These provide an unauthorized access of the cell
phones from computers within similar network. For that reason, personal
information is not at all secured.
Mobile Network Security
Mobile gadgets has the ability for accessing the network by adopting various
phone services, sending of Short message services and other services related to the
internet (Wamsi, Pandey and Kakade 2020). Smart phones can access the Wi-Fi and
Bluetooth Network. For that reason, these accesses are responsible for security threats as
well as malicious attack.
Mobile Cloud
Security in MCC is highlighted with respect two problems- privacy protection of
data and platform reliability. These are as follows:
Platform Reliability
Cloud services give a huge amount of storage for the resources of
important resources (Xia, Jiu and Fan 2020). For that reason, there is always a
threat of being attacked. There are various types of attacks such as malwareor
any other malicious program, cloud users or insiders. Main intention of
intruders is for destroying the cloud services. The Denial of Service terminates
cloud services by dissolving the availability of the platform.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4SECURITY IN MCC
Prevention of data as well as privacy
The management of the users of the data stays at different
locations. The users are totally dark regarding the appropriate situation of
the infrastructure (Wamsi, Pandey and Kakade 2020). For that reason, data
protection as well as privacy is an important aspect in the MCC.
Figure 1: Mobile cloud computing model (Sharma & Bohra, 2015)
The essential keywords which are associated with this topic are described below:
Table 1: Keywords related to the research study
1. Mobile Cloud Computing MCC is treated as a latest pattern of the distributed computing
for their applications (Stergiou et al. 2020). The storage and
data handling is moved with the help of Smart mobile gadgets
to the rich resources. It has very powerful centralized centres
Prevention of data as well as privacy
The management of the users of the data stays at different
locations. The users are totally dark regarding the appropriate situation of
the infrastructure (Wamsi, Pandey and Kakade 2020). For that reason, data
protection as well as privacy is an important aspect in the MCC.
Figure 1: Mobile cloud computing model (Sharma & Bohra, 2015)
The essential keywords which are associated with this topic are described below:
Table 1: Keywords related to the research study
1. Mobile Cloud Computing MCC is treated as a latest pattern of the distributed computing
for their applications (Stergiou et al. 2020). The storage and
data handling is moved with the help of Smart mobile gadgets
to the rich resources. It has very powerful centralized centres

5SECURITY IN MCC
for the computation of data within the computational cloud.
2. User Authentication It is a process of performing the authentication of the
uniqueness of the mobile user to make sure that he is an
authentic user for accessing the resources of the mobile cloud
(Stergiou and Psannis 2020).
3. Information security issues There are some very common problems of the information
security issues of mobile cloud computing (Pérez et val. 2020).
These are System security of server and database, security in
networks, protection of data, protection of storage as well as
systems.
Figure 2: Table of mobile cloud computing
1.1 Research background
In this particular case, various research background of the mobile cloud computing as well as
software architecture is discussed.
Mobile Cloud Computing was invented as a very popular technology and it is used as the
replacement of the old theories of the cloud computing (Neware et al. 2020). According to a
survey, there are approximately seven million mobile devices in the entire globe. It indicates that
the number of mobile devices are enhancing five times faster than the human population (Labati
et al. 2020). It is treated as the combination of the mobile gadgets, mobile applications as well as
remote server. It also offers some portable solutions in the area of the MCC. It can be treated as
the backbone of mobile computing. It highlights some gadgets (Mahmud et al. 2020). It helps the
for the computation of data within the computational cloud.
2. User Authentication It is a process of performing the authentication of the
uniqueness of the mobile user to make sure that he is an
authentic user for accessing the resources of the mobile cloud
(Stergiou and Psannis 2020).
3. Information security issues There are some very common problems of the information
security issues of mobile cloud computing (Pérez et val. 2020).
These are System security of server and database, security in
networks, protection of data, protection of storage as well as
systems.
Figure 2: Table of mobile cloud computing
1.1 Research background
In this particular case, various research background of the mobile cloud computing as well as
software architecture is discussed.
Mobile Cloud Computing was invented as a very popular technology and it is used as the
replacement of the old theories of the cloud computing (Neware et al. 2020). According to a
survey, there are approximately seven million mobile devices in the entire globe. It indicates that
the number of mobile devices are enhancing five times faster than the human population (Labati
et al. 2020). It is treated as the combination of the mobile gadgets, mobile applications as well as
remote server. It also offers some portable solutions in the area of the MCC. It can be treated as
the backbone of mobile computing. It highlights some gadgets (Mahmud et al. 2020). It helps the

6SECURITY IN MCC
users to perform various computation of the mobile cloud computing. It helps to share various
information regarding the research.
The software architecture highlights the blueprint or high level view of particular
software. It is proved to be a successful abstraction of several complexities of various
modules of the source code (Kumar 2020). It is used to highlight some components of the
architecture. There are some main computational elements for giving the abstraction of the
complicated details. It also gives some context-sensitivity (Li and Zhu 2020). The mobile
cloud software system is observed as a layered architecture model. It gives some storage
facilities and it can be treated as a part of the layer of cloud computing.
1.2 Significance
There are various stakeholders involved in this type of the research. These are as follows:
Service
Providers
Platform
providers
Consumers
users to perform various computation of the mobile cloud computing. It helps to share various
information regarding the research.
The software architecture highlights the blueprint or high level view of particular
software. It is proved to be a successful abstraction of several complexities of various
modules of the source code (Kumar 2020). It is used to highlight some components of the
architecture. There are some main computational elements for giving the abstraction of the
complicated details. It also gives some context-sensitivity (Li and Zhu 2020). The mobile
cloud software system is observed as a layered architecture model. It gives some storage
facilities and it can be treated as a part of the layer of cloud computing.
1.2 Significance
There are various stakeholders involved in this type of the research. These are as follows:
Service
Providers
Platform
providers
Consumers
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7SECURITY IN MCC
Figure 2: Stakeholder diagram
Service Providers
If strong security mechanism is applied to the mobile cloud computing services,
then service providers can easily provide the services to the consumers (Kocabas and
Soyata 2020). Service providers can provide some efficient service to their consumers.
Using the cloud services, the service providers can provide services to their potential
consumers from any location in the globe.
Consumers
If the consumers are getting secured mobile services from the service provider
then the consumers will feel secure regarding these services. As a result of that, the
number of consumers will be increased rapidly (Ibtihal and Hassan 2020). As there is no
chance of the data loss or stolen gadgets, details of the consumer will be secured. As a
result of that, it will increase the popularity of the consumers on the services. As there is
a strong security in the MCC services, then this will provide less vulnerability of the
gadgets, operating system and third party services. As a better methodology of malicious
code detection is applied in the mobile cloud computing services, so that it is possible for
service provider to provide secure services to the consumer. It automatically increases the
popularity of the services to the consumer (Bhattacharya et al. 2020). For that reason,
consumers can enjoy best services from the end of the service provider. As better security
mechanism is implemented, so that consumers can face lesser amount of risk while using
these services.
Platform providers
Figure 2: Stakeholder diagram
Service Providers
If strong security mechanism is applied to the mobile cloud computing services,
then service providers can easily provide the services to the consumers (Kocabas and
Soyata 2020). Service providers can provide some efficient service to their consumers.
Using the cloud services, the service providers can provide services to their potential
consumers from any location in the globe.
Consumers
If the consumers are getting secured mobile services from the service provider
then the consumers will feel secure regarding these services. As a result of that, the
number of consumers will be increased rapidly (Ibtihal and Hassan 2020). As there is no
chance of the data loss or stolen gadgets, details of the consumer will be secured. As a
result of that, it will increase the popularity of the consumers on the services. As there is
a strong security in the MCC services, then this will provide less vulnerability of the
gadgets, operating system and third party services. As a better methodology of malicious
code detection is applied in the mobile cloud computing services, so that it is possible for
service provider to provide secure services to the consumer. It automatically increases the
popularity of the services to the consumer (Bhattacharya et al. 2020). For that reason,
consumers can enjoy best services from the end of the service provider. As better security
mechanism is implemented, so that consumers can face lesser amount of risk while using
these services.
Platform providers

8SECURITY IN MCC
With the help of this research, platform providers can provide secure mobile
application framework to their consumers (Stergiou and Psannis 2020). Developers of the
platform providing company use many tools like software developer kit and some unified
Application Programmable Interface (Bakhshi and Rodriguez-Navas 2020). They can use
MBaaS. In this framework, better security is implemented. For that reason, it is first
choice of the developers. With the help of this, a huge amount of backend framework has
been reduced like geolocation, pushing of notification, transactions performed in mobile
devices, storage of data and performing the analysis (Li and Zhu 2020). With the help of
this research, the platform providers can use a high computing and storage based
framework (Abuarqoub 2020). With the help of this, the developer can preserve a large
amount of data of the consumers. Storage needs to be borrowed from the cloud resources.
Gadgets like high end navigators, store maps and routes can be used. It is required to
retrieve the real life information on the planning of the routes and updating various
traffics. It becomes the growing need in current scenario.
1.3 Research Problem:
The emergence of the latest technology has given rise to numerous other technologies
which includes mobile cloud computing as well. The cloud computing’s entire system is under
continuous threat of exposure to the hackers and other sort of attacks. Ensuring the security of
the Mobile Cloud Computing services is main reason for which the research is undertaken. The
study discusses about the security issues which arises due to the usage of the cloud computing on
mobile devices such that the techniques can be developed for mitigating them. Analysis and
research helps in finding efficient solution for the security issues that arises in the system.
With the help of this research, platform providers can provide secure mobile
application framework to their consumers (Stergiou and Psannis 2020). Developers of the
platform providing company use many tools like software developer kit and some unified
Application Programmable Interface (Bakhshi and Rodriguez-Navas 2020). They can use
MBaaS. In this framework, better security is implemented. For that reason, it is first
choice of the developers. With the help of this, a huge amount of backend framework has
been reduced like geolocation, pushing of notification, transactions performed in mobile
devices, storage of data and performing the analysis (Li and Zhu 2020). With the help of
this research, the platform providers can use a high computing and storage based
framework (Abuarqoub 2020). With the help of this, the developer can preserve a large
amount of data of the consumers. Storage needs to be borrowed from the cloud resources.
Gadgets like high end navigators, store maps and routes can be used. It is required to
retrieve the real life information on the planning of the routes and updating various
traffics. It becomes the growing need in current scenario.
1.3 Research Problem:
The emergence of the latest technology has given rise to numerous other technologies
which includes mobile cloud computing as well. The cloud computing’s entire system is under
continuous threat of exposure to the hackers and other sort of attacks. Ensuring the security of
the Mobile Cloud Computing services is main reason for which the research is undertaken. The
study discusses about the security issues which arises due to the usage of the cloud computing on
mobile devices such that the techniques can be developed for mitigating them. Analysis and
research helps in finding efficient solution for the security issues that arises in the system.

