Sei sulla pagina 1di 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/320394736

Mobile Cloud Computing: Challenges and Future Research Directions

Conference Paper · June 2017


DOI: 10.1109/DeSE.2017.21

CITATIONS READS
4 1,849

4 authors:

Samaher Al-Janabi Ibrahim AlShourbaji


University of Babylon Jazan University
60 PUBLICATIONS   221 CITATIONS    21 PUBLICATIONS   138 CITATIONS   

SEE PROFILE SEE PROFILE

Mohammad Shojafar Mohammed Eltahir Abdelhag


Ryerson University Jazan University
99 PUBLICATIONS   1,829 CITATIONS    5 PUBLICATIONS   9 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

SAMMClouds: Secure and Adaptive Management of Multi-Clouds View project

GAUChO: A Green Adaptive Fog Computing and Networking Architecture View project

All content following this page was uploaded by Samaher Al-Janabi on 16 February 2018.

The user has requested enhancement of the downloaded file.


2017 10th International Conference on Developments in eSystems Engineering

Mobile Cloud Computing: Challenges and Future Research Directions

Samaher Al-Janabi Ibrahim Al-Shourbaji


Department of Computer Science, Department of Computer Engineering and Networks,
Faculty of Science for Women (SCIW), Collage of Computer Science and Information System
University of Babylon, Babylon, Iraq Jazan University, Kingdom of Saudi Arabia
samaher@uobabylon.edu.iq ialshourbaji@jazanu.edu.sa

Mohammad Shojafar Mohammed Abdelhag


Department of Information Engineering, Electronics and Department of Information System
Telecommunications (DIET), Sapienza University of Rome, Via Collage of Computer Science and Information System
Eudossiana 18, 00184 Rome, Italy (CNIT), Rome, Italy Jazan University, Kingdom of Saudi Arabia
Shojafar@diet.uniroma1.it mohedtahir@gmail.com

Abstract— In society today, mobile communication and This paper primary focuses on MCC and a wide range of
mobile computing have a significant role in every aspect of our existing work and efforts on challenges and solutions in MCC
lives, both personal and public communication. However, the are provided. In addition, this work highlights the main
growth in mobile computing usage can be enhanced by unsolved research challenges related to mobile devices,
integrating mobile computing into cloud computing. This will application partitioning, offloading, data integrity, service
result in emerging a new model called Mobile Cloud Computing transformation, security and privacy. This work aims to be a
(MCC) that has recently attracted much attention in academic useful guide to MCC challenges and issues and also a point of
sector. In this work, the main challenges and issues related to reference to pave the way for further work and efforts in MCC
MCC are outlined. We also present the recent work and
domain. In the next section, a background overview of MCC is
countermeasure solutions that are proposed by researchers to
provided. The challenges and solutions within MCC are
counter the challenges and lastly, crucial open research and
issues that direct future research are highlighted. highlighted in Section 3. Some open research areas that require
additional efforts to address a number of these issues in MCC
Keywords — Cloud Computing, Computational Offloading, are discussed in Section 4. Lastly, we conclude the paper.
Mobile Computing, Security and Privacy
II. BACKGROUND
I. INTRODUCTION John McCarthy first introduced the idea of CC in 1961 [6],
The increased use of mobility with Information it has gained popularity and broadly applied in different
Communication Technology (ICT) has dramatically changed applications and environments. To satisfy the required
the way of our lives. Mobile devices such as PDAs, tablet and demands with low cost, CC delivers the computing as a service
smarty phones became an integral part of our lifestyle. and shares resources, software and information as utility via the
According to the International Data Corporation (IDC) internet. The service models in the CC environment as
statistics [1], the worldwide expected growth for smartphones illustrated in Figure 1.
shipments is 40.0% year over year in 2014. Also Cisco Internet
Business Solutions Group (IBSG) [2], the usage of smart
phones grew from 50 to 80 percent in 2013. Recently, it was
reported that more than 240 million of Mobile Cloud
Computing (MCC) customers will use cloud services with an
earning revenue 5.2 billion dollars in 2015 [3].
MCC is a subset of Cloud Computing (CC) that enables
convenient, on demand network access and storage which can
be used to deliver different types of services and applications to
the mobile users [4]. In MCC environment, CC, mobile
computing and networking are combined to offer cloud-based
services to mobile users where the data are stored and
applications are processed in a centralized computing Figure 1. Cloud Computing Services
application located in the clouds [5]. MCC paradigm is
employed to mitigate the critical issues in mobile devices Cloud services are delivered via Software as a Service
including battery life, computational power, limited processing (SaaS), Platform as a Service (PaaS) and Infrastructure as a
and storage limitations. Service (IaaS). The SaaS aims to provide end users an access to
applications such as: Gmail, Facebook, blog, etc. The PaaS
offers services for the customers who can develop, test and run

