Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
net/publication/320394736
CITATIONS READS
4 1,849
4 authors:
Some of the authors of this publication are also working on these related projects:
GAUChO: A Green Adaptive Fog Computing and Networking Architecture View project
All content following this page was uploaded by Samaher Al-Janabi on 16 February 2018.
Abstract— In society today, mobile communication and This paper primary focuses on MCC and a wide range of
mobile computing have a significant role in every aspect of our existing work and efforts on challenges and solutions in MCC
lives, both personal and public communication. However, the are provided. In addition, this work highlights the main
growth in mobile computing usage can be enhanced by unsolved research challenges related to mobile devices,
integrating mobile computing into cloud computing. This will application partitioning, offloading, data integrity, service
result in emerging a new model called Mobile Cloud Computing transformation, security and privacy. This work aims to be a
(MCC) that has recently attracted much attention in academic useful guide to MCC challenges and issues and also a point of
sector. In this work, the main challenges and issues related to reference to pave the way for further work and efforts in MCC
MCC are outlined. We also present the recent work and
domain. In the next section, a background overview of MCC is
countermeasure solutions that are proposed by researchers to
provided. The challenges and solutions within MCC are
counter the challenges and lastly, crucial open research and
issues that direct future research are highlighted. highlighted in Section 3. Some open research areas that require
additional efforts to address a number of these issues in MCC
Keywords — Cloud Computing, Computational Offloading, are discussed in Section 4. Lastly, we conclude the paper.
Mobile Computing, Security and Privacy
II. BACKGROUND
I. INTRODUCTION John McCarthy first introduced the idea of CC in 1961 [6],
The increased use of mobility with Information it has gained popularity and broadly applied in different
Communication Technology (ICT) has dramatically changed applications and environments. To satisfy the required
the way of our lives. Mobile devices such as PDAs, tablet and demands with low cost, CC delivers the computing as a service
smarty phones became an integral part of our lifestyle. and shares resources, software and information as utility via the
According to the International Data Corporation (IDC) internet. The service models in the CC environment as
statistics [1], the worldwide expected growth for smartphones illustrated in Figure 1.
shipments is 40.0% year over year in 2014. Also Cisco Internet
Business Solutions Group (IBSG) [2], the usage of smart
phones grew from 50 to 80 percent in 2013. Recently, it was
reported that more than 240 million of Mobile Cloud
Computing (MCC) customers will use cloud services with an
earning revenue 5.2 billion dollars in 2015 [3].
MCC is a subset of Cloud Computing (CC) that enables
convenient, on demand network access and storage which can
be used to deliver different types of services and applications to
the mobile users [4]. In MCC environment, CC, mobile
computing and networking are combined to offer cloud-based
services to mobile users where the data are stored and
applications are processed in a centralized computing Figure 1. Cloud Computing Services
application located in the clouds [5]. MCC paradigm is
employed to mitigate the critical issues in mobile devices Cloud services are delivered via Software as a Service
including battery life, computational power, limited processing (SaaS), Platform as a Service (PaaS) and Infrastructure as a
and storage limitations. Service (IaaS). The SaaS aims to provide end users an access to
applications such as: Gmail, Facebook, blog, etc. The PaaS
offers services for the customers who can develop, test and run
63
61
B. Access Schemes: authors in [36] used divide and conquer table method which
In MCC, most communications take place within a supports dynamic data update operation. This method allows a
heterogeneous wireless medium that comes with its own set of user to update operations at the block level without
distinct challenges compared to conventional CC. This directly downloading the full dataset. This approach has the advantage
affects managing the quality of wireless communications, of having less computation-intensive operation on the auditor
application response time and service delivery. Also challenges and cloud than traditional data auditing methods. Several
arise with regard to security and the mobility of mobile works have been conducted for building data security in MCC
devices. Moreover, different infrastructures, platforms and [37, 38, 39, 40]
application services create portability challenges in MCC. One Privacy is a significant challenge to using cloud services,
particularly important challenge of MCC is the access particularly when processing mobile users’ data or applications
management, which can be remedied by using context and and when shifting from mobile devices to heterogeneous
location information to enhance mobile access [29]. distributed cloud servers. Because these servers are located in
Specifically, a mobile cloud server can locally improve access different places, they are owned and maintained by service
management by using information such as device location, providers rather than users and the users are not responsible for
capabilities and user profiles. lost privacy. This results in a lack of control over data privacy
and protection by the users. To overcome this problem, a
C. Elasticity solution to preserve the privacy of a mobile device’s
Like CC services, MCC services require elasticity and outsourced data in the cloud using a probabilistic public key
scalability. Service providers should meet customer demands in encryption technique and ranked keyword searching algorithm
order to prevent service interruptions. Several works have been was proposed [41]. This is accomplished by making an index
conducted to develop elastic applications data security file for collection by the mobile users and then encrypting both
[30,31,32] A secure elastic mobile application model that the data and index before storing them in the cloud. In order to
includes authentication, secure communication and migration access the stored data in the cloud, mobile users produce a
within mobile and cloud application components for cloud trapdoor for keywords and send it to the cloud. When the
computing has been proposed [33]. This approach relies on a trapdoor is received by the cloud , it starts searching for a list
device elasticity manager, cloud manager and application of matched data entries and its corresponding encrypted
manager. The device elasticity manager locates the application relevance scores. Then, the matched data is returned to the user
components and selects the paths to communicate within the in ranked sequences that are based on relevance scores. The
components securely. The cloud manager allocates the original data can be retrieved by users using decryption
resources and maintains computational, bandwidth, and storage operation. A wide range of existing works were done to protect
usage information for different parts of components running in privacy [42, 43, 44].