9SECURITY IN MCC
1.4 Research Question:
1. What are the basic components of the mobile security and how has cloud technology
helped in process of evolution of mobile cloud computing technology?
2. What are main functions of the mobile cloud computing security that can be incorporated
in the system?
3. What are the issues in the security that should initiate the mitigation process in the
organizations?
2. Literature Review
2.1 Mobile Cloud Computing
As per Kandavel and Kumaravel (2019), several factors are there which could contribute
to decision for introducing Mobile Cloud Computing (MCC). These consist of wireless
communication, cloud computing, services based on location, portable devices, mobile internet
and infrastructure. MCC made this possible for the users in having both unlimited storage and
computing power. MCC has become model for the transparent augmentation of capabilities that
are available within mobile devices by using wireless network accessing to computational
resources and cloud storage along with dynamic offloading which changes as per operating
conditions. Though, these mobile devices operate on batteries and have limited power for
processing, storage, low capacity storage, low energy, problematic connectivity and some few
features. These would always create problems for the applications which need high capabilities
of computation and require large capacity of storage to run within mobile environment. For
augmenting computing capability, mobile devices’ battery life and storage capacity, the large
1.4 Research Question:
1. What are the basic components of the mobile security and how has cloud technology
helped in process of evolution of mobile cloud computing technology?
2. What are main functions of the mobile cloud computing security that can be incorporated
in the system?
3. What are the issues in the security that should initiate the mitigation process in the
organizations?
2. Literature Review
2.1 Mobile Cloud Computing
As per Kandavel and Kumaravel (2019), several factors are there which could contribute
to decision for introducing Mobile Cloud Computing (MCC). These consist of wireless
communication, cloud computing, services based on location, portable devices, mobile internet
and infrastructure. MCC made this possible for the users in having both unlimited storage and
computing power. MCC has become model for the transparent augmentation of capabilities that
are available within mobile devices by using wireless network accessing to computational
resources and cloud storage along with dynamic offloading which changes as per operating
conditions. Though, these mobile devices operate on batteries and have limited power for
processing, storage, low capacity storage, low energy, problematic connectivity and some few
features. These would always create problems for the applications which need high capabilities
of computation and require large capacity of storage to run within mobile environment. For
augmenting computing capability, mobile devices’ battery life and storage capacity, the large
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10SECURITY IN MCC
capacity of storage and high computational demanding activities must be transferred into cloud.
Data security, however, is still concern as well as major obstacle within MCC from being
adopted widely. By using base stations, the mobile devices could connect with mobile networks.
Such base stations for mobile establish functional interfaces among both mobile as well s
networks devices. Mobile users’ ID as well as location is given to central processors where
connection is made with servers which provide services of mobile network. By this setup,
operators of mobile network could give services of authentication, accounting and authorization
to the mobile users depending on subscribers information and home agent stored within database.
Cloud is sent the requests of subscribers by internet where cloud controller processes the
requests. Hence, the users are provided with cloud services.
Zhang, Wu and Delsey (2018), in past years, as tremendous developments’ result within
mobile technologies and networks, MCC is emerging area for research. As per the surveys,
people would like to use the mobile devices like smartphones, laptops and tablets instead of
desktop computers. Computing by mobile devices is now a feasible concept when compared with
conventional approach. However, there are still few drawbacks like computational power,
shortage of storage as well as limited battery for mobile devices are the issues of technology of
MCC. For overcoming such issues, cloud could be used as useful solution. The cloud is
virtualization’s combination of high quantity of the resources with computing paradigm that is
incorporated with Platform as a Service (PaaS), Software as a Service (SaaS) and Infrastructure
as a Service (IaaS). Several could providers like Amazon EC2 and Microsoft Azure provide
elastic storage. Hence, Mobile computing’s integration with the cloud computing has provided
birth to better and newer technological approach known as Mobile Cloud Computing. Mobile
capacity of storage and high computational demanding activities must be transferred into cloud.
Data security, however, is still concern as well as major obstacle within MCC from being
adopted widely. By using base stations, the mobile devices could connect with mobile networks.
Such base stations for mobile establish functional interfaces among both mobile as well s
networks devices. Mobile users’ ID as well as location is given to central processors where
connection is made with servers which provide services of mobile network. By this setup,
operators of mobile network could give services of authentication, accounting and authorization
to the mobile users depending on subscribers information and home agent stored within database.
Cloud is sent the requests of subscribers by internet where cloud controller processes the
requests. Hence, the users are provided with cloud services.
Zhang, Wu and Delsey (2018), in past years, as tremendous developments’ result within
mobile technologies and networks, MCC is emerging area for research. As per the surveys,
people would like to use the mobile devices like smartphones, laptops and tablets instead of
desktop computers. Computing by mobile devices is now a feasible concept when compared with
conventional approach. However, there are still few drawbacks like computational power,
shortage of storage as well as limited battery for mobile devices are the issues of technology of
MCC. For overcoming such issues, cloud could be used as useful solution. The cloud is
virtualization’s combination of high quantity of the resources with computing paradigm that is
incorporated with Platform as a Service (PaaS), Software as a Service (SaaS) and Infrastructure
as a Service (IaaS). Several could providers like Amazon EC2 and Microsoft Azure provide
elastic storage. Hence, Mobile computing’s integration with the cloud computing has provided
birth to better and newer technological approach known as Mobile Cloud Computing. Mobile

11SECURITY IN MCC
devices within MCC are used as thin clients. The data would be offloaded in cloud from the
mobile devices for storage and computation.
According to Walia (2017), MCC could defined as rich technology for mobile computing
which controls the elastic resources for different network and cloud technologies for unlimited
mobility, storage and functionality in order for serving huge amount of the mobile equipment
anytime and anywhere through Internet or Ethernet. MCC is infrastructure where processing and
storing of data could be performed out of the mobile device, however within the cloud. Within
MCC, data storage as well as computing power are shifted away from smartphones, then
performed within cloud, thus bringing applications of mobile cloud as well as mobile computing
to smartphones as well as to mobile subscribers’ wide range. Hence, MCC is infrastructure
which combines domains of cloud computing and mobile computing where processing of the
data and storing of data take place outside mobile devices. This is not that the offloading would
be the remote cloud, however it could be mobile devices’ collective resources in local vicinity.
Motivation for MCC is removing mobile computing’s existing drawbacks. Several limitations
are there of mobile computing that are discussed as follows:
Limited capacity of storage for mobile devices. There is limited internal memory
for every mobile device. However, these could be expanded by using external
memory.
Limited life of battery for mobile devices. As for mobility of device, this is
impossible in finding external source of power. The mobile devices depend on
internal battery that has charge life for few hours only. In several applications are
continuously running or computation is continuous, battery would drain soon.
devices within MCC are used as thin clients. The data would be offloaded in cloud from the
mobile devices for storage and computation.
According to Walia (2017), MCC could defined as rich technology for mobile computing
which controls the elastic resources for different network and cloud technologies for unlimited
mobility, storage and functionality in order for serving huge amount of the mobile equipment
anytime and anywhere through Internet or Ethernet. MCC is infrastructure where processing and
storing of data could be performed out of the mobile device, however within the cloud. Within
MCC, data storage as well as computing power are shifted away from smartphones, then
performed within cloud, thus bringing applications of mobile cloud as well as mobile computing
to smartphones as well as to mobile subscribers’ wide range. Hence, MCC is infrastructure
which combines domains of cloud computing and mobile computing where processing of the
data and storing of data take place outside mobile devices. This is not that the offloading would
be the remote cloud, however it could be mobile devices’ collective resources in local vicinity.
Motivation for MCC is removing mobile computing’s existing drawbacks. Several limitations
are there of mobile computing that are discussed as follows:
Limited capacity of storage for mobile devices. There is limited internal memory
for every mobile device. However, these could be expanded by using external
memory.
Limited life of battery for mobile devices. As for mobility of device, this is
impossible in finding external source of power. The mobile devices depend on
internal battery that has charge life for few hours only. In several applications are
continuously running or computation is continuous, battery would drain soon.

12SECURITY IN MCC
Low bandwidth. Within mobile computing, technologies such as GPRS, GSM and
EDGE have quite low bandwidth.
2.2 Security in Mobile Cloud Computing
According to the author Rahimi et al. (2014), the main concern of the operators of cloud
server is protecting and securing the privacy and the integrity of the application and data of the
mobile computing users. With the application developers and the mobile users getting
advantages from the cloud storage area, they need to be careful of the threat while collaborating
with the integrity of the application or data, digital rights and authentication (Alizadeh et al.
2016). The concerns regarding the security are separated into the security and privacy of the
mobile network users as well as cloud.
Security of Mobile Network User
Multiple types of the security threats and vulnerabilities are there to the various mobile
devices like cellular phones, smart phones and laptops. Some of the applications may cause the
privacy and security concerns for the mobile users. Four key problems are there concerning
subscriber or user’s privacy and security are:
Security for mobile applications
According to Martínez-Pérez, De La Torre-Díez and López-Coronado (2015) simplest
way for detecting the security threats and vulnerabilities is for installing and running the program
on the mobile device. However, for the limited capabilities of processing in the mobile devices,
this can be difficult for protecting the mobile devices against the vulnerabilities and threats.
Multiple approaches are there, which are developed for transferring the detection mechanism of
threat and security such as data encryption, token management, authentication and authorization
Low bandwidth. Within mobile computing, technologies such as GPRS, GSM and
EDGE have quite low bandwidth.
2.2 Security in Mobile Cloud Computing
According to the author Rahimi et al. (2014), the main concern of the operators of cloud
server is protecting and securing the privacy and the integrity of the application and data of the
mobile computing users. With the application developers and the mobile users getting
advantages from the cloud storage area, they need to be careful of the threat while collaborating
with the integrity of the application or data, digital rights and authentication (Alizadeh et al.
2016). The concerns regarding the security are separated into the security and privacy of the
mobile network users as well as cloud.
Security of Mobile Network User
Multiple types of the security threats and vulnerabilities are there to the various mobile
devices like cellular phones, smart phones and laptops. Some of the applications may cause the
privacy and security concerns for the mobile users. Four key problems are there concerning
subscriber or user’s privacy and security are:
Security for mobile applications
According to Martínez-Pérez, De La Torre-Díez and López-Coronado (2015) simplest
way for detecting the security threats and vulnerabilities is for installing and running the program
on the mobile device. However, for the limited capabilities of processing in the mobile devices,
this can be difficult for protecting the mobile devices against the vulnerabilities and threats.
Multiple approaches are there, which are developed for transferring the detection mechanism of
threat and security such as data encryption, token management, authentication and authorization
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

13SECURITY IN MCC
to the cloud. The applications need to go through the threat evaluation level before the mobile
subscriber can use the application. The verification processes are used for ensuring that the data
sent to mobile devices are not malicious.
Privacy
According to Liang et al. (2014) private information like the location and other vital data
can compromise the privacy of the users. The privacy threats and vulnerabilities can be reduced
by selecting the application and analysis this. This gives a concern that the organizations or the
cloud providers will utilize the information to the agencies of government except the user’s
knowledge and permission.
Data Ownership
According to Lomotey and Deters (2014) data ownership of digital media is another issue
related to the MCC. With the cloud computing, this is possible for storing the media files like e-
books, audio and videos. If any user bought the purchased the media via any particular service
and the medias are stored in the the storage, a threats will be there related to the access of the
purchased media.
Data Security and Access
As per the author, Mollah, Azad and Vasilakos (2017) issues related to the security and
privacy as well as access is vital to the programs and applications, which rely on the internet
access and remote data storage. MCC is vulnerable, as this needs multiple points where the
access may interrupt. Strong and high-speed signal reception can impact the services to the users
of mobile device.
to the cloud. The applications need to go through the threat evaluation level before the mobile
subscriber can use the application. The verification processes are used for ensuring that the data
sent to mobile devices are not malicious.
Privacy
According to Liang et al. (2014) private information like the location and other vital data
can compromise the privacy of the users. The privacy threats and vulnerabilities can be reduced
by selecting the application and analysis this. This gives a concern that the organizations or the
cloud providers will utilize the information to the agencies of government except the user’s
knowledge and permission.
Data Ownership
According to Lomotey and Deters (2014) data ownership of digital media is another issue
related to the MCC. With the cloud computing, this is possible for storing the media files like e-
books, audio and videos. If any user bought the purchased the media via any particular service
and the medias are stored in the the storage, a threats will be there related to the access of the
purchased media.
Data Security and Access
As per the author, Mollah, Azad and Vasilakos (2017) issues related to the security and
privacy as well as access is vital to the programs and applications, which rely on the internet
access and remote data storage. MCC is vulnerable, as this needs multiple points where the
access may interrupt. Strong and high-speed signal reception can impact the services to the users
of mobile device.