2161-1343/17 $31.00 © 2017 IEEE 60


62
DOI 10.1109/DeSE.2017.21
applications through the Internet such as GAE, Amazon Web x In could, data and application are stored and backed up
Services and Microsoft Azure. The IaaS provides the users on a number of computers. This effectively improves
with resources such as servers, storage and computation reliability by backing up data and applications on
facilities. multiple computers and reducing the probability of lost
information from mobile devices. Additionally MCC
MCC is a rich mobile computing technology that leverages
uses wireless networks which allow mobile users to
unified elastic resources of verified network technologies and
store and access the available recourses on the cloud.
clouds to provide unrestricted mobility, functionality and
For instance, Amazon Simple Storage Service (Amazon
storage, while serving a huge number of mobile devices at
S3) supports file storage service and Image Exchange
anywhere and anytime via the internet and regardless of
uses large storage space in the clouds [15]
heterogamous environments based on pay-as-you use principle
[7]. In short, mobile users can access available services in x On-demand provisioning of resources on a detailed self-
clouds without the need for computing and storage recourses service basis. This dynamically allows both service
such as: memory capacity and CPU speed. This is because all providers and mobile users a variety of options to
complicated computing processes are happen outside the execute applications without the need for resources
mobile devices. reservation. .
Mobile devices can be laptops, PDA, smart phones, tablets x Mobile applications deployment is performed to meet
.etc which connect with a base station by wireless the mobile users’ demands and expectations because the
communication technologies such as: 2G, 3G, 4G, WiFi and flexible and scalable use of service provisioning and
LTE as shown in Figure 2. These technologies can effectively resources through the trusted network regardless the
and efficiently furnish cloud-based resources via a web number of used services by the mobile users.
browser or a desktop application to meet mobile client’s needs
with high-level of security and low footprint. The management B. Applications of Mobile Cloud
components resources in the cloud are then allocated to fulfil
mobile user’s requests and establish a connection. The In these days, a wide range of emerging applications of
calculating and monitoring functions of MCC are implemented Cloud Computing (CC) are used by mobile users such as cloud
to ensure that Quality of Service (QoS) is reliable for fulfilling storage [16], cloud mobile media [17], learning and education
the user’s requirements in terms of Service Level Agreements [18], mobile social networks [19], mobile gaming [20], cloud
(SLAs) until completing the connection and service. assisted Internet of Things (IoT) [21, 22]. These applications
are developed to meet mobile user demands and mobile device
capability [23]. The main goal of these applications is to
provide mobile users the access to available services on the
cloud even from limited resourced mobile devices. In order to
offload a mobile application to cloud, it requires splitting the
application into parts and they can be divided into three main
types based on its needs including client based, client cloud
based and cloud based models. In client based, mobile device is
responsible for holding the major execution of an application,
while, in the client-cloud based, an application is divided into
components. These components are executed by mobile device
and remote cloud. In addition, the cloud is part of an
application where the application can run, process and store.
Figure 2. Mobile Cloud Computing Architecture
III. CHALLENGES AND SOLUTIONS WITHIN MCC
Despite the several advantages that MCC provides to both
A. MCC Advantages
service providers and mobile users, it faces several challenges
CC can be considered as a solution to mobile computing and issues that make it more complicated than conventional
because of several reasons including mobility, portability and CC. In this section, we discuss crucial challenges faced by
communication [8, 9]. This section focuses on how the CC can MCC.
be employed to overcome the obstruction in mobile computing,
thus highlighting the main pros of MCC. A. Limited Resources of Mobile Devices
x Mobile devices have several problems and restriction Although the limited resources in mobile devices are
[10]. To overcome these problems various solutions continually improved, they remain limited in comparison to the
were proposed [11, 12, 13, 14]. However, these personal computer. For instance, it is ineffective to run
solutions need some changes in the mobile devices applications that require a high volume of energy on mobile
structure or completely new hardware that will result in devices. The computational offloading technique can conquer
increasing the cost and may not be feasible for all the challenge of executing mobile applications by offloading
mobile devices. MCC was employed to mitigate large applications and tasks to the cloud for execution [24, 25].
computations processes in mobile devices by offloading Several other efforts were aimed to address the problems in
the applications to computational cloud. mobile devices [26, 27, 28].