the cloud end. The application manager allows for installation
and launching of application components in different cloud E. Offloading and Trust
nodes. The offloading process requires access to the cloud through
wireless networks. However, the mobile users do not have
D. Security and privacy access or control over these offloading processes, and so this
The major data security risks such as data loss, data breach, increases the risk of unauthorized access to offloaded content.
data recovery, data locality and data privacy result from the Further, there is a potential for violating the content integrity
fact that mobile users’ data is stored and processed in clouds and confidentiality, for jamming between data, application and
that are located at the service providers’ end. To ensure data mobile device during partitioning that threatens availability of
security in MCC, one option is to use cipher text policy cloud services. This is because the offloading content
attribute-based encryption (CP-ABE), which limits executions are done in the cloud rather than mobile device. An
unauthorized access [34]. These methods are referred as Secure adaptive application partitioning and secure offloading
and lightweight CP-ABE (SL-CP-ABE) and constant size algorithm in MCC has been proposed to reduce these risks by
ciphertext and secret keys (CP-ABE-CSCTSK). These providing secure offloading processes [45]. Specifically, this
techniques help to control access in the MCC environment and adaptive partitioning algorithm divides the application into
allow the mobile user to securely outsource computational sensitive and non-sensitive parts. The sensitive part is kept on a
processing from their devices to the cloud, which offers greater mobile device for local execution, and the remaining portions
processing and encryption options. Moreover, this approach of the application are offloaded to cloud for remote execution.
does not restrict the access tree, and so it also provides the user The partitioned components are interconnected with each other.
with a great deal of flexibility when managing their data. Additional security is offered by dynamically changing the
Another solution to protect data from unauthorized access in entities for remote execute allocation. This adaptive
the cloud is a dynamic secure data scheme (P2DS), which is a partitioning and secure offloading algorithm has been shown to
control system that uses attribute based semantic access control be superior to the conventional linear programing based
and proactive determinative access algorithms [35]. The algorithms. Mobile users mainly concern to establish trust for
authors used a remote data auditing method, which verifies the largely-growing vendors and numerous efforts were done to
data of large datasets stored in the cloud using an algebraic build trust in the cloud [46, 47. 48, 49]. Encryption, decryption,
signature that permits the auditor to check users’ data authentication and authorization techniques are among the
possession in the cloud. To extend the P2DS method, the
64
62
techniques that can be employed to protect user data and performance measures such as overall throughput of the system
overcome trust issues in MCC. is the system-centric approach. In contrast, user-centric
approach focuses to provide maximum utilization for users
F. Virtualization Techniques based on a combination of system requirements and budgets.
With MCC, the cloud services are offered via visualization Specifically, meeting the QoS limitations with maintaining an
techniques. In the cloud end, an image of the virtual machine acceptable level of system performance and utilization are
(VM) of the mobile device is pre-installed and the tasks of the important and at the same time a challenge. This is particularly
mobile device are offloaded to the VM for processing. This challenging because they each have competing goals to
offloading of tasks creates several threats to security including maximize resources and efficiency between service providers
security challenges within the VMs, unauthorized access, VM and users for themselves. Therefore, resource allocation in this
to VM attack, communication security challenges within the market has to balance these two needs in order to be successful.