14SECURITY IN MCC
Authenticate Cryptography based security model
The research in this article is on security issues for dealing with numerous requests from
different devices, one after another on MCC. There might be an opportunity of third party
intruders, hackers, the chance of attackers, or others to interfere with this communication. It is a
fundamental issue of taking care of different demands in MCC. To play out complete safety
based communication, it planned a model of cryptography-based. As per Mahmood et al. (2018)
indicated by the proposed model, CSP that is Cloud Service Provider, is a trustworthy expert and
is liable for all activities and decisions. In this design, the mobile agent first examines the
malevolent file. If its mark isn't coordinated with the stored database, it is directed to the system
service for study with the assistance of different location machines running similar on having
machinery with the support of virtualization way.
Sarddar and Nandi (2016), shows the utilization of each part utilized in this model and define
certain strange circumstances and how they are conquered utilizing this model. Storage Server
(AS) and Authentication Server (SS) are two associations under the regulation of CSP, and their
activities and functions are constrained by CSP. As a matter of first importance, the CSP, AS,
and SS keep up a model that is exclusively subject to a set of Private Key and Public Key.
Presently the following requirement is Public key of CSP is available to all, and just CSP
recognizes the Public key of SS and AS. So no other third party can use the Public Key; CSP
alone can use the SS and AS Public Key; however, if any third party needs to communicate with
SS or AS, it must first interact with CSP. If CSP grants connecting with the SS or AS to a third
party, then she can do as such. In this model, the third party never recognizes the SS or AS
Public Key; however, it can communicate safely with them.
Authenticate Cryptography based security model
The research in this article is on security issues for dealing with numerous requests from
different devices, one after another on MCC. There might be an opportunity of third party
intruders, hackers, the chance of attackers, or others to interfere with this communication. It is a
fundamental issue of taking care of different demands in MCC. To play out complete safety
based communication, it planned a model of cryptography-based. As per Mahmood et al. (2018)
indicated by the proposed model, CSP that is Cloud Service Provider, is a trustworthy expert and
is liable for all activities and decisions. In this design, the mobile agent first examines the
malevolent file. If its mark isn't coordinated with the stored database, it is directed to the system
service for study with the assistance of different location machines running similar on having
machinery with the support of virtualization way.
Sarddar and Nandi (2016), shows the utilization of each part utilized in this model and define
certain strange circumstances and how they are conquered utilizing this model. Storage Server
(AS) and Authentication Server (SS) are two associations under the regulation of CSP, and their
activities and functions are constrained by CSP. As a matter of first importance, the CSP, AS,
and SS keep up a model that is exclusively subject to a set of Private Key and Public Key.
Presently the following requirement is Public key of CSP is available to all, and just CSP
recognizes the Public key of SS and AS. So no other third party can use the Public Key; CSP
alone can use the SS and AS Public Key; however, if any third party needs to communicate with
SS or AS, it must first interact with CSP. If CSP grants connecting with the SS or AS to a third
party, then she can do as such. In this model, the third party never recognizes the SS or AS
Public Key; however, it can communicate safely with them.

15SECURITY IN MCC
User Authentication in MCC using Profilling
As Cloud Computing has been increasing broadly, service providers and clients empower
to utilize service cheaply or resource and effectively without keeping all the assets required.
According to Wang, Chen and Wang (2015) though cloud computing, high-traffic processing,
considerable distributed processing advances, virtualization innovation, service availability will
happen because of different issues. As of late, among a large number of these issues in
authentication, application security, password, access control, and a lot of it has been examined.
User authentication in an environment of mobile, particularly the more essential to them and a
high level of security authorization are necessary.
As stated by Jeong & Choi (2012), authentication and data security amongst technologies
in Cloud Computing are managed in this segment. To verify data of enterprises or people,
authentication innovation will be offered fundamentally. Particularly, in MCC, the accessibility
of the whole framework can be failing when security an enormous size of data, so a suitable
cipher must be utilized for the circumstance. Additionally, when something occurs to the server
of key-stored, it is not feasible for a lot of clients to access data; there must be an investigation of
key management. It is significant to study on data recovery and fault tolerance innovations when
there is an incident to prevent a service discontinuance or data loss. Instances of Cloud
administration discontinuance and loss of data are the instances of what issues can be instigated
when these systems do not work appropriately. The author additionally defined particular
security rules for Cloud Computing, utilizing what Gartner says. They have favored client get to,
investigative support, data segregation, data location, administrative consistence, recovery, and
long- term practicality
User Authentication in MCC using Profilling
As Cloud Computing has been increasing broadly, service providers and clients empower
to utilize service cheaply or resource and effectively without keeping all the assets required.
According to Wang, Chen and Wang (2015) though cloud computing, high-traffic processing,
considerable distributed processing advances, virtualization innovation, service availability will
happen because of different issues. As of late, among a large number of these issues in
authentication, application security, password, access control, and a lot of it has been examined.
User authentication in an environment of mobile, particularly the more essential to them and a
high level of security authorization are necessary.
As stated by Jeong & Choi (2012), authentication and data security amongst technologies
in Cloud Computing are managed in this segment. To verify data of enterprises or people,
authentication innovation will be offered fundamentally. Particularly, in MCC, the accessibility
of the whole framework can be failing when security an enormous size of data, so a suitable
cipher must be utilized for the circumstance. Additionally, when something occurs to the server
of key-stored, it is not feasible for a lot of clients to access data; there must be an investigation of
key management. It is significant to study on data recovery and fault tolerance innovations when
there is an incident to prevent a service discontinuance or data loss. Instances of Cloud
administration discontinuance and loss of data are the instances of what issues can be instigated
when these systems do not work appropriately. The author additionally defined particular
security rules for Cloud Computing, utilizing what Gartner says. They have favored client get to,
investigative support, data segregation, data location, administrative consistence, recovery, and
long- term practicality
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

16SECURITY IN MCC
The purpose of consciousness in this mobile cloud computing that varies from past
computing condition isn't human, however device. It implies data is to be customized. They
effectively need to give different information and service to the aware behavior and thought of
humans. For this critical thinking on mobile cloud computing, it was construed circumstance
which had the option to know the behavior of human which gathered from different sensors.
They are given information and service to the client from the inferred context. For the most part,
a circumstance which emerged around human had the option to gather from the sensor. However,
personal thought and inclination were not. In this manner, they utilized the technique for
individual data storage for investigating predisposition, for example, history, individual, diary,
and personal profile.
As shown above, the client of mobile cloud computing was given different
administrations without reorganization of humans by mobile devices any time and anyplace.
Thus, it needs to derive a setting for providing services to clients correctly. Hence, there is
learning regarding the technique of context suggestion to utilize individual information ad
inclination. As it requested personal information and desire in background implication, study
about the method of the profile, and using the client's profile for storing.
Securing Information on the Cloud
According to Ruj and Saxena (2015) both enterprises and individuals identify the benefit
of storing the huge amount the content on the cloud server. Therefore, the issues and concerns
related to the digital rights, authentication and integrity must be addressed.
Integrity
The purpose of consciousness in this mobile cloud computing that varies from past
computing condition isn't human, however device. It implies data is to be customized. They
effectively need to give different information and service to the aware behavior and thought of
humans. For this critical thinking on mobile cloud computing, it was construed circumstance
which had the option to know the behavior of human which gathered from different sensors.
They are given information and service to the client from the inferred context. For the most part,
a circumstance which emerged around human had the option to gather from the sensor. However,
personal thought and inclination were not. In this manner, they utilized the technique for
individual data storage for investigating predisposition, for example, history, individual, diary,
and personal profile.
As shown above, the client of mobile cloud computing was given different
administrations without reorganization of humans by mobile devices any time and anyplace.
Thus, it needs to derive a setting for providing services to clients correctly. Hence, there is
learning regarding the technique of context suggestion to utilize individual information ad
inclination. As it requested personal information and desire in background implication, study
about the method of the profile, and using the client's profile for storing.
Securing Information on the Cloud
According to Ruj and Saxena (2015) both enterprises and individuals identify the benefit
of storing the huge amount the content on the cloud server. Therefore, the issues and concerns
related to the digital rights, authentication and integrity must be addressed.
Integrity

17SECURITY IN MCC
The main concerns of the users of mobile devices are data integrity while using the cloud
service. Multiple solutions are suggested for addressing the issues. However, the mobile user’s
energy consumption cannot be taken into the consideration. Three key components are there in
the requirement such as cloud storage service, mobile client and the trusted third party.
Authentication
Authors He et al. (2016) suggested the authentication method by using the Cloud
Computing for providing the security to data that is suitable for mobile environments. The
method combines with the implicit authentication for the authentication of the mobile client. The
developer has built the implicit the authentication system, which uses the mobile data such as
website access, SMS messages, location and calling logs for the environment of existing mobile.
This faces the input constraints and makes this hard for the mobile user for utilizing the complex
credentials.
Digital rights management
The digital data, which are unstructured like images, e-books, audios and videos are
illegally distributed and pirated. Therefore, this is very essential for the service provide in the
MCC for protecting the data from the illegal access to the peer-to-peer networks and cloud
computing. According to Lah and Lewis (2015) mobile DRM (Digital Right Management)
scheme that is based on the cloud uses the sim card in the mobile phones for improving the
flexibility while minimizing the vulnerability at very lower cost.
2.3 Related works in security of mobile cloud computing
The main concerns of the users of mobile devices are data integrity while using the cloud
service. Multiple solutions are suggested for addressing the issues. However, the mobile user’s
energy consumption cannot be taken into the consideration. Three key components are there in
the requirement such as cloud storage service, mobile client and the trusted third party.
Authentication
Authors He et al. (2016) suggested the authentication method by using the Cloud
Computing for providing the security to data that is suitable for mobile environments. The
method combines with the implicit authentication for the authentication of the mobile client. The
developer has built the implicit the authentication system, which uses the mobile data such as
website access, SMS messages, location and calling logs for the environment of existing mobile.
This faces the input constraints and makes this hard for the mobile user for utilizing the complex
credentials.
Digital rights management
The digital data, which are unstructured like images, e-books, audios and videos are
illegally distributed and pirated. Therefore, this is very essential for the service provide in the
MCC for protecting the data from the illegal access to the peer-to-peer networks and cloud
computing. According to Lah and Lewis (2015) mobile DRM (Digital Right Management)
scheme that is based on the cloud uses the sim card in the mobile phones for improving the
flexibility while minimizing the vulnerability at very lower cost.
2.3 Related works in security of mobile cloud computing

18SECURITY IN MCC
The security issues related to MCC are divided into:
Application security
Data security
Application Security
The application security collaborates with the security and protection of the mobile
application that uses the resources of cloud for providing better services in the environment of
MCC. The top and down spatial technique of clocking with or without the optimization was
suggested by Thomas et al. (2018). This uses the resources of cloud for providing more efficient,
scalable and better preservation of privacy for the location based services. Then the spatial
clocking without the optimization requires the communication with cloud server for getting the
user in various grid cells. These communication process overheads called and delay the spatial
clocking with the optimization. The cloud server takes the responsibility for sharing and
maintaining the historical information of every cell during the initiation. The processing and the
maintenance of the historical information inflict the extra burden on cloud while comparing to
the other techniques.
Security of Data
Data security works with the protection and security of the built-in mobile user file, and
is then controlled on the remote server or smart device. The user's confidentiality file is stored in
smart devices or in cloud server. This offloads the verification of the integrity of the tasks to the
TTP and service provider. In this way reducing the requirement, processing can be done in the
mobile devices. According to Saini and Sharma (2014) when any user of mobile device sends
the request, the service provider of cloud redirects the files to coprocessor that computes the
The security issues related to MCC are divided into:
Application security
Data security
Application Security
The application security collaborates with the security and protection of the mobile
application that uses the resources of cloud for providing better services in the environment of
MCC. The top and down spatial technique of clocking with or without the optimization was
suggested by Thomas et al. (2018). This uses the resources of cloud for providing more efficient,
scalable and better preservation of privacy for the location based services. Then the spatial
clocking without the optimization requires the communication with cloud server for getting the
user in various grid cells. These communication process overheads called and delay the spatial
clocking with the optimization. The cloud server takes the responsibility for sharing and
maintaining the historical information of every cell during the initiation. The processing and the
maintenance of the historical information inflict the extra burden on cloud while comparing to
the other techniques.
Security of Data
Data security works with the protection and security of the built-in mobile user file, and
is then controlled on the remote server or smart device. The user's confidentiality file is stored in
smart devices or in cloud server. This offloads the verification of the integrity of the tasks to the
TTP and service provider. In this way reducing the requirement, processing can be done in the
mobile devices. According to Saini and Sharma (2014) when any user of mobile device sends
the request, the service provider of cloud redirects the files to coprocessor that computes the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