63
61
B. Access Schemes: authors in [36] used divide and conquer table method which
In MCC, most communications take place within a supports dynamic data update operation. This method allows a
heterogeneous wireless medium that comes with its own set of user to update operations at the block level without
distinct challenges compared to conventional CC. This directly downloading the full dataset. This approach has the advantage
affects managing the quality of wireless communications, of having less computation-intensive operation on the auditor
application response time and service delivery. Also challenges and cloud than traditional data auditing methods. Several
arise with regard to security and the mobility of mobile works have been conducted for building data security in MCC
devices. Moreover, different infrastructures, platforms and [37, 38, 39, 40]
application services create portability challenges in MCC. One Privacy is a significant challenge to using cloud services,
particularly important challenge of MCC is the access particularly when processing mobile users’ data or applications
management, which can be remedied by using context and and when shifting from mobile devices to heterogeneous
location information to enhance mobile access [29]. distributed cloud servers. Because these servers are located in
Specifically, a mobile cloud server can locally improve access different places, they are owned and maintained by service
management by using information such as device location, providers rather than users and the users are not responsible for
capabilities and user profiles. lost privacy. This results in a lack of control over data privacy
and protection by the users. To overcome this problem, a
C. Elasticity solution to preserve the privacy of a mobile device’s
Like CC services, MCC services require elasticity and outsourced data in the cloud using a probabilistic public key
scalability. Service providers should meet customer demands in encryption technique and ranked keyword searching algorithm
order to prevent service interruptions. Several works have been was proposed [41]. This is accomplished by making an index
conducted to develop elastic applications data security file for collection by the mobile users and then encrypting both
[30,31,32] A secure elastic mobile application model that the data and index before storing them in the cloud. In order to
includes authentication, secure communication and migration access the stored data in the cloud, mobile users produce a
within mobile and cloud application components for cloud trapdoor for keywords and send it to the cloud. When the
computing has been proposed [33]. This approach relies on a trapdoor is received by the cloud , it starts searching for a list
device elasticity manager, cloud manager and application of matched data entries and its corresponding encrypted
manager. The device elasticity manager locates the application relevance scores. Then, the matched data is returned to the user
components and selects the paths to communicate within the in ranked sequences that are based on relevance scores. The
components securely. The cloud manager allocates the original data can be retrieved by users using decryption
resources and maintains computational, bandwidth, and storage operation. A wide range of existing works were done to protect
usage information for different parts of components running in privacy [42, 43, 44].
the cloud end. The application manager allows for installation
and launching of application components in different cloud E. Offloading and Trust
nodes. The offloading process requires access to the cloud through
wireless networks. However, the mobile users do not have
D. Security and privacy access or control over these offloading processes, and so this
The major data security risks such as data loss, data breach, increases the risk of unauthorized access to offloaded content.
data recovery, data locality and data privacy result from the Further, there is a potential for violating the content integrity
fact that mobile users’ data is stored and processed in clouds and confidentiality, for jamming between data, application and
that are located at the service providers’ end. To ensure data mobile device during partitioning that threatens availability of
security in MCC, one option is to use cipher text policy cloud services. This is because the offloading content
attribute-based encryption (CP-ABE), which limits executions are done in the cloud rather than mobile device. An
unauthorized access [34]. These methods are referred as Secure adaptive application partitioning and secure offloading
and lightweight CP-ABE (SL-CP-ABE) and constant size algorithm in MCC has been proposed to reduce these risks by
ciphertext and secret keys (CP-ABE-CSCTSK). These providing secure offloading processes [45]. Specifically, this
techniques help to control access in the MCC environment and adaptive partitioning algorithm divides the application into
allow the mobile user to securely outsource computational sensitive and non-sensitive parts. The sensitive part is kept on a
processing from their devices to the cloud, which offers greater mobile device for local execution, and the remaining portions
processing and encryption options. Moreover, this approach of the application are offloaded to cloud for remote execution.
does not restrict the access tree, and so it also provides the user The partitioned components are interconnected with each other.
with a great deal of flexibility when managing their data. Additional security is offered by dynamically changing the
Another solution to protect data from unauthorized access in entities for remote execute allocation. This adaptive
the cloud is a dynamic secure data scheme (P2DS), which is a partitioning and secure offloading algorithm has been shown to
control system that uses attribute based semantic access control be superior to the conventional linear programing based
and proactive determinative access algorithms [35]. The algorithms. Mobile users mainly concern to establish trust for
authors used a remote data auditing method, which verifies the largely-growing vendors and numerous efforts were done to
data of large datasets stored in the cloud using an algebraic build trust in the cloud [46, 47. 48, 49]. Encryption, decryption,
signature that permits the auditor to check users’ data authentication and authorization techniques are among the
possession in the cloud. To extend the P2DS method, the