virtualized environment, security challenges within the A coalition-game model for resource sharing between different
hypervisors and challenges to the confidentiality of data [50, service providers in the MCC has been proposed to achieve this
51]. In order to bolster security, a secure framework for cloud necessary balance [61].
infrastructure was proposed [47]. It uses a trusted VM
launching and a domain based stored data protection protocols. IV. OPEN RESEARCH ISSUES
The trusted VM was used before deploying guest VMs. In this In this section, critical open issues for future research work
way, trust is established by remotely attesting host-platform in MCC are presented.
configuration to ensure data confidentiality in remote storage
using cryptographic methods. Another security approach A. Mobile device
focuses on co-resident attacks in cloud computing [52]. This
approach improves VM allocation policy and make it harder Because of limited resources capabilities in mobile devices,
for the attackers to co-locate on VMs. When this allocation future efforts should focus on designing, robust approaches and
policy was simulated on CloudSim, it effectively reduced the solutions that lead for better resource utilization and
probability of an attacker co-locating with their target. incorporate them into mobile devices and MCC.
65
63
However, further research is required for security and privacy REFERENCES
in MCC environment. [1] Data Corporation (IDC), Available:
http://www.idc.com/getdoc.jsp?containerId=prUS41530816. Access on 15
E. Service Transformation Deccemper 2016.
[2] IBSG Cisco, (i) “Mobile Consumers reach for the Cloud”, 2012 and (ii) “The
MCC aims at providing PC-like services to mobile devices. Road to ‘Cloud Nine” - “How Service Providers Can Monetize Consumer Mobile
Because the dissimilates between fixed and mobile device Cloud”, Henky Agusleo and Neeraj Arora, 2013, Available:
features and between wired and wireless data communication, http://www.cisco.com/web/about/ac79/docs/sp/Mobile-Cloud.pdf. Access on 15
service transformation is complex. Such a transition requires Deccemper 2016.
economic planning and pricing schemes to create eco-friendly [3] Online: 2016,“ABI Research Report on Mobile Cloud Computing”,Available:
business and service models that are coordinated with QoS and https://www.abiresearch.com/market-research/product/1004607-enterprise-mobile-
cloud-computing/. Access on 21 January 2017.
SLAs. However, further efforts are required to alleviate
[4] Ab. Rahman, N. H, N. D. W. Cahyani and K. K. R. Choo,“Cloud incident handling
challenges on service transformation between dissimilar mobile and forensic by design: cloud storage as a case study”,Concurrency and
devices and cloud service storages[58]. Computation: Practice and Experience. May 2016.
[5] G. Gao, W. Zhang, Y. Wen, Z. Wang and W. Zhu, “Towards cost-efficient video
F. Other opportunities and challenges transcoding in media cloud: Insights learned from user viewing patterns”, IEEE
Transactions on Multimedia, 17(8), 1286-1296. 2015.
From what aforementioned in the previous section, MCC
[6] J. McCarthy, “Life in the Cloud, Living with Cloud Computing”, Available:
has weaknesses from security and privacy point of view. http://computinginthecloud.wordpress.com/2008/09/25/utility-cloud-
Security should be assured internally within the client’s devices computingflashback-to-1961-prof-john-mccarthy/. Accessed on 15 Decemper
and during the transmission of data from the client to the MCC 2016.
servers. Some interesting questions in this direction include: [7] S. Deshmukh, and R. Shah, “Computation offloading frameworks in mobile cloud
computing: a survey”, in IEEE International Conference on Current Trends in
Where the security should be implemented on the client Advanced Computing (ICCTAC), (pp. 1-5). March 2016,
side i.e.in the memory of the mobile device or SIM card?, and [8] Z. Sanaei, A. Abolfazli, A. Gani, and R. Buyya, “Heterogeneity in mobile cloud
When designing a security protocol for mobile environment, computing: taxonomy and open challenges”,IEEE Communications Surveys &
How to detect flaws in that protocol? Tutorials, 16(1), pp.369-392. 2014.
[9] H. Dinh, T. C. Lee, D. Niyato and P. Wang, “A survey of mobile cloud computing:
In spite of the wide use of traditional security defense architecture, applications, and approaches”,Wireless communications and mobile
strategies, cybercrimes on MCC infrastructure can occur. computing, 13(18), pp. 1587-1611, 2013.