19SECURITY IN MCC
increasing MAC for the verification of integrity. The coprocessor that is trusted is installed in
cloud by TTP to maintain the integrity of the mobile user’s file or data. The coprocessor will not
have any issue in managing the multiple mobile users however of the mobile user maximizes; the
coprocessor’s performance will degrade.
2.4 Security Issues in Mobile Cloud Computing
As per Patil and Deshmukh (2018), mobile devices have some shortage in processing,
calculation or memory capacity. Solutions are exhibited by MCC for this type of poverty. Huge
quantity of data as well as complicated solutions is implemented within MCC, so the mobile
devices could perform much lesser calculations. The load balance could be intelligently done so
that life of battery could be sustainable. If MCC is a self-service depending on demand, hence
data’s sharing is efficient. Cloud computing is connected through mobile network. Hence, for
transmitting data within reliable networks, the mobile networks are essential. However, MCC’s
three components should face this type of issues of security. Three aspects are there which
should be considered related to privacy and security of MCC. These three aspects include mobile
device, mobile network ad cloud computing.
According to the authors Pranav and Rizvi (2016), there are serious problems of security
within mobile devices as for few characteristics of these. Operating systems of these are quite
open. Internet access is available for them through wireless communication disregarding place
and time. They facilitate also in installing other software. As for these three characteristics, the
mobile devices are not secured enough. Operating system, vulnerable software and malware are
major concerns that give opportunities for the security issues. Some malware are there that are
running over the mobile devices without having user permissions. These malware could be
increasing MAC for the verification of integrity. The coprocessor that is trusted is installed in
cloud by TTP to maintain the integrity of the mobile user’s file or data. The coprocessor will not
have any issue in managing the multiple mobile users however of the mobile user maximizes; the
coprocessor’s performance will degrade.
2.4 Security Issues in Mobile Cloud Computing
As per Patil and Deshmukh (2018), mobile devices have some shortage in processing,
calculation or memory capacity. Solutions are exhibited by MCC for this type of poverty. Huge
quantity of data as well as complicated solutions is implemented within MCC, so the mobile
devices could perform much lesser calculations. The load balance could be intelligently done so
that life of battery could be sustainable. If MCC is a self-service depending on demand, hence
data’s sharing is efficient. Cloud computing is connected through mobile network. Hence, for
transmitting data within reliable networks, the mobile networks are essential. However, MCC’s
three components should face this type of issues of security. Three aspects are there which
should be considered related to privacy and security of MCC. These three aspects include mobile
device, mobile network ad cloud computing.
According to the authors Pranav and Rizvi (2016), there are serious problems of security
within mobile devices as for few characteristics of these. Operating systems of these are quite
open. Internet access is available for them through wireless communication disregarding place
and time. They facilitate also in installing other software. As for these three characteristics, the
mobile devices are not secured enough. Operating system, vulnerable software and malware are
major concerns that give opportunities for the security issues. Some malware are there that are
running over the mobile devices without having user permissions. These malware could be

20SECURITY IN MCC
downloaded as well as installed automatically. Hence, user’s sensitive data could be spread into
unnecessary hands. The malwares harm information privacy and economy of user.
Meng (2017) showed that application software’s vulnerability is other issue for MCC.
Management software is used nowadays by mobile users for managing mobile devices.
Maximum users synchronize files by using personal systems. File Transfer Protocol is used for
this process. Details of authentication are sent by network as well as positioned in configuration
file. These details of authentication could be used for accessing specific device from the
computers. The users’ damages are the unauthorized access, modification and deletion of
information of user without intervene of owner. OS is major software that gives platform for
running other software of third party as well as is much more complex. Hence, operating systems
have bugs when this is developed, hence the bugs are allowed to vandalize to the attackers.
According to You and Li (2016), physical connection is used by wire network for
ensuring consistency in bandwidth, transfer rate of data within environment of MCC is changing
as well as connection could be discontinuous for existing clearance within network overlay.
Other issues like application’s dynamic changing, users’ mobility and weather would lead in
changes in network overlay and bandwidth. Hence, handover delay within mobile network is
much higher when compared to wired network. Within environment of mobile cloud computing,
due to limited resources’ issue, few applications of data intensive and compute-intensive could
not deployed within mobile devices. They might consume huge energy resources. Hence, the
significant challenge of information security is presented as the result of mobile clients
'information is kept and handled at clouds which are situated at service providers ‘ends. The
information associated challenges incorporate data locality, data privacy, data recovery, data
downloaded as well as installed automatically. Hence, user’s sensitive data could be spread into
unnecessary hands. The malwares harm information privacy and economy of user.
Meng (2017) showed that application software’s vulnerability is other issue for MCC.
Management software is used nowadays by mobile users for managing mobile devices.
Maximum users synchronize files by using personal systems. File Transfer Protocol is used for
this process. Details of authentication are sent by network as well as positioned in configuration
file. These details of authentication could be used for accessing specific device from the
computers. The users’ damages are the unauthorized access, modification and deletion of
information of user without intervene of owner. OS is major software that gives platform for
running other software of third party as well as is much more complex. Hence, operating systems
have bugs when this is developed, hence the bugs are allowed to vandalize to the attackers.
According to You and Li (2016), physical connection is used by wire network for
ensuring consistency in bandwidth, transfer rate of data within environment of MCC is changing
as well as connection could be discontinuous for existing clearance within network overlay.
Other issues like application’s dynamic changing, users’ mobility and weather would lead in
changes in network overlay and bandwidth. Hence, handover delay within mobile network is
much higher when compared to wired network. Within environment of mobile cloud computing,
due to limited resources’ issue, few applications of data intensive and compute-intensive could
not deployed within mobile devices. They might consume huge energy resources. Hence, the
significant challenge of information security is presented as the result of mobile clients
'information is kept and handled at clouds which are situated at service providers ‘ends. The
information associated challenges incorporate data locality, data privacy, data recovery, data

21SECURITY IN MCC
loss, and data breach. The data breach and data loss break two security necessities:
confidentiality and integrity.
A part of strategy-driven security conventions is used in scalable cloud computing to
guarantee privacy, integrity, and honesty of data. Professional substances, the flexible and
interactive existence of the cloud, provide a powerful key management system for competitive
vitality. Assessment is carried out in terms of the application of energy and time of execution.
Most providers of mobile and essential user apps outsource their servers and shared assets in the
face of massive storage, easy access, and cloud adaptability. A secure device is used along those
lines, focusing on the position of data at flexible terminals. The mobile phone market has rapidly
expanded. The rise of mobility has profoundly incredibly changed our lives. About 80 percent of
population of whole world has mobile phone usage (Kulkarni, Khanai and Bindagi 2016).
According to Cisco IBSG, and new devices like Tablets, iPhones, Android smartphones, and
Palmtops have carried a host of apps to the palms of the hands of people. Safeguarding
data/application privacy and user secrecy from the opponent is important to building and
maintaining consumer confidence in the platform of mobile, particularly in MCC.
Many smartphone devices have nearly all the features of a windows desktop computer
that poses similar potential threats to mobile devices. Many mobile devices have nearly all the
features of a full desktop computer that poses the same potential threats for mobile devices. To
order to combat potential hazards, present mobile devices run software of threat detection over
mobile device (Elzamly et al. 2017). A probable answer would be to come up with a new
security model where recognition services could be transferred to the cloud. It protects the
memory and CPU of device resources substantially.
loss, and data breach. The data breach and data loss break two security necessities:
confidentiality and integrity.
A part of strategy-driven security conventions is used in scalable cloud computing to
guarantee privacy, integrity, and honesty of data. Professional substances, the flexible and
interactive existence of the cloud, provide a powerful key management system for competitive
vitality. Assessment is carried out in terms of the application of energy and time of execution.
Most providers of mobile and essential user apps outsource their servers and shared assets in the
face of massive storage, easy access, and cloud adaptability. A secure device is used along those
lines, focusing on the position of data at flexible terminals. The mobile phone market has rapidly
expanded. The rise of mobility has profoundly incredibly changed our lives. About 80 percent of
population of whole world has mobile phone usage (Kulkarni, Khanai and Bindagi 2016).
According to Cisco IBSG, and new devices like Tablets, iPhones, Android smartphones, and
Palmtops have carried a host of apps to the palms of the hands of people. Safeguarding
data/application privacy and user secrecy from the opponent is important to building and
maintaining consumer confidence in the platform of mobile, particularly in MCC.
Many smartphone devices have nearly all the features of a windows desktop computer
that poses similar potential threats to mobile devices. Many mobile devices have nearly all the
features of a full desktop computer that poses the same potential threats for mobile devices. To
order to combat potential hazards, present mobile devices run software of threat detection over
mobile device (Elzamly et al. 2017). A probable answer would be to come up with a new
security model where recognition services could be transferred to the cloud. It protects the
memory and CPU of device resources substantially.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

22SECURITY IN MCC
2.5 Solution
From all the security issues, the security is the prevalent issues during the transfer of data.
There are some possible solutions for the issues. The first solution can be the new security model
such as Cloud Intrusion Detection System Services and Intrusion Detection System, which can
be used for saving the memory and the CPU. The solution for the detection services have many
benefits such as:
Great detection process for the malicious code
Minimized consumption of the smart device resources
Minimized complexity of the smart devices
This can be the possible solution for achieving the security by imposing the encryption
mechanism, which can be taken while the data moves between the cloudlet, mobile and cloud
with the external application requirement. The encryption can be used for the securing the
decoding and dencoding that needs the use of browsers and JavaScript. For saving the resources
of mobile, the encryption can rely and can be implemented on cloud server. The solution gives
the best scalability and security features during sharing of data.
If any user is downloading the content with the malicious codes, the data and the account
of the cloud can be extracted and unfair accounting can occur.
Only the data that is verified needs to be downloaded and the mobile application with the
abnormal activities needs to be blocked.
Through the broadcasted SSID, the unauthorized used can obtain the access and the
information may be leaked.
Disabling the SSID broadcast and using the improved algorithm of key authentication.
2.5 Solution
From all the security issues, the security is the prevalent issues during the transfer of data.
There are some possible solutions for the issues. The first solution can be the new security model
such as Cloud Intrusion Detection System Services and Intrusion Detection System, which can
be used for saving the memory and the CPU. The solution for the detection services have many
benefits such as:
Great detection process for the malicious code
Minimized consumption of the smart device resources
Minimized complexity of the smart devices
This can be the possible solution for achieving the security by imposing the encryption
mechanism, which can be taken while the data moves between the cloudlet, mobile and cloud
with the external application requirement. The encryption can be used for the securing the
decoding and dencoding that needs the use of browsers and JavaScript. For saving the resources
of mobile, the encryption can rely and can be implemented on cloud server. The solution gives
the best scalability and security features during sharing of data.
If any user is downloading the content with the malicious codes, the data and the account
of the cloud can be extracted and unfair accounting can occur.
Only the data that is verified needs to be downloaded and the mobile application with the
abnormal activities needs to be blocked.
Through the broadcasted SSID, the unauthorized used can obtain the access and the
information may be leaked.
Disabling the SSID broadcast and using the improved algorithm of key authentication.