64
62
techniques that can be employed to protect user data and performance measures such as overall throughput of the system
overcome trust issues in MCC. is the system-centric approach. In contrast, user-centric
approach focuses to provide maximum utilization for users
F. Virtualization Techniques based on a combination of system requirements and budgets.
With MCC, the cloud services are offered via visualization Specifically, meeting the QoS limitations with maintaining an
techniques. In the cloud end, an image of the virtual machine acceptable level of system performance and utilization are
(VM) of the mobile device is pre-installed and the tasks of the important and at the same time a challenge. This is particularly
mobile device are offloaded to the VM for processing. This challenging because they each have competing goals to
offloading of tasks creates several threats to security including maximize resources and efficiency between service providers
security challenges within the VMs, unauthorized access, VM and users for themselves. Therefore, resource allocation in this
to VM attack, communication security challenges within the market has to balance these two needs in order to be successful.
virtualized environment, security challenges within the A coalition-game model for resource sharing between different
hypervisors and challenges to the confidentiality of data [50, service providers in the MCC has been proposed to achieve this
51]. In order to bolster security, a secure framework for cloud necessary balance [61].
infrastructure was proposed [47]. It uses a trusted VM
launching and a domain based stored data protection protocols. IV. OPEN RESEARCH ISSUES
The trusted VM was used before deploying guest VMs. In this In this section, critical open issues for future research work
way, trust is established by remotely attesting host-platform in MCC are presented.
configuration to ensure data confidentiality in remote storage
using cryptographic methods. Another security approach A. Mobile device
focuses on co-resident attacks in cloud computing [52]. This
approach improves VM allocation policy and make it harder Because of limited resources capabilities in mobile devices,
for the attackers to co-locate on VMs. When this allocation future efforts should focus on designing, robust approaches and
policy was simulated on CloudSim, it effectively reduced the solutions that lead for better resource utilization and
probability of an attacker co-locating with their target. incorporate them into mobile devices and MCC.

G. Malware Attack B. Application Partitioning and Offloading


Malware is a threat to the availability of internet An important gap in security between a mobile device and
connections and poses a particular challenge for cloud services cloud relates to technology that requires data communication
because traditional methods for detecting vulnerabilities and between such as application partitioning, offloading and remote
attacks do not scale well for CC where services are distributed executions. While encryption methods could be helpful in this
over multi-threaded network infrastructures [53]. Therefore, regard, sometimes it does not necessary to use these methods in
internet security breaches including malware, spam and emails order to avoid performance degradation, especially in
phishing are the most common risks to MCC and users’ computational offloading and remote execution. This leaves
privacy [54]. There are two kinds of security applications are individuals vulnerable since attackers can make target to
available to prevent such attacks for mobile devices: Cloud- memory locations inside and outside of the processors where
based methods [55] and on-device applications [56]. The the data is temporarily stored. In the light of this, it is essential
cloud-based methods are generally superior in that they offer to fill this gap and prevent data loss with solutions that
better detection and prevention; reduce on-device resource simultaneously improve security and avoid performance
consumption and application complexity. Despite the fact that degradation.
on-device’s methods are not as good at addressing modern
complex malware and threats, they remain the preferred C. Data Integrity
methods. Mobile device users can access available recourses on
MCC at anywhere and anytime. Therefore, data integrity and
H. Economic Modelling and Pricing: recovery are vitally important and they require a standard
In a cloud environment, supply and demand is driven by storage and management infrastructure to overcome data
competition among service providers and users’ preferences integrity, accuracy and consistency related issues in MCC.
based on their Quality of Service (QoS) and pricing needs [57].
In general, service providers and users independently arrive at D. Security and Privacy
their policies and resource allocation schemes [58]. Providers The security and privacy challenges discussed in the
can improve their returns and motivate users to pick the lowest previous section reveal that the MCC’s security and privacy
cost service provider based on their budget and level of QoS concerns compounded by the emerging use of new technology.
[59] using market-based techniques and by adhering to Moreover, cloud storage and processing in multiple locations
economic models that regulate supply and demand. The goal of also lead to privacy issues because the cloud servers of service
resource-allocation procedures is to balance feasibility and providers are located in different regions and countries. The
optimization for a given service [60]. This is accomplished by present challenges become even more difficult to handle and
a combination of system centric and user centric approaches vulnerable to threats as data, application, virtualization and
that meet the demands of the heterogeneous nature of cloud remote execution are under the service providers control only.
computing. The traditional approach that uses system-wide