Therefore, dynamic cloud based forensic techniques are vitally [10] N. Aminzadeh, Z. Sanaei and S.H. Ab Hamid, “ Mobile storage augmentation in
important to help investigate when cybercrimes happen. In this mobile cloud computing: Taxonomy, approaches, and open issues”,Simulation
context, How to collect and store metadata for each Modelling Practice and Theory, 50, pp, 96-108, 2015.
transaction?, How to analyze log files for better identifying and [11] S. Al-Janabi, A. Patel, H. Fatlawi, K. Kalajdzic and I. Al Shourbaji, "Empirical
rapid and accurate prediction model for data mining tasks in cloud computing
tracing attacks on the cloud infrastructure?, and what are the
environments," 2014 International Congress on Technology, Communication and
main requirements to design and establish a standard model for Knowledge (ICTCK), Mashhad, 2014, pp. 1-8.
cloud forensics? doi: 10.1109/ICTCK.2014.7033495
[12] L. D. Paulson,“Low-Power Chips for High-Powered Handhelds”,IEEE Computer
The rapid use in mobile applications by users creates Society Magazine, 36(1), pp. 21, January 2003.
mobile big data. This increases the need of mobile big data
[13] J. W Davis,“Power benchmark strategy for systems employing power
management and automatic computing systems. The design of management”,in the proceedings of the IEEE International Symposium on
effective mechanism for better recourse allocation, self- Electronics and the Environment, pp. 117, August 2002.
configurable and self-optimized in MCC is also a hot topic for [14] R. N Mayo and P. Ranganathan, “Energy Consumption in Mobile Devices: Why
research. Future Systems Need Requirements Aware Energy Scale-Down”,in the
proceedings of the Workshop on Power-Aware Computing Systems, October 2003.
[15] E. Vartiainen and k. Väänänen-Vainio-Mattila,“User experience of mobile photo
V. CONCLUSION sharing in the cloud, ” in Proceedings of the 9th International Conference on
MCC empowers the mobile users with a rich functionality Mobile and Ubiquitous Multimedia, p. 4, ACM, December 2010,
despite the restricted resources in their mobile devices. [16] S. Bera, S. Misra and J. J Rodrigues”,Cloud computing applications for smart grid:
Through this work, a wide range of existing works on A survey, ” IEEE Transactions on Parallel and Distributed Systems, 26(5), pp.
1477-1494, 2015.
challenges and solutions in MCC are presented. Firstly, we
[17] G. Gao, W. Zhang, Y. Wen, Z. Wang and W. Zhu”,Towards cost-efficient video
provide a background overview of MCC in which its transcoding in media cloud: Insights learned from user viewing patterns”,IEEE
advantages and applications are presented. Then, we discuss Transactions on Multimedia, 17(8), pp.1286-1296, 2015.
the potential challenges of MCC along with its suggested [18] W. Zhao, Y. Sun and L, Dai,“Improving computer basis teaching through mobile
solutions. However, although this research field is still communication and cloud computing technology”,in IEEE 3rd International
unexplored in depth, many challenges are still under research. Conference on Advanced Computer Theory and Engineering (ICACTE), 1, pp.
Hence, lastly, we pointed out some open research areas that V1-452, August 2010.
require additional efforts to address a number of these issues in [19] G. Nan,.Z. Mao, M. Yu, M. Li, H. Wang and Y.Zhang, “Stackelberg game for
bandwidth allocation in cloud-based wireless live-streaming social
this regards. Mobile devices, application partitioning, networks”,IEEE Systems Journal, 8(1), pp. 256-267. 2014.
offloading, data integrity, service transformation, security and
[20] W. Cai and V. C Leung”,Decomposed cloud games: Design principles and
privacy represent open issues which identify future research challenges”,in IEEE International Conference on Multimedia and Expo
directions in this field. Workshops (ICMEW), pp. 1-4, July 2014.
66
64
[21] K. E Psannis, S. Xinogalos and A. Sifaleras”,Convergence of Internet of things and cloud computing”,Journal of Network and Computer Applications, 64, pp. 12-22.
mobile cloud computing”,Journal Systems Science & Control Engineering, 2(1), 2016.
pp. 476-483. 2014. [42] B.Niu, Q. Li, X. Zhu, G.Cao and H. Li,“Enhancing privacy through caching in
[22] A. Botta, W. De Donato, V. Persico and A. Pescapé”,Integration of cloud location-based services”,in IEEE Conference on Computer Communications
computing and internet of things: a survey “,Future Generation Computer (INFOCOM), pp. 1017-1025, April 2015.