23SECURITY IN MCC

24SECURITY IN MCC
2.6 The Future of Cloud
In this article, the research technique offers a model which allows the unified and
transparent usage of resources of cloud to enlarge the capacity of the funds reserved. Mobile
Cloud Computing has altered how subscribers of mobile over the globe influence benefits in a
hurry. The mobile devices have advanced from simple devices that allowed voice gets back to
just a pair of ages to smart devices that will allow the client to get to value comprised services
whenever anyplace. MCC joins cloud computing into the condition of mobile and conquers
obstructions recognized with performance (for example, bandwidth, storage, battery life),
atmosphere (for example availability, scalability, heterogeneity), and security (for example
privacy and reliability).
The mobile devices are associated with the networks of mobile from grounded stations
that set up and regulate the organizations (air interface) and valuable interfaces between the
mobile devices and networks. Mobile clients' requests and information are communicated to the
main processors, which are linked with the servers providing mobile system management. Here,
services like AAA (Authentication, Accounting, Authentication, and Authorization) can be
provided to the users dependent on Home Agent (HA) and supporters' data prevention in
databases. The requests of subscribers are then communicated to a cloud from the Internet. Cloud
controllers are shown in the Cloud, procedure the requests to give the mobile clients the
associating cloud managements. These services are generated dependent on the ideas of
virtualization, service-oriented architecture, utility computing, and virtualization.
The facts of cloud computing will be diverse in various settings. The significant role of a
cloud computing framework is keeping information on the cloud and utilizing innovation on the
2.6 The Future of Cloud
In this article, the research technique offers a model which allows the unified and
transparent usage of resources of cloud to enlarge the capacity of the funds reserved. Mobile
Cloud Computing has altered how subscribers of mobile over the globe influence benefits in a
hurry. The mobile devices have advanced from simple devices that allowed voice gets back to
just a pair of ages to smart devices that will allow the client to get to value comprised services
whenever anyplace. MCC joins cloud computing into the condition of mobile and conquers
obstructions recognized with performance (for example, bandwidth, storage, battery life),
atmosphere (for example availability, scalability, heterogeneity), and security (for example
privacy and reliability).
The mobile devices are associated with the networks of mobile from grounded stations
that set up and regulate the organizations (air interface) and valuable interfaces between the
mobile devices and networks. Mobile clients' requests and information are communicated to the
main processors, which are linked with the servers providing mobile system management. Here,
services like AAA (Authentication, Accounting, Authentication, and Authorization) can be
provided to the users dependent on Home Agent (HA) and supporters' data prevention in
databases. The requests of subscribers are then communicated to a cloud from the Internet. Cloud
controllers are shown in the Cloud, procedure the requests to give the mobile clients the
associating cloud managements. These services are generated dependent on the ideas of
virtualization, service-oriented architecture, utility computing, and virtualization.
The facts of cloud computing will be diverse in various settings. The significant role of a
cloud computing framework is keeping information on the cloud and utilizing innovation on the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

25SECURITY IN MCC
customer to get to that information. A few writers referenced that Cloud Computing isn't a new
idea. The author has expressed in this article that Mobile Cloud Computing has shown itself as a
descendant of a few other computing zones, for example, distributed computing, virtualization,
Service-oriented Architecture, and acquires their limitations and advancements.
They presented Cloud Computing as another worldview as it introduced a better benefit
over the current under-used assets at the server hubs. A few plans of action quickly advanced to
outfit this innovation by giving computing infrastructure, programming platforms, hardware as
services data-storage, and software applications. The author also has presented the architecture of
market-oriented. They have presented Cloud as a type of parallel or distributed system
comprising of a team of virtualized and unified computers that provide computing assets from
service suppliers to clients meeting their settled SLA (Service Level Agreement)
As per Juárez and Cedillo (2017) describe that Cloud Computing has risen as a wonder
which speaks to the route by which services of IT and usefulness are charged for and conveyed.
In contrast to predictable mobile computing innovations, the assets in MCC are assigned and
virtualized out in a team of several distributed PCs in its place of servers or local PCs. Several
applications dependent on MCC, such as Google's Gmail, Voice Search, Navigation and Maps
system for mobile, and specific applications on an Android stage, Motoblur from Motorola,
LiveMesh from Microsoft, have been formed and helped to users.
2.7 Effectiveness in Business Organizations
The method of research in this article is mixed. It includes utilizing the qualitative
techniques in the presentation, analysis, and collection of the data. Usually, the diverse research
methodology is very useful in proving the supportive data and explanations on the MCC’s
customer to get to that information. A few writers referenced that Cloud Computing isn't a new
idea. The author has expressed in this article that Mobile Cloud Computing has shown itself as a
descendant of a few other computing zones, for example, distributed computing, virtualization,
Service-oriented Architecture, and acquires their limitations and advancements.
They presented Cloud Computing as another worldview as it introduced a better benefit
over the current under-used assets at the server hubs. A few plans of action quickly advanced to
outfit this innovation by giving computing infrastructure, programming platforms, hardware as
services data-storage, and software applications. The author also has presented the architecture of
market-oriented. They have presented Cloud as a type of parallel or distributed system
comprising of a team of virtualized and unified computers that provide computing assets from
service suppliers to clients meeting their settled SLA (Service Level Agreement)
As per Juárez and Cedillo (2017) describe that Cloud Computing has risen as a wonder
which speaks to the route by which services of IT and usefulness are charged for and conveyed.
In contrast to predictable mobile computing innovations, the assets in MCC are assigned and
virtualized out in a team of several distributed PCs in its place of servers or local PCs. Several
applications dependent on MCC, such as Google's Gmail, Voice Search, Navigation and Maps
system for mobile, and specific applications on an Android stage, Motoblur from Motorola,
LiveMesh from Microsoft, have been formed and helped to users.
2.7 Effectiveness in Business Organizations
The method of research in this article is mixed. It includes utilizing the qualitative
techniques in the presentation, analysis, and collection of the data. Usually, the diverse research
methodology is very useful in proving the supportive data and explanations on the MCC’s

26SECURITY IN MCC
applications in the enhancement of the several processes of a business. The mobile cloud
computing in the environment of business as it purposes at enhancing the performance. It
provides efficiency in the administration of the vast data resources of the company as the
infrastructure of data processing is given by the service providers of the competent cloud. The
MCC determines innovation as it allows the companies to grow and execute new thoughts,
which are critical in the expansion of high-quality products and services that accomplish the
requirements and the potentials of the consumers.
As per Ibtihal and Hassan (2020), Business exercises are progressively powerful when
they are achieved, utilizing the platform of MCC. The 4G and the 3G Mobile service suppliers
guarantee that there is a compelling Internet association with encouraging the transactions of a
remote business. The online business guarantees on-demand administrations and, accordingly,
the interests and wants of the clients are accomplished right away. For instance, a client can
distinguish the accessible services and products after getting to the client's entry on the website
of the business. Several activities of a business are encouraged by the MCC framework. For
instance, the electronic money move services work through the protected and private cloud
foundation.
Additionally, the process of online ticketing is encouraged by the systems of MCC. Some
algorithms promote the efficiency of the methods of the business. For instance, the suggested
algorithm uses the numerical investigation of the past client transactions to monitor the devotion
heights. There are a few mobile business benefits that use the applications of cloud computing.
Charging services happen from the platform of cloud computing. The payments through mobile
are bonafide, and they are done in a safe framework that secures the client's information. In this
way, users and businesses clients accomplish different installment transactions from the platform
applications in the enhancement of the several processes of a business. The mobile cloud
computing in the environment of business as it purposes at enhancing the performance. It
provides efficiency in the administration of the vast data resources of the company as the
infrastructure of data processing is given by the service providers of the competent cloud. The
MCC determines innovation as it allows the companies to grow and execute new thoughts,
which are critical in the expansion of high-quality products and services that accomplish the
requirements and the potentials of the consumers.
As per Ibtihal and Hassan (2020), Business exercises are progressively powerful when
they are achieved, utilizing the platform of MCC. The 4G and the 3G Mobile service suppliers
guarantee that there is a compelling Internet association with encouraging the transactions of a
remote business. The online business guarantees on-demand administrations and, accordingly,
the interests and wants of the clients are accomplished right away. For instance, a client can
distinguish the accessible services and products after getting to the client's entry on the website
of the business. Several activities of a business are encouraged by the MCC framework. For
instance, the electronic money move services work through the protected and private cloud
foundation.
Additionally, the process of online ticketing is encouraged by the systems of MCC. Some
algorithms promote the efficiency of the methods of the business. For instance, the suggested
algorithm uses the numerical investigation of the past client transactions to monitor the devotion
heights. There are a few mobile business benefits that use the applications of cloud computing.
Charging services happen from the platform of cloud computing. The payments through mobile
are bonafide, and they are done in a safe framework that secures the client's information. In this
way, users and businesses clients accomplish different installment transactions from the platform

27SECURITY IN MCC
of the cloud. Online shopping is a web-based business action which happens successfully from
the cloud stage
3. Methodology
3.1 Introduction to Methodology:
Methodology is the chapter which helps a reader to understand the methods which are
followed to carry this research. This method outline for the research methodology is mainly used
for gathering essential information regarding the research topic that has been chosen which in
this case is the Mobile Cloud Computing Security. The study helps in analysis of the security
process that is undertaken by the mobile cloud computing services in order to protect the mobile
computing data of a system or an organization (Ledford and Gast 2018). Not only that the issues
faced by an individual or an organization for using mobile cloud computing services are
discussed in research paper as well.
3.2 Research Philosophy:
The process of gaining deeper knowledge in the area of the research is known as the
research philosophy. Process of assumptions obtained during the research is identified by using
the research philosophy. The research philosophy is of three types and they are positivism,
interpretivism, and lastly the realism (Kumar 2019). The positivism is the usage of logical ideas
in the research work. The unknown facts regarding the research topic is analyzed with the help of
this research philosophy technique. Interpretive reproach philosophy is a research based on the
theories. This is mainly used for the analysis of the complex social structures that can affect the
research. The final research philosophy or the realism discusses the human interaction with the
contemporary social world in order to link the topic that has been chosen.
of the cloud. Online shopping is a web-based business action which happens successfully from
the cloud stage
3. Methodology
3.1 Introduction to Methodology:
Methodology is the chapter which helps a reader to understand the methods which are
followed to carry this research. This method outline for the research methodology is mainly used
for gathering essential information regarding the research topic that has been chosen which in
this case is the Mobile Cloud Computing Security. The study helps in analysis of the security
process that is undertaken by the mobile cloud computing services in order to protect the mobile
computing data of a system or an organization (Ledford and Gast 2018). Not only that the issues
faced by an individual or an organization for using mobile cloud computing services are
discussed in research paper as well.
3.2 Research Philosophy:
The process of gaining deeper knowledge in the area of the research is known as the
research philosophy. Process of assumptions obtained during the research is identified by using
the research philosophy. The research philosophy is of three types and they are positivism,
interpretivism, and lastly the realism (Kumar 2019). The positivism is the usage of logical ideas
in the research work. The unknown facts regarding the research topic is analyzed with the help of
this research philosophy technique. Interpretive reproach philosophy is a research based on the
theories. This is mainly used for the analysis of the complex social structures that can affect the
research. The final research philosophy or the realism discusses the human interaction with the
contemporary social world in order to link the topic that has been chosen.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