65
63
However, further research is required for security and privacy REFERENCES
in MCC environment. [1] Data Corporation (IDC), Available:
http://www.idc.com/getdoc.jsp?containerId=prUS41530816. Access on 15
E. Service Transformation Deccemper 2016.
[2] IBSG Cisco, (i) “Mobile Consumers reach for the Cloud”, 2012 and (ii) “The
MCC aims at providing PC-like services to mobile devices. Road to ‘Cloud Nine” - “How Service Providers Can Monetize Consumer Mobile
Because the dissimilates between fixed and mobile device Cloud”, Henky Agusleo and Neeraj Arora, 2013, Available:
features and between wired and wireless data communication, http://www.cisco.com/web/about/ac79/docs/sp/Mobile-Cloud.pdf. Access on 15
service transformation is complex. Such a transition requires Deccemper 2016.
economic planning and pricing schemes to create eco-friendly [3] Online: 2016,“ABI Research Report on Mobile Cloud Computing”,Available:
business and service models that are coordinated with QoS and https://www.abiresearch.com/market-research/product/1004607-enterprise-mobile-
cloud-computing/. Access on 21 January 2017.
SLAs. However, further efforts are required to alleviate
[4] Ab. Rahman, N. H, N. D. W. Cahyani and K. K. R. Choo,“Cloud incident handling
challenges on service transformation between dissimilar mobile and forensic by design: cloud storage as a case study”,Concurrency and
devices and cloud service storages[58]. Computation: Practice and Experience. May 2016.
[5] G. Gao, W. Zhang, Y. Wen, Z. Wang and W. Zhu, “Towards cost-efficient video
F. Other opportunities and challenges transcoding in media cloud: Insights learned from user viewing patterns”, IEEE
Transactions on Multimedia, 17(8), 1286-1296. 2015.
From what aforementioned in the previous section, MCC
[6] J. McCarthy, “Life in the Cloud, Living with Cloud Computing”, Available:
has weaknesses from security and privacy point of view. http://computinginthecloud.wordpress.com/2008/09/25/utility-cloud-
Security should be assured internally within the client’s devices computingflashback-to-1961-prof-john-mccarthy/. Accessed on 15 Decemper
and during the transmission of data from the client to the MCC 2016.
servers. Some interesting questions in this direction include: [7] S. Deshmukh, and R. Shah, “Computation offloading frameworks in mobile cloud
computing: a survey”, in IEEE International Conference on Current Trends in
Where the security should be implemented on the client Advanced Computing (ICCTAC), (pp. 1-5). March 2016,
side i.e.in the memory of the mobile device or SIM card?, and [8] Z. Sanaei, A. Abolfazli, A. Gani, and R. Buyya, “Heterogeneity in mobile cloud
When designing a security protocol for mobile environment, computing: taxonomy and open challenges”,IEEE Communications Surveys &
How to detect flaws in that protocol? Tutorials, 16(1), pp.369-392. 2014.
[9] H. Dinh, T. C. Lee, D. Niyato and P. Wang, “A survey of mobile cloud computing:
In spite of the wide use of traditional security defense architecture, applications, and approaches”,Wireless communications and mobile
strategies, cybercrimes on MCC infrastructure can occur. computing, 13(18), pp. 1587-1611, 2013.
Therefore, dynamic cloud based forensic techniques are vitally [10] N. Aminzadeh, Z. Sanaei and S.H. Ab Hamid, “ Mobile storage augmentation in
important to help investigate when cybercrimes happen. In this mobile cloud computing: Taxonomy, approaches, and open issues”,Simulation
context, How to collect and store metadata for each Modelling Practice and Theory, 50, pp, 96-108, 2015.