Systems, 56, pp. 684-700, 2016. [43] M.Chen, W. Li, Z. Li, , S. Lu and D. Chen,“Preserving location privacy based on
[23] M/ Bahrami”,Cloud Computing for Emerging Mobile Cloud Apps”,in 3rd IEEE distributed cache pushing”,in IEEE Wireless Communications and Networking
International Conference on Mobile Cloud Computing, Services, and Engineering Conference (WCNC), pp. 3456-3461, April 2014.
(MobileCloud), pp. 4-5, March 2015. [44] H. Zhang, N. Yu and Y. Wen,“Mobile cloud computing based privacy protection
[24] A. Ellouze, M. Gagnaire and A. Haddad, “ mobile application offloading algorithm in location-based information survey applications”,Security and Communication
for mobile cloud computing”,in 3rd IEEE International Conference on Mobile Networks, 8(6), pp. 1006-1025, 2015.
Cloud Computing, Services, and Engineering (MobileCloud), pp. 34-40, March [45] N. M. Dhanya and G. Kousalya,“Adaptive and Secure Application Partitioning for
2015. Offloading in Mobile Cloud Computing,“in International Symposium on Security
[25] X. Chen, L, Jiao, W. Li, and X. Fu”,Efficient multi-user computation offloading in Computing and Communication, pp. 45-53, August 2015.
for mobile-edge cloud computing”,IEEE/ACM Transactions on Networking, 24(5), [46] W. Wang, Z. Li, R. Owens and B.Bhargava,“Secure and efficient access to
pp. 2795-2808. 2016. outsourced data”,in Proceedings of the ACM workshop on Cloud computing
[26] W. Zheng, P. Xu, X. Huang and N. Wu”,Design a cloud storage platform for security, pp. 55-66, November 2009.
pervasive computing environments”,Cluster Computing, 13(2), pp.141-151. 2010. [47] J.Tan, R.Gandhi and P. Narasimhan”,STOVE: Strict, Observable, Verifiable Data
[27] Y. Jun, L. Shan and X. Lizhen”,Research of cache mechanism in mobile data and Execution Models for Untrusted Applications”,in 6th IEEE International
management”,in IEEE Conference on Web Information Systems and Applications Conference on Cloud Computing Technology and Science (CloudCom), pp. 644-
(WISA), pp. 159-162, November 2012. 649, December 2014.
[28] H. Mao, N. Xiao, W. Shi and Y. Lu”,Wukong: A cloud-oriented file service for [48] Q. Xiu-feng, L.Jian-Wei and Z. Peng-Chuan,“Secure cloud computing
mobile Internet devices”,Journal of Parallel and Distributed Computing, 72(2), pp. architecture on mobile internet”,in 2nd IEEE International Conference on
171-184, 2012. Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC),
[29] S. Al-Janabi and I. Al-Shourbaji, "A Hybrid Image steganography method based pp. 619-622, August 2011.
on genetic algorithm," 2016 7th International Conference on Sciences of [49] S. Dey, S. Sampalli and Q. Ye,“A context-adaptive security framework for mobile
Electronics, Technologies of Information and Telecommunications (SETIT), cloud computing”,in 11th International Conference on Moile Ad-hoc and Sensor
Hammamet, 2016, pp. 398-404. Networks (MSN), pp. 89-95, December 2015.
doi: 10.1109/SETIT.2016.7939903 [50] S.Singh, P. K.Sharma and J. H. Park,“A Security Model for Protecting
[30] X. Zhang, A.Kunjithapatham, S.Jeong and S. Gibbs, S”,Towards an elastic Virtualization in Cloud Computing”,in International Conference on Computer
application model for augmenting the computing capabilities of mobile devices Science and its Applications, pp. 385-388, December 2016.
with cloud computing”,Mobile Networks and Applications, 16(3), pp. 270-284. [51] D.Sgandurra and E. Lupu”,Evolution of attacks, threat models, and solutions for
2011. virtualized systems”,ACM Computing Surveys (CSUR), 48(3), pp. 46. 2016.
[31] B. G. Chun, S. Ihm, P. Maniatis, M. Naik and A. Patti ,“Clonecloud: elastic [52] N. Paladi, C. Gehrmann and A. Michalas, “Providing user security guarantees in
execution between mobile device and cloud”,in Proceedings of the 6th conference public infrastructure clouds”,IEEE Transactions on Cloud Computing, pp.1-1,
on Computer systems, pp. 301-314, April 2011. 2016
[32] M. R. Rahimi, N.Venkatasubramanian, S. Mehrotra and A. V. [53] Y. Han, J. Chan, T.Alpcan and C. Leckie,“Using virtual machine allocation
Vasilakos”,MAPCloud: mobile applications on an elastic and scalable 2-tier cloud policies to defend against co-resident attacks in cloud computing,“. IEEE
architecture, ” in 5th IEEE International Conference on Utility and Cloud Transactions on Dependable and Secure Computing, 14(1), pp. 95-108, 2017.