28SECURITY IN MCC
For this research’s purpose, we have chosen positivism. This research philosophy helps in
developing an understanding regarding Mobile Cloud Computing Security by unveiling some of
the hidden facts regarding it. The chosen philosophy for performing the research makes usage of
the existing theories for completing research. In this research philosophy the role of the
researcher is to gather appropriate information regarding the research topic that has been selected
for the study.
3.3 Research Design:
Three kinds of research techniques are there and they are exploratory, explanatory and
descriptive. The Exploratory research design is used for acknowledging the ideas of various
types along with different thoughts which are the major requirements for the completion of the
research. The explanatory research design is used for summarization of the events which have
occurred while performing the research work. These individual occurrences may have significant
impact on the research outcome for the topic that is chosen for the research. For this research’s
purpose we have considered the descriptive research design. The descriptive research design is
mainly aimed at gathering apposite details regarding the topic of discussions for identification of
the events in the research. The detailed descriptions of the different aspect of the research topic,
like, mobile computing security, security issues, importance of cloud and many more significant
information regarding the Mobile Cloud Computing Issues are done in the research. The selected
research design helps in in-depth analysis of the research topic.
3.4 Method for collecting the data for the research:
This is the part of the research which explains various approaches with which the data
had been gathered for the research. The useful and relevant information regarding the selected
topic is gathered with help of data collection method of the research methodology (Quinlan et al.
For this research’s purpose, we have chosen positivism. This research philosophy helps in
developing an understanding regarding Mobile Cloud Computing Security by unveiling some of
the hidden facts regarding it. The chosen philosophy for performing the research makes usage of
the existing theories for completing research. In this research philosophy the role of the
researcher is to gather appropriate information regarding the research topic that has been selected
for the study.
3.3 Research Design:
Three kinds of research techniques are there and they are exploratory, explanatory and
descriptive. The Exploratory research design is used for acknowledging the ideas of various
types along with different thoughts which are the major requirements for the completion of the
research. The explanatory research design is used for summarization of the events which have
occurred while performing the research work. These individual occurrences may have significant
impact on the research outcome for the topic that is chosen for the research. For this research’s
purpose we have considered the descriptive research design. The descriptive research design is
mainly aimed at gathering apposite details regarding the topic of discussions for identification of
the events in the research. The detailed descriptions of the different aspect of the research topic,
like, mobile computing security, security issues, importance of cloud and many more significant
information regarding the Mobile Cloud Computing Issues are done in the research. The selected
research design helps in in-depth analysis of the research topic.
3.4 Method for collecting the data for the research:
This is the part of the research which explains various approaches with which the data
had been gathered for the research. The useful and relevant information regarding the selected
topic is gathered with help of data collection method of the research methodology (Quinlan et al.

29SECURITY IN MCC
2019). The method is used to lessen the errors occurring in the research due to the participants of
the research. For the collection of the data aim the research there are two sources and they are the
data’s primary sources and the secondary source of data. For the purpose of this research, the
primary as well as secondary sources of data are used. The primary sources of data are gathered
form the experts in the field of the research. The secondary sources of data are more in number
are mostly collected from the articles, books and journals by authors who have achieved
expertise in this field of work. The internet sources are used as well, which can also be included
as the part of the secondary research source of information (Cardano 2020).
Apart from this there are certain techniques that has to be followed while conducting a
research. This includes the qualitative and quantitative techniques of the analysis of the data. The
quantitative analysis technique for analysis of data is used for the purpose of analyzing numerical
data. A sample size has to be determined for the purpose of data collection using this technique.
Regression method is utilized for the analysis of the information or the data which is gathered
with the help of this data collection method with primary data as the source of the information
(Silverman 2016). The Qualitative approach on the other hand is the non-numerical way of
obtaining data. The majority of the data gathered with the usage of this technology is obtained
from readings, discussions, case studies and in many cases the data’s secondary sources is used
as well for the collection of data using the qualitative techniques (Creswell and Poth 2016).
Data analysis is finished utilizing the qualitative methodology. Qualitative analysis shows
hypothetical help. For example, business associations must hold onto MCC as it limits the
expense of operations. The support is sure as the adoption of online business isn't capital
worsened when contrasted with the improvement of physical foundation in various nations
(Yates and Leggett 2016). For example, the model is a proportion of fundamental propensity that
2019). The method is used to lessen the errors occurring in the research due to the participants of
the research. For the collection of the data aim the research there are two sources and they are the
data’s primary sources and the secondary source of data. For the purpose of this research, the
primary as well as secondary sources of data are used. The primary sources of data are gathered
form the experts in the field of the research. The secondary sources of data are more in number
are mostly collected from the articles, books and journals by authors who have achieved
expertise in this field of work. The internet sources are used as well, which can also be included
as the part of the secondary research source of information (Cardano 2020).
Apart from this there are certain techniques that has to be followed while conducting a
research. This includes the qualitative and quantitative techniques of the analysis of the data. The
quantitative analysis technique for analysis of data is used for the purpose of analyzing numerical
data. A sample size has to be determined for the purpose of data collection using this technique.
Regression method is utilized for the analysis of the information or the data which is gathered
with the help of this data collection method with primary data as the source of the information
(Silverman 2016). The Qualitative approach on the other hand is the non-numerical way of
obtaining data. The majority of the data gathered with the usage of this technology is obtained
from readings, discussions, case studies and in many cases the data’s secondary sources is used
as well for the collection of data using the qualitative techniques (Creswell and Poth 2016).
Data analysis is finished utilizing the qualitative methodology. Qualitative analysis shows
hypothetical help. For example, business associations must hold onto MCC as it limits the
expense of operations. The support is sure as the adoption of online business isn't capital
worsened when contrasted with the improvement of physical foundation in various nations
(Yates and Leggett 2016). For example, the model is a proportion of fundamental propensity that

30SECURITY IN MCC
decides the business or commercial segment that has the highest number of organizations that
utilization the MCC stage to drive productivity and innovation. In the discussion, it is the ICT
business that has the most crucial number of organizations that actualize the MCC services
(Schweitzer et al. 2020).
For this research’s purpose we have considered the primary and secondary sources of
information and have performed a qualitative research on the topic, Mobile Cloud Computing
Security. The qualitative data collection method makes use of naturalistic inquiry for the purpose
of the research and is much less complicated than the Quantitative approach of data collection,
which involves questioning and surveys (Yan 2020).
3.5 Research Ethics:
There is a specific code of conduct that is followed by all the researchers in order to
maintain a strict research ethics. All the secondary as well as primary sources of data that has
been gathered for the research’s purpose is referenced. No commercial application is performed
in order to conduct and complete the research work (Dannels 2018). While collection of the data
from the primary sources of information, maintaining the anonymity of the participants is one of
the most import code that has to be kept in mind. Maintaining the confidentiality of an individual
is important. Before publishing an article or research paper, the research person should endeavor
all the possibilities of maintaining anonymity.
3.6 Research Limitations:
For conducting a research one may face numerous difficulties. Limitations are very
common while conducting a research in any field of technology or education. The main issue of
conducting the research is time. Research is always time consuming thus more time is always
decides the business or commercial segment that has the highest number of organizations that
utilization the MCC stage to drive productivity and innovation. In the discussion, it is the ICT
business that has the most crucial number of organizations that actualize the MCC services
(Schweitzer et al. 2020).
For this research’s purpose we have considered the primary and secondary sources of
information and have performed a qualitative research on the topic, Mobile Cloud Computing
Security. The qualitative data collection method makes use of naturalistic inquiry for the purpose
of the research and is much less complicated than the Quantitative approach of data collection,
which involves questioning and surveys (Yan 2020).
3.5 Research Ethics:
There is a specific code of conduct that is followed by all the researchers in order to
maintain a strict research ethics. All the secondary as well as primary sources of data that has
been gathered for the research’s purpose is referenced. No commercial application is performed
in order to conduct and complete the research work (Dannels 2018). While collection of the data
from the primary sources of information, maintaining the anonymity of the participants is one of
the most import code that has to be kept in mind. Maintaining the confidentiality of an individual
is important. Before publishing an article or research paper, the research person should endeavor
all the possibilities of maintaining anonymity.
3.6 Research Limitations:
For conducting a research one may face numerous difficulties. Limitations are very
common while conducting a research in any field of technology or education. The main issue of
conducting the research is time. Research is always time consuming thus more time is always
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

31SECURITY IN MCC
required in order to reach a successful and satisfactory conclusion for the research. The
Secondary sources of the data that are gathered from the internet are not always reliable
(Lindholst et al. 2020). The information available on the online resources can be manipulated,
modified or even destroyed. Thus while conducting the research validity of the information is
one of the main limitations. Budget is another most significant limitation of all time. Thus one
has to be prepared for all the possible limitations of the research while conducting the research
(Stratford and Bradshaw 2016).
There are dangers to the approval of MCC in the business area. The principal danger is
information security. Numerous organizations have worries that malicious programs or
unauthorized people may get to or destroy the information that they store in the cloud
framework. Therefore, these organizations spend unique financial related assets in building up a
physical reinforcement framework for every electronic data. The human asset budget is high as
the organization must higher capable information security specialists and frameworks
administrators to guarantee that every electronic information is secure. Similarly, there are legal
difficulties related to the adoption of the MCC framework. For example, Uber has been
prohibited from working in a few nations like China and Germany because of the lacking legal
system to direct its operations and produce incomes for the administration.
4. Future Research
Mobile cloud computing is expected to be on-demand over the next ten years. While
the use of MCC-based services and smartphones grows, user data should be protected in
particular in the public cloud, when data becomes insecure in large public infrastructures.
The technology is still in its early stages, so a key concern to tackle is the question of
required in order to reach a successful and satisfactory conclusion for the research. The
Secondary sources of the data that are gathered from the internet are not always reliable
(Lindholst et al. 2020). The information available on the online resources can be manipulated,
modified or even destroyed. Thus while conducting the research validity of the information is
one of the main limitations. Budget is another most significant limitation of all time. Thus one
has to be prepared for all the possible limitations of the research while conducting the research
(Stratford and Bradshaw 2016).
There are dangers to the approval of MCC in the business area. The principal danger is
information security. Numerous organizations have worries that malicious programs or
unauthorized people may get to or destroy the information that they store in the cloud
framework. Therefore, these organizations spend unique financial related assets in building up a
physical reinforcement framework for every electronic data. The human asset budget is high as
the organization must higher capable information security specialists and frameworks
administrators to guarantee that every electronic information is secure. Similarly, there are legal
difficulties related to the adoption of the MCC framework. For example, Uber has been
prohibited from working in a few nations like China and Germany because of the lacking legal
system to direct its operations and produce incomes for the administration.
4. Future Research
Mobile cloud computing is expected to be on-demand over the next ten years. While
the use of MCC-based services and smartphones grows, user data should be protected in
particular in the public cloud, when data becomes insecure in large public infrastructures.
The technology is still in its early stages, so a key concern to tackle is the question of

32SECURITY IN MCC
security. Using smartphones in the present day, PDAs are available to all kinds of people,
varying from a small child to the elderly. It's possible because mobile devices of high quality
are accessible at low prices because of accessibility. Several researchers focus on the
development of different security algorithms to safeguard user data in the Mobile Cloud
Computing atmosphere. So, there has been widespread scope for developing such a security
system in the future that can match MCC. Mobile Cloud Computing is capable of replacing
the desktop-based system as well as replacing the PC or Laptop with a smartphone.
5. Conclusion
The concept of the mobile cloud computing originates from some network diagram. It
describes the internet as a cloud. The major reasons for the adopting this technology is
that it helps to improve the knowledge of the technology for conducting the path for
future research. It gives several advantages to a company and individual consumers as
well as service provider. It is kind of computing technology which helps the consumer
that utilizes the huge computational power. There are still a huge amount of doubts
regarding the security guarantees of the mobile cloud computing. The services are offered
by any cloud computing models are entirely related to the mobility. With the help of this
research, the qualities as well as security of the mobile cloud services are improved with
the help of networks for an optimal user. This research helps to provide efficient
management of the mobile cloud infrastructures as well as for the providing the company
a new business model. It helps the company to provide a huge amount of improvement
for medium and small size companies. This research is used to give the technological
possibilities which are similar for the large companies. In this research, many initiatives
are elaborated. With the help of this research, a service provider can implement Cloud
security. Using smartphones in the present day, PDAs are available to all kinds of people,
varying from a small child to the elderly. It's possible because mobile devices of high quality
are accessible at low prices because of accessibility. Several researchers focus on the
development of different security algorithms to safeguard user data in the Mobile Cloud
Computing atmosphere. So, there has been widespread scope for developing such a security
system in the future that can match MCC. Mobile Cloud Computing is capable of replacing
the desktop-based system as well as replacing the PC or Laptop with a smartphone.
5. Conclusion
The concept of the mobile cloud computing originates from some network diagram. It
describes the internet as a cloud. The major reasons for the adopting this technology is
that it helps to improve the knowledge of the technology for conducting the path for
future research. It gives several advantages to a company and individual consumers as
well as service provider. It is kind of computing technology which helps the consumer
that utilizes the huge computational power. There are still a huge amount of doubts
regarding the security guarantees of the mobile cloud computing. The services are offered
by any cloud computing models are entirely related to the mobility. With the help of this
research, the qualities as well as security of the mobile cloud services are improved with
the help of networks for an optimal user. This research helps to provide efficient
management of the mobile cloud infrastructures as well as for the providing the company
a new business model. It helps the company to provide a huge amount of improvement
for medium and small size companies. This research is used to give the technological
possibilities which are similar for the large companies. In this research, many initiatives
are elaborated. With the help of this research, a service provider can implement Cloud