transaction?, How to analyze log files for better identifying and [11] S. Al-Janabi, A. Patel, H. Fatlawi, K. Kalajdzic and I. Al Shourbaji, "Empirical
rapid and accurate prediction model for data mining tasks in cloud computing
tracing attacks on the cloud infrastructure?, and what are the
environments," 2014 International Congress on Technology, Communication and
main requirements to design and establish a standard model for Knowledge (ICTCK), Mashhad, 2014, pp. 1-8.
cloud forensics? doi: 10.1109/ICTCK.2014.7033495
[12] L. D. Paulson,“Low-Power Chips for High-Powered Handhelds”,IEEE Computer
The rapid use in mobile applications by users creates Society Magazine, 36(1), pp. 21, January 2003.
mobile big data. This increases the need of mobile big data
[13] J. W Davis,“Power benchmark strategy for systems employing power
management and automatic computing systems. The design of management”,in the proceedings of the IEEE International Symposium on
effective mechanism for better recourse allocation, self- Electronics and the Environment, pp. 117, August 2002.
configurable and self-optimized in MCC is also a hot topic for [14] R. N Mayo and P. Ranganathan, “Energy Consumption in Mobile Devices: Why
research. Future Systems Need Requirements Aware Energy Scale-Down”,in the
proceedings of the Workshop on Power-Aware Computing Systems, October 2003.
[15] E. Vartiainen and k. Väänänen-Vainio-Mattila,“User experience of mobile photo
V. CONCLUSION sharing in the cloud, ” in Proceedings of the 9th International Conference on
MCC empowers the mobile users with a rich functionality Mobile and Ubiquitous Multimedia, p. 4, ACM, December 2010,
despite the restricted resources in their mobile devices. [16] S. Bera, S. Misra and J. J Rodrigues”,Cloud computing applications for smart grid:
Through this work, a wide range of existing works on A survey, ” IEEE Transactions on Parallel and Distributed Systems, 26(5), pp.
1477-1494, 2015.
challenges and solutions in MCC are presented. Firstly, we
[17] G. Gao, W. Zhang, Y. Wen, Z. Wang and W. Zhu”,Towards cost-efficient video
provide a background overview of MCC in which its transcoding in media cloud: Insights learned from user viewing patterns”,IEEE
advantages and applications are presented. Then, we discuss Transactions on Multimedia, 17(8), pp.1286-1296, 2015.
the potential challenges of MCC along with its suggested [18] W. Zhao, Y. Sun and L, Dai,“Improving computer basis teaching through mobile
solutions. However, although this research field is still communication and cloud computing technology”,in IEEE 3rd International
unexplored in depth, many challenges are still under research. Conference on Advanced Computer Theory and Engineering (ICACTE), 1, pp.
Hence, lastly, we pointed out some open research areas that V1-452, August 2010.
require additional efforts to address a number of these issues in [19] G. Nan,.Z. Mao, M. Yu, M. Li, H. Wang and Y.Zhang, “Stackelberg game for
bandwidth allocation in cloud-based wireless live-streaming social
this regards. Mobile devices, application partitioning, networks”,IEEE Systems Journal, 8(1), pp. 256-267. 2014.
offloading, data integrity, service transformation, security and
[20] W. Cai and V. C Leung”,Decomposed cloud games: Design principles and
privacy represent open issues which identify future research challenges”,in IEEE International Conference on Multimedia and Expo
directions in this field. Workshops (ICMEW), pp. 1-4, July 2014.