Computing (UCC), pp. 83-90, November 2012.
[54] A. Arabo and B. Pranggono,“Mobile malware and smart device security: Trends,
[33] X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham and S. Jeong, “ Securing challenges and solutions”,in 19th IEEE International Conference on Control
elastic applications on mobile devices for cloud computing, ” in proceedings of the Systems and Computer Science (CSCS), pp. 526-531, May 2013.
2009 ACM workshop on Cloud computing security, pp. 127-134, November 2009.
[55] J. Walls and K. K. R Choo,“A Review of Free Cloud-Based Anti-Malware Apps
[34] V. Odelu, A.K. Das, Y.S. Rao, S. Kumari, M. K. Khan and K. K. R for Android”,in IEEE Trustcom/BigDataSE/ISPA, 1, pp. 1053-1058, August 2015.
Choo,“Pairing-based CP-ABE with constant-size ciphertexts and secret keys for
cloud environment, ” Computer Standards & Interfaces, May 2016.
[56] J. Imgraben, A.Engelbrecht, and K. K. R Choo,“Always connected, but are smart
mobile users getting more security savvy? A survey of smart mobile device
[35] M.Qiu, K. Gai, B.Thuraisingham, L. Tao, and H. Zhao, H”,Proactive user-centric users”,Behaviour & Information Technology, 33(12), pp.1347-1360, 2014.
secure data scheme using attribute-based semantic access controls for mobile
clouds in financial industry”,Future Generation Computer Systems, February 2016.
[57] S. Son, G.Jung, S. Jun, “An SLA-based cloud computing that facilitates resource
allocation in the distributed data centers of a cloud provider”, Journal
[36] M.Sookhak, A. Gani, M. K. Khan and R. Buyya,“Dynamic remote data auditing Supercomputer, 64, pp. 606-637, 2013.
for securing big data storage in cloud computing”,Information Sciences, 380, pp.
101-116. 2017.
[58] S. Al-Janabi, I. Al-Shourbaji, M. Shojafar, S. Shamshirband, Survey of main
challenges (security and privacy) in wireless body area networks for healthcare
[37] Y. Yu, Y. Li, M. H. Au,., W. Susilo, K. K. R. Choo and X Zhang,“Public cloud applications, Egyptian Informatics Journal, Volume 18, Issue 2, Pages 113-122,
data auditing with practical key update and zero knowledge privacy, ” ISSN 1110-8665, 2017. http://dx.doi.org/10.1016/j.eij.2016.11.001.
in Australasian Conference on Information Security and Privacy, pp. 389-405, July
2016.
[59] R. Buyya, H. Stockinger, J. Giddy and D. Abrams, “Economic models for
management of resources in grid computing”, The Journal of Concurrency and
[38] M. Louk, and H. Lim”,Homomorphic encryption in mobile multi cloud Computation, 14, pp. 1507-1542, 2002.
computing”,in IEEE International Conference on Information Networking
(ICOIN), pp. 493-497, January 2015.
[60] P. Samimi, , Y.Teimouri and M. Mukhtar, “A combinatorial double auction
resource allocation model in cloud computing”, Information Sciences, 357, pp.
[39] H. Wang, S. Wu, M. Chen and W. Wang,“Security protection between users and 201-216, 2016.
the mobile media cloud”,IEEE Communications Magazine, 52(3), pp. 73-79, 2014.
[61] X. Huang, R.Yu, J.Kang, J. Ding, S. Maharjan, S. Gjessing, Y. Zhang,“Dynamic
[40] K.Zkik, G.Orhanou and S. El Hajji,“Secure scheme on mobile multi cloud resource pricing and scalable cooperation for mobile cloud computing”,
computing based on homomorphic encryption”,in IEEE International Conference in Ubiquitous Intelligence and Computing and 12th IEEE International Conference
on Engineering & MIS (ICEMIS), pp. 1-6 September 2016, on Autonomic and Trusted Computing , IEEE International Conference on
[41] S. K.Pasupuleti, S. Ramalingam and R. Buyya,“An efficient and secure privacy- Scalable Computing and Communications and Its Associated Workshops (UIC-
preserving approach for outsourced data of resource constrained mobile devices in ATC-ScalCom), pp. 786-792, August 2015.
67
65