33SECURITY IN MCC
Security Alliances for the detection of the several security issues for providing the latest
cloud computing services. It helps to define various standards of the security of mobile
cloud computing. This research helps the service as well as platform provider for giving
the user privacy as well as proper management of the available data. In case of mobile
cloud computing, mobility is an important factor in which mobile gadgets are getting
huge importance. With the help of this research, it controls the user access. These are
very specific to the current scenario.
Security Alliances for the detection of the several security issues for providing the latest
cloud computing services. It helps to define various standards of the security of mobile
cloud computing. This research helps the service as well as platform provider for giving
the user privacy as well as proper management of the available data. In case of mobile
cloud computing, mobility is an important factor in which mobile gadgets are getting
huge importance. With the help of this research, it controls the user access. These are
very specific to the current scenario.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

34SECURITY IN MCC
References
Abuarqoub, A., 2020. D-FAP: Dual-Factor Authentication Protocol for Mobile Cloud Connected
Devices. Journal of Sensor and Actuator Networks, 9(1), p.1.
Alizadeh, M., Abolfazli, S., Zamani, M., Baharun, S. and Sakurai, K., 2016. Authentication in
mobile cloud computing: A survey. Journal of Network and Computer Applications, 61, pp.59-
80.
Bakhshi, Z. and Rodriguez-Navas, G., 2020. A preliminary roadmap for dependability research
in fog computing. ACM SIGBED Review, 16(4), pp.14-19.
Bhattacharya, P., Tanwar, S., Shah, R. and Ladha, A., 2020. Mobile Edge Computing-Enabled
Blockchain Framework—A Survey. In Proceedings of ICRIC 2019 (pp. 797-809). Springer,
Cham.
Cardano, M., 2020. Defending Qualitative Research: Design, Analysis and Textualization.
Routledge.
Creswell, J.W. and Poth, C.N., 2016. Qualitative inquiry and research design: Choosing among
five approaches. Sage publications.
Dannels, S.A., 2018. Research design. In The reviewer’s guide to quantitative methods in the
social sciences (pp. 402-416). Routledge.
Elzamly, A., Hussin, B., Abu-Naser, S.S., Shibutani, T. and Doheir, M., 2017. Predicting critical
cloud computing security issues using Artificial Neural Network (ANNs) algorithms in banking
organizations.
References
Abuarqoub, A., 2020. D-FAP: Dual-Factor Authentication Protocol for Mobile Cloud Connected
Devices. Journal of Sensor and Actuator Networks, 9(1), p.1.
Alizadeh, M., Abolfazli, S., Zamani, M., Baharun, S. and Sakurai, K., 2016. Authentication in
mobile cloud computing: A survey. Journal of Network and Computer Applications, 61, pp.59-
80.
Bakhshi, Z. and Rodriguez-Navas, G., 2020. A preliminary roadmap for dependability research
in fog computing. ACM SIGBED Review, 16(4), pp.14-19.
Bhattacharya, P., Tanwar, S., Shah, R. and Ladha, A., 2020. Mobile Edge Computing-Enabled
Blockchain Framework—A Survey. In Proceedings of ICRIC 2019 (pp. 797-809). Springer,
Cham.
Cardano, M., 2020. Defending Qualitative Research: Design, Analysis and Textualization.
Routledge.
Creswell, J.W. and Poth, C.N., 2016. Qualitative inquiry and research design: Choosing among
five approaches. Sage publications.
Dannels, S.A., 2018. Research design. In The reviewer’s guide to quantitative methods in the
social sciences (pp. 402-416). Routledge.
Elzamly, A., Hussin, B., Abu-Naser, S.S., Shibutani, T. and Doheir, M., 2017. Predicting critical
cloud computing security issues using Artificial Neural Network (ANNs) algorithms in banking
organizations.

35SECURITY IN MCC
He, D., Kumar, N., Khan, M.K., Wang, L. and Shen, J., 2016. Efficient privacy-aware
authentication scheme for mobile cloud computing services. IEEE Systems Journal, 12(2),
pp.1621-1631.
Ibtihal, M. and Hassan, N., 2020. Homomorphic encryption as a service for outsourced images in
mobile cloud computing environment. In Cryptography: Breakthroughs in Research and
Practice (pp. 316-330). IGI Global.
Jeong, H. and Choi, E., 2012. User Authentication using Profiling in Mobile Cloud Computing.
AASRI Procedia, Volume 2, pp. 262-267.
Jothy, K.A., Sivakumar, K. and Delsey, M.J., 2018. Distributed System Framework for Mobile
Cloud Computing. Bonfring International Journal of Research in Communication
Engineering, 8(1), pp.05-09.
Juárez, D.X.J. and Cedillo, P., 2017, October. Security of mobile cloud computing: A systematic
mapping study. In 2017 IEEE Second Ecuador Technical Chapters Meeting (ETCM) (pp. 1-6).
IEEE.
Kandavel, N. and Kumaravel, A., 2019. A Novel Royal Seal Cloudlet for Security Enhancement
in Mobile Cloud Computing. International Journal of Computer Science and Information
Security (IJCSIS), 17(1).
Kocabas, O. and Soyata, T., 2020. Towards privacy-preserving medical cloud computing using
homomorphic encryption. In Virtual and Mobile Healthcare: Breakthroughs in Research and
Practice (pp. 93-125). IGI Global.
He, D., Kumar, N., Khan, M.K., Wang, L. and Shen, J., 2016. Efficient privacy-aware
authentication scheme for mobile cloud computing services. IEEE Systems Journal, 12(2),
pp.1621-1631.
Ibtihal, M. and Hassan, N., 2020. Homomorphic encryption as a service for outsourced images in
mobile cloud computing environment. In Cryptography: Breakthroughs in Research and
Practice (pp. 316-330). IGI Global.
Jeong, H. and Choi, E., 2012. User Authentication using Profiling in Mobile Cloud Computing.
AASRI Procedia, Volume 2, pp. 262-267.
Jothy, K.A., Sivakumar, K. and Delsey, M.J., 2018. Distributed System Framework for Mobile
Cloud Computing. Bonfring International Journal of Research in Communication
Engineering, 8(1), pp.05-09.
Juárez, D.X.J. and Cedillo, P., 2017, October. Security of mobile cloud computing: A systematic
mapping study. In 2017 IEEE Second Ecuador Technical Chapters Meeting (ETCM) (pp. 1-6).
IEEE.
Kandavel, N. and Kumaravel, A., 2019. A Novel Royal Seal Cloudlet for Security Enhancement
in Mobile Cloud Computing. International Journal of Computer Science and Information
Security (IJCSIS), 17(1).
Kocabas, O. and Soyata, T., 2020. Towards privacy-preserving medical cloud computing using
homomorphic encryption. In Virtual and Mobile Healthcare: Breakthroughs in Research and
Practice (pp. 93-125). IGI Global.

36SECURITY IN MCC
Kulkarni, P., Khanai, R. and Bindagi, G., 2016, March. Security frameworks for mobile cloud
computing: A survey. In 2016 International Conference on Electrical, Electronics, and
Optimization Techniques (ICEEOT) (pp. 2507-2511). IEEE.
Kumar, R., 2019. Research methodology: A step-by-step guide for beginners. Sage Publications
Limited.
Kumar, R., 2020. Study on Various Issues Related To Mobile Cloud Computing (MCC). Our
Heritage, 68(1), pp.7641-7647.
Labati, R.D., Genovese, A., Piuri, V., Scotti, F. and Vishwakarma, S., 2020. Computational
Intelligence in Cloud Computing. In Recent Advances in Intelligent Engineering (pp. 111-127).
Springer, Cham.
Lah, U. and Lewis, J.R., 2015. How expertise affects a digital-rights-management-sharing
application's usability. IEEE Software, 33(3), pp.76-82.
Ledford, J.R. and Gast, D.L., 2018. Single case research methodology: Applications in special
education and behavioral sciences. Routledge.
Li, Z. and Zhu, Q., 2020. Genetic Algorithm-Based Optimization of Offloading and Resource
Allocation in Mobile-Edge Computing. Information, 11(2), p.83.
Liang, X., Zhang, K., Shen, X. and Lin, X., 2014. Security and privacy in mobile social
networks: challenges and solutions. IEEE Wireless Communications, 21(1), pp.33-41.
Lindholst, A.C., Hansen, M.B., Bretzer, Y.N., Dempsey, N. and Leiren, M.D., 2020. Research
Design, Materials and Methods. In Marketization in Local Government (pp. 61-78). Palgrave
Macmillan, Cham.
Kulkarni, P., Khanai, R. and Bindagi, G., 2016, March. Security frameworks for mobile cloud
computing: A survey. In 2016 International Conference on Electrical, Electronics, and
Optimization Techniques (ICEEOT) (pp. 2507-2511). IEEE.
Kumar, R., 2019. Research methodology: A step-by-step guide for beginners. Sage Publications
Limited.
Kumar, R., 2020. Study on Various Issues Related To Mobile Cloud Computing (MCC). Our
Heritage, 68(1), pp.7641-7647.
Labati, R.D., Genovese, A., Piuri, V., Scotti, F. and Vishwakarma, S., 2020. Computational
Intelligence in Cloud Computing. In Recent Advances in Intelligent Engineering (pp. 111-127).
Springer, Cham.
Lah, U. and Lewis, J.R., 2015. How expertise affects a digital-rights-management-sharing
application's usability. IEEE Software, 33(3), pp.76-82.
Ledford, J.R. and Gast, D.L., 2018. Single case research methodology: Applications in special
education and behavioral sciences. Routledge.
Li, Z. and Zhu, Q., 2020. Genetic Algorithm-Based Optimization of Offloading and Resource
Allocation in Mobile-Edge Computing. Information, 11(2), p.83.
Liang, X., Zhang, K., Shen, X. and Lin, X., 2014. Security and privacy in mobile social
networks: challenges and solutions. IEEE Wireless Communications, 21(1), pp.33-41.
Lindholst, A.C., Hansen, M.B., Bretzer, Y.N., Dempsey, N. and Leiren, M.D., 2020. Research
Design, Materials and Methods. In Marketization in Local Government (pp. 61-78). Palgrave
Macmillan, Cham.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