66
64
[21] K. E Psannis, S. Xinogalos and A. Sifaleras”,Convergence of Internet of things and cloud computing”,Journal of Network and Computer Applications, 64, pp. 12-22.
mobile cloud computing”,Journal Systems Science & Control Engineering, 2(1), 2016.
pp. 476-483. 2014. [42] B.Niu, Q. Li, X. Zhu, G.Cao and H. Li,“Enhancing privacy through caching in
[22] A. Botta, W. De Donato, V. Persico and A. Pescapé”,Integration of cloud location-based services”,in IEEE Conference on Computer Communications
computing and internet of things: a survey “,Future Generation Computer (INFOCOM), pp. 1017-1025, April 2015.
Systems, 56, pp. 684-700, 2016. [43] M.Chen, W. Li, Z. Li, , S. Lu and D. Chen,“Preserving location privacy based on
[23] M/ Bahrami”,Cloud Computing for Emerging Mobile Cloud Apps”,in 3rd IEEE distributed cache pushing”,in IEEE Wireless Communications and Networking
International Conference on Mobile Cloud Computing, Services, and Engineering Conference (WCNC), pp. 3456-3461, April 2014.
(MobileCloud), pp. 4-5, March 2015. [44] H. Zhang, N. Yu and Y. Wen,“Mobile cloud computing based privacy protection
[24] A. Ellouze, M. Gagnaire and A. Haddad, “ mobile application offloading algorithm in location-based information survey applications”,Security and Communication
for mobile cloud computing”,in 3rd IEEE International Conference on Mobile Networks, 8(6), pp. 1006-1025, 2015.
Cloud Computing, Services, and Engineering (MobileCloud), pp. 34-40, March [45] N. M. Dhanya and G. Kousalya,“Adaptive and Secure Application Partitioning for
2015. Offloading in Mobile Cloud Computing,“in International Symposium on Security
[25] X. Chen, L, Jiao, W. Li, and X. Fu”,Efficient multi-user computation offloading in Computing and Communication, pp. 45-53, August 2015.
for mobile-edge cloud computing”,IEEE/ACM Transactions on Networking, 24(5), [46] W. Wang, Z. Li, R. Owens and B.Bhargava,“Secure and efficient access to
pp. 2795-2808. 2016. outsourced data”,in Proceedings of the ACM workshop on Cloud computing
[26] W. Zheng, P. Xu, X. Huang and N. Wu”,Design a cloud storage platform for security, pp. 55-66, November 2009.
pervasive computing environments”,Cluster Computing, 13(2), pp.141-151. 2010. [47] J.Tan, R.Gandhi and P. Narasimhan”,STOVE: Strict, Observable, Verifiable Data
[27] Y. Jun, L. Shan and X. Lizhen”,Research of cache mechanism in mobile data and Execution Models for Untrusted Applications”,in 6th IEEE International
management”,in IEEE Conference on Web Information Systems and Applications Conference on Cloud Computing Technology and Science (CloudCom), pp. 644-
(WISA), pp. 159-162, November 2012. 649, December 2014.
[28] H. Mao, N. Xiao, W. Shi and Y. Lu”,Wukong: A cloud-oriented file service for [48] Q. Xiu-feng, L.Jian-Wei and Z. Peng-Chuan,“Secure cloud computing
mobile Internet devices”,Journal of Parallel and Distributed Computing, 72(2), pp. architecture on mobile internet”,in 2nd IEEE International Conference on
171-184, 2012. Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC),
[29] S. Al-Janabi and I. Al-Shourbaji, "A Hybrid Image steganography method based pp. 619-622, August 2011.
on genetic algorithm," 2016 7th International Conference on Sciences of [49] S. Dey, S. Sampalli and Q. Ye,“A context-adaptive security framework for mobile
Electronics, Technologies of Information and Telecommunications (SETIT), cloud computing”,in 11th International Conference on Moile Ad-hoc and Sensor
Hammamet, 2016, pp. 398-404. Networks (MSN), pp. 89-95, December 2015.
doi: 10.1109/SETIT.2016.7939903 [50] S.Singh, P. K.Sharma and J. H. Park,“A Security Model for Protecting
[30] X. Zhang, A.Kunjithapatham, S.Jeong and S. Gibbs, S”,Towards an elastic Virtualization in Cloud Computing”,in International Conference on Computer
application model for augmenting the computing capabilities of mobile devices Science and its Applications, pp. 385-388, December 2016.
with cloud computing”,Mobile Networks and Applications, 16(3), pp. 270-284. [51] D.Sgandurra and E. Lupu”,Evolution of attacks, threat models, and solutions for
2011. virtualized systems”,ACM Computing Surveys (CSUR), 48(3), pp. 46. 2016.
[31] B. G. Chun, S. Ihm, P. Maniatis, M. Naik and A. Patti ,“Clonecloud: elastic [52] N. Paladi, C. Gehrmann and A. Michalas, “Providing user security guarantees in