37SECURITY IN MCC
Lomotey, R.K. and Deters, R., 2014, June. Architectural designs from mobile cloud computing
to ubiquitous cloud computing-survey. In 2014 IEEE World Congress on Services (pp. 418-425).
IEEE.
Mahmood, K., Chaudhry, S.A., Naqvi, H., Kumari, S., Li, X. and Sangaiah, A.K., 2018. An
elliptic curve cryptography based lightweight authentication scheme for smart grid
communication. Future Generation Computer Systems, 81, pp.557-565.
Mahmud, R., Srirama, S.N., Ramamohanarao, K. and Buyya, R., 2020. Profit-aware application
placement for integrated Fog–Cloud computing environments. Journal of Parallel and
Distributed Computing, 135, pp.177-190.
Martínez-Pérez, B., De La Torre-Díez, I. and López-Coronado, M., 2015. Privacy and security in
mobile health apps: a review and recommendations. Journal of medical systems, 39(1), p.181.
Meng, T., 2017. Security and Performance Tradeoff Analysis of Offloading Policies in Mobile
Cloud Computing (Doctoral dissertation).
Mollah, M.B., Azad, M.A.K. and Vasilakos, A., 2017. Security and privacy challenges in mobile
cloud computing: Survey and way ahead. Journal of Network and Computer Applications, 84,
pp.38-54.
Neware, R., Ulabhaje, K., Karemore, G., Lokhande, H. and Dandige, V., 2020. Survey on
Security Issues in Mobile Cloud Computing and Preventive Measures. In Smart Computing
Paradigms: New Progresses and Challenges (pp. 89-100). Springer, Singapore.
Lomotey, R.K. and Deters, R., 2014, June. Architectural designs from mobile cloud computing
to ubiquitous cloud computing-survey. In 2014 IEEE World Congress on Services (pp. 418-425).
IEEE.
Mahmood, K., Chaudhry, S.A., Naqvi, H., Kumari, S., Li, X. and Sangaiah, A.K., 2018. An
elliptic curve cryptography based lightweight authentication scheme for smart grid
communication. Future Generation Computer Systems, 81, pp.557-565.
Mahmud, R., Srirama, S.N., Ramamohanarao, K. and Buyya, R., 2020. Profit-aware application
placement for integrated Fog–Cloud computing environments. Journal of Parallel and
Distributed Computing, 135, pp.177-190.
Martínez-Pérez, B., De La Torre-Díez, I. and López-Coronado, M., 2015. Privacy and security in
mobile health apps: a review and recommendations. Journal of medical systems, 39(1), p.181.
Meng, T., 2017. Security and Performance Tradeoff Analysis of Offloading Policies in Mobile
Cloud Computing (Doctoral dissertation).
Mollah, M.B., Azad, M.A.K. and Vasilakos, A., 2017. Security and privacy challenges in mobile
cloud computing: Survey and way ahead. Journal of Network and Computer Applications, 84,
pp.38-54.
Neware, R., Ulabhaje, K., Karemore, G., Lokhande, H. and Dandige, V., 2020. Survey on
Security Issues in Mobile Cloud Computing and Preventive Measures. In Smart Computing
Paradigms: New Progresses and Challenges (pp. 89-100). Springer, Singapore.

38SECURITY IN MCC
Patil, Y.G. and Deshmukh, P.S., 2018. A Review: Mobile Cloud Computing: Its Challenges and
Security. International Journal of Scientific Research in Network Security and
Communication, 6(01), pp.11-13.
Pérez, C.I.B., Beaufond, C.E.C., Bermúdez, F.A.V. and Clavijo, G.A.T., 2020. Mobile Cloud
Computing, una opción de infraestructura de Tecnologías de Información en procesos de
Educación Ubicua. I+ D Tecnológico, 16(1), pp.30-38.
Pranav, P. and Rizvi, N., 2016. Security in Mobile Cloud Computing: A Review. International
Journal of Computer Science and Information Technologies, 7(1).
Quinlan, C., Babin, B., Carr, J. and Griffin, M., 2019. Business research methods. South Western
Cengage.
Rahimi, M.R., Ren, J., Liu, C.H., Vasilakos, A.V. and Venkatasubramanian, N., 2014. Mobile
cloud computing: A survey, state of art and future directions. Mobile Networks and
Applications, 19(2), pp.133-143.
Ruj, S. and Saxena, R., 2015. Securing cloud data. Cloud computing with e-science applications,
pp.41-72.
Saini, G. and Sharma, N., 2014. Triple security of data in cloud computing. International
Journal of Computer Science and Information Technologies, 5(4), pp.5825-5827.
Sarddar, D. and Nandi, E., 2016. An Authenticate Cryptography based security model for
handling multiple request from multiple devices for Mobile Cloud Computing. International
Journal of Advanced Research in Computer and Communication Engineering, 5(1), pp. 321-324.
Patil, Y.G. and Deshmukh, P.S., 2018. A Review: Mobile Cloud Computing: Its Challenges and
Security. International Journal of Scientific Research in Network Security and
Communication, 6(01), pp.11-13.
Pérez, C.I.B., Beaufond, C.E.C., Bermúdez, F.A.V. and Clavijo, G.A.T., 2020. Mobile Cloud
Computing, una opción de infraestructura de Tecnologías de Información en procesos de
Educación Ubicua. I+ D Tecnológico, 16(1), pp.30-38.
Pranav, P. and Rizvi, N., 2016. Security in Mobile Cloud Computing: A Review. International
Journal of Computer Science and Information Technologies, 7(1).
Quinlan, C., Babin, B., Carr, J. and Griffin, M., 2019. Business research methods. South Western
Cengage.
Rahimi, M.R., Ren, J., Liu, C.H., Vasilakos, A.V. and Venkatasubramanian, N., 2014. Mobile
cloud computing: A survey, state of art and future directions. Mobile Networks and
Applications, 19(2), pp.133-143.
Ruj, S. and Saxena, R., 2015. Securing cloud data. Cloud computing with e-science applications,
pp.41-72.
Saini, G. and Sharma, N., 2014. Triple security of data in cloud computing. International
Journal of Computer Science and Information Technologies, 5(4), pp.5825-5827.
Sarddar, D. and Nandi, E., 2016. An Authenticate Cryptography based security model for
handling multiple request from multiple devices for Mobile Cloud Computing. International
Journal of Advanced Research in Computer and Communication Engineering, 5(1), pp. 321-324.

39SECURITY IN MCC
Schweitzer, V.A., van Werkhoven, C.H., Baño, J.R., Bielicki, J., Harbarth, S., Hulscher, M.,
Huttner, B., Islam, J., Little, P., Pulcini, C. and Savoldi, A., 2020. Optimizing design of research
to evaluate antibiotic stewardship interventions: consensus recommendations of a multinational
working group. Clinical Microbiology and Infection, 26(1), pp.41-50.
Silverman, D. ed., 2016. Qualitative research. Sage.
Stergiou, C. and Psannis, K.E., 2020. Recent Advances Delivered in Mobile Cloud Computing's
Security and Management Challenges. In Modern Principles, Practices, and Algorithms for
Cloud Security (pp. 21-43). IGI Global.
Stergiou, C.L., Plageras, A.P., Psannis, K.E. and Gupta, B.B., 2020. Secure Machine Learning
scenario from Big Data in Cloud Computing via Internet of Things network. In Handbook of
Computer Networks and Cyber Security (pp. 525-554). Springer, Cham.
Stratford, E. and Bradshaw, M., 2016. Qualitative research design and rigour.
Taha, A.A., Elminaam, D.S.A. and Hosny, K.M., 2018. An improved security schema for mobile
cloud computing using hybrid cryptographic algorithms. Far East Journal of Electronics and
Communications, 18(4), pp.521-546.
Thomas, T.W., Tabassum, M., Chu, B. and Lipford, H., 2018, April. Security during application
development: An application security expert perspective. In Proceedings of the 2018 CHI
Conference on Human Factors in Computing Systems (pp. 1-12).
Walia, A.S., 2017. Security Vulnerability in Mobile Cloud Computing (MCC). International
Journal of Advanced Research in Computer Science, 8(4).
Schweitzer, V.A., van Werkhoven, C.H., Baño, J.R., Bielicki, J., Harbarth, S., Hulscher, M.,
Huttner, B., Islam, J., Little, P., Pulcini, C. and Savoldi, A., 2020. Optimizing design of research
to evaluate antibiotic stewardship interventions: consensus recommendations of a multinational
working group. Clinical Microbiology and Infection, 26(1), pp.41-50.
Silverman, D. ed., 2016. Qualitative research. Sage.
Stergiou, C. and Psannis, K.E., 2020. Recent Advances Delivered in Mobile Cloud Computing's
Security and Management Challenges. In Modern Principles, Practices, and Algorithms for
Cloud Security (pp. 21-43). IGI Global.
Stergiou, C.L., Plageras, A.P., Psannis, K.E. and Gupta, B.B., 2020. Secure Machine Learning
scenario from Big Data in Cloud Computing via Internet of Things network. In Handbook of
Computer Networks and Cyber Security (pp. 525-554). Springer, Cham.
Stratford, E. and Bradshaw, M., 2016. Qualitative research design and rigour.
Taha, A.A., Elminaam, D.S.A. and Hosny, K.M., 2018. An improved security schema for mobile
cloud computing using hybrid cryptographic algorithms. Far East Journal of Electronics and
Communications, 18(4), pp.521-546.
Thomas, T.W., Tabassum, M., Chu, B. and Lipford, H., 2018, April. Security during application
development: An application security expert perspective. In Proceedings of the 2018 CHI
Conference on Human Factors in Computing Systems (pp. 1-12).
Walia, A.S., 2017. Security Vulnerability in Mobile Cloud Computing (MCC). International
Journal of Advanced Research in Computer Science, 8(4).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

40SECURITY IN MCC
Wamsi, P.V., Pandey, S.B. and Kakade, K.D., 2020. A Review on mobile cloud computing and
its challanges (No. 2609). EasyChair.
Wang, Y., Chen, R. and Wang, D.C., 2015. A survey of mobile cloud computing applications:
Perspectives and challenges. Wireless Personal Communications, 80(4), pp.1607-1623.
Xia, S., Jiu, M. and Fan, C., 2020, January. Single and Double-Threaded Offloading Strategies
and Computational Analysis in Mobile Cloud Computing. In Journal of Physics: Conference
Series (Vol. 1437, No. 1, p. 012018). IOP Publishing.
Yan, F., 2020. Research design. In Image, Reality and Media Construction (pp. 65-82). Springer,
Singapore.
Yates, J. and Leggett, T., 2016. Qualitative research: An introduction. Radiologic
technology, 88(2), pp.225-231.
You, I. and Li, J., 2016. Special issue on security and privacy techniques in mobile cloud
computing.
Zhang, Y., Wu, A. and Zheng, D., 2018. Efficient and privacy-aware attribute-based data sharing
in mobile cloud computing. Journal of Ambient Intelligence and Humanized Computing, 9(4),
pp.1039-1048.
Wamsi, P.V., Pandey, S.B. and Kakade, K.D., 2020. A Review on mobile cloud computing and
its challanges (No. 2609). EasyChair.
Wang, Y., Chen, R. and Wang, D.C., 2015. A survey of mobile cloud computing applications:
Perspectives and challenges. Wireless Personal Communications, 80(4), pp.1607-1623.
Xia, S., Jiu, M. and Fan, C., 2020, January. Single and Double-Threaded Offloading Strategies
and Computational Analysis in Mobile Cloud Computing. In Journal of Physics: Conference
Series (Vol. 1437, No. 1, p. 012018). IOP Publishing.
Yan, F., 2020. Research design. In Image, Reality and Media Construction (pp. 65-82). Springer,
Singapore.
Yates, J. and Leggett, T., 2016. Qualitative research: An introduction. Radiologic
technology, 88(2), pp.225-231.
You, I. and Li, J., 2016. Special issue on security and privacy techniques in mobile cloud
computing.
Zhang, Y., Wu, A. and Zheng, D., 2018. Efficient and privacy-aware attribute-based data sharing
in mobile cloud computing. Journal of Ambient Intelligence and Humanized Computing, 9(4),
pp.1039-1048.
1 out of 41
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.