execution between mobile device and cloud”,in Proceedings of the 6th conference public infrastructure clouds”,IEEE Transactions on Cloud Computing, pp.1-1,
on Computer systems, pp. 301-314, April 2011. 2016
[32] M. R. Rahimi, N.Venkatasubramanian, S. Mehrotra and A. V. [53] Y. Han, J. Chan, T.Alpcan and C. Leckie,“Using virtual machine allocation
Vasilakos”,MAPCloud: mobile applications on an elastic and scalable 2-tier cloud policies to defend against co-resident attacks in cloud computing,“. IEEE
architecture, ” in 5th IEEE International Conference on Utility and Cloud Transactions on Dependable and Secure Computing, 14(1), pp. 95-108, 2017.
Computing (UCC), pp. 83-90, November 2012.
[54] A. Arabo and B. Pranggono,“Mobile malware and smart device security: Trends,
[33] X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham and S. Jeong, “ Securing challenges and solutions”,in 19th IEEE International Conference on Control
elastic applications on mobile devices for cloud computing, ” in proceedings of the Systems and Computer Science (CSCS), pp. 526-531, May 2013.
2009 ACM workshop on Cloud computing security, pp. 127-134, November 2009.
[55] J. Walls and K. K. R Choo,“A Review of Free Cloud-Based Anti-Malware Apps
[34] V. Odelu, A.K. Das, Y.S. Rao, S. Kumari, M. K. Khan and K. K. R for Android”,in IEEE Trustcom/BigDataSE/ISPA, 1, pp. 1053-1058, August 2015.
Choo,“Pairing-based CP-ABE with constant-size ciphertexts and secret keys for
cloud environment, ” Computer Standards & Interfaces, May 2016.
[56] J. Imgraben, A.Engelbrecht, and K. K. R Choo,“Always connected, but are smart
mobile users getting more security savvy? A survey of smart mobile device
[35] M.Qiu, K. Gai, B.Thuraisingham, L. Tao, and H. Zhao, H”,Proactive user-centric users”,Behaviour & Information Technology, 33(12), pp.1347-1360, 2014.
secure data scheme using attribute-based semantic access controls for mobile
clouds in financial industry”,Future Generation Computer Systems, February 2016.
[57] S. Son, G.Jung, S. Jun, “An SLA-based cloud computing that facilitates resource
allocation in the distributed data centers of a cloud provider”, Journal
[36] M.Sookhak, A. Gani, M. K. Khan and R. Buyya,“Dynamic remote data auditing Supercomputer, 64, pp. 606-637, 2013.
for securing big data storage in cloud computing”,Information Sciences, 380, pp.
101-116. 2017.
[58] S. Al-Janabi, I. Al-Shourbaji, M. Shojafar, S. Shamshirband, Survey of main
challenges (security and privacy) in wireless body area networks for healthcare
[37] Y. Yu, Y. Li, M. H. Au,., W. Susilo, K. K. R. Choo and X Zhang,“Public cloud applications, Egyptian Informatics Journal, Volume 18, Issue 2, Pages 113-122,
data auditing with practical key update and zero knowledge privacy, ” ISSN 1110-8665, 2017. http://dx.doi.org/10.1016/j.eij.2016.11.001.
in Australasian Conference on Information Security and Privacy, pp. 389-405, July
2016.
[59] R. Buyya, H. Stockinger, J. Giddy and D. Abrams, “Economic models for
management of resources in grid computing”, The Journal of Concurrency and
[38] M. Louk, and H. Lim”,Homomorphic encryption in mobile multi cloud Computation, 14, pp. 1507-1542, 2002.
computing”,in IEEE International Conference on Information Networking
(ICOIN), pp. 493-497, January 2015.
[60] P. Samimi, , Y.Teimouri and M. Mukhtar, “A combinatorial double auction
resource allocation model in cloud computing”, Information Sciences, 357, pp.
[39] H. Wang, S. Wu, M. Chen and W. Wang,“Security protection between users and 201-216, 2016.
the mobile media cloud”,IEEE Communications Magazine, 52(3), pp. 73-79, 2014.
[61] X. Huang, R.Yu, J.Kang, J. Ding, S. Maharjan, S. Gjessing, Y. Zhang,“Dynamic
[40] K.Zkik, G.Orhanou and S. El Hajji,“Secure scheme on mobile multi cloud resource pricing and scalable cooperation for mobile cloud computing”,
computing based on homomorphic encryption”,in IEEE International Conference in Ubiquitous Intelligence and Computing and 12th IEEE International Conference
on Engineering & MIS (ICEMIS), pp. 1-6 September 2016, on Autonomic and Trusted Computing , IEEE International Conference on
[41] S. K.Pasupuleti, S. Ramalingam and R. Buyya,“An efficient and secure privacy- Scalable Computing and Communications and Its Associated Workshops (UIC-
preserving approach for outsourced data of resource constrained mobile devices in ATC-ScalCom), pp. 786-792, August 2015.

67
65

View publication stats

Potrebbero piacerti anche