Submit Search
Upload
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challenges
•
0 likes
•
104 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i6/IRJET-V4I6731.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 9
Download now
Download to read offline
Recommended
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
ijitcs
Discovering and Understanding The Security Issues In IoT Cloud
Discovering and Understanding The Security Issues In IoT Cloud
CSCJournals
Recent advances in industrial wireless sensor networks toward efficient manag...
Recent advances in industrial wireless sensor networks toward efficient manag...
redpel dot com
IRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human Life
IRJET Journal
Insight into IoT Applications and Common Practice Challenges
Insight into IoT Applications and Common Practice Challenges
ijtsrd
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
IJERD Editor
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET Journal
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
ijasuc
Recommended
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
ijitcs
Discovering and Understanding The Security Issues In IoT Cloud
Discovering and Understanding The Security Issues In IoT Cloud
CSCJournals
Recent advances in industrial wireless sensor networks toward efficient manag...
Recent advances in industrial wireless sensor networks toward efficient manag...
redpel dot com
IRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human Life
IRJET Journal
Insight into IoT Applications and Common Practice Challenges
Insight into IoT Applications and Common Practice Challenges
ijtsrd
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
IJERD Editor
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET Journal
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
ijasuc
76 s201918
76 s201918
IJRAT
IRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT Applications
IRJET Journal
Cyber Physical System
Cyber Physical System
GRD Journals
Cse 8th sem syllabus
Cse 8th sem syllabus
Akshatha Nair
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
AIRCC Publishing Corporation
20120130406025
20120130406025
IAEME Publication
Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things
IJECEIAES
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
Eswar Publications
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
AIRCC Publishing Corporation
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
IJECEIAES
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IJNSA Journal
Interoperability framework for data exchange between legacy and advanced mete...
Interoperability framework for data exchange between legacy and advanced mete...
Alexander Decker
Interoperability framework for data exchange between legacy and advanced mete...
Interoperability framework for data exchange between legacy and advanced mete...
Alexander Decker
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
IRJET Journal
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
ijwmn
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS
ijcsit
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
ijsrd.com
Internet of Things
Internet of Things
Mphasis
Cyber physical systems: A smart city perspective
Cyber physical systems: A smart city perspective
IJECEIAES
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTING
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTING
ijistjournal
Mobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applications
eSAT Publishing House
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
More Related Content
What's hot
76 s201918
76 s201918
IJRAT
IRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT Applications
IRJET Journal
Cyber Physical System
Cyber Physical System
GRD Journals
Cse 8th sem syllabus
Cse 8th sem syllabus
Akshatha Nair
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
AIRCC Publishing Corporation
20120130406025
20120130406025
IAEME Publication
Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things
IJECEIAES
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
Eswar Publications
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
AIRCC Publishing Corporation
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
IJECEIAES
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IJNSA Journal
Interoperability framework for data exchange between legacy and advanced mete...
Interoperability framework for data exchange between legacy and advanced mete...
Alexander Decker
Interoperability framework for data exchange between legacy and advanced mete...
Interoperability framework for data exchange between legacy and advanced mete...
Alexander Decker
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
IRJET Journal
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
ijwmn
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS
ijcsit
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
ijsrd.com
Internet of Things
Internet of Things
Mphasis
Cyber physical systems: A smart city perspective
Cyber physical systems: A smart city perspective
IJECEIAES
What's hot
(19)
76 s201918
76 s201918
IRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT Applications
Cyber Physical System
Cyber Physical System
Cse 8th sem syllabus
Cse 8th sem syllabus
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
20120130406025
20120130406025
Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
Interoperability framework for data exchange between legacy and advanced mete...
Interoperability framework for data exchange between legacy and advanced mete...
Interoperability framework for data exchange between legacy and advanced mete...
Interoperability framework for data exchange between legacy and advanced mete...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
Internet of Things
Internet of Things
Cyber physical systems: A smart city perspective
Cyber physical systems: A smart city perspective
Similar to Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challenges
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTING
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTING
ijistjournal
Mobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applications
eSAT Publishing House
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
IRJET Journal
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
James Heller
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
IJCI JOURNAL
Microgrid_Digital_Twins_Concepts_Applications_and_Future_Trends.pdf
Microgrid_Digital_Twins_Concepts_Applications_and_Future_Trends.pdf
RafikCherni
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
IRJET Journal
International Journal of Computational Science, Information Technology and Co...
International Journal of Computational Science, Information Technology and Co...
rinzindorjej
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
INFOGAIN PUBLICATION
07 20252 cloud computing survey
07 20252 cloud computing survey
IAESIJEECS
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
AlAtfat
Data Security in Mobile Cloud Computing A State of the Art Review
Data Security in Mobile Cloud Computing A State of the Art Review
Rida Qayyum
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
Karla Long
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc Networks
AM Publications,India
IJET-V3I1P24
IJET-V3I1P24
IJET - International Journal of Engineering and Techniques
40120130405016
40120130405016
IAEME Publication
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET Journal
Similar to Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challenges
(20)
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTING
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTING
Mobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applications
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
Microgrid_Digital_Twins_Concepts_Applications_and_Future_Trends.pdf
Microgrid_Digital_Twins_Concepts_Applications_and_Future_Trends.pdf
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
International Journal of Computational Science, Information Technology and Co...
International Journal of Computational Science, Information Technology and Co...
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
07 20252 cloud computing survey
07 20252 cloud computing survey
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
Data Security in Mobile Cloud Computing A State of the Art Review
Data Security in Mobile Cloud Computing A State of the Art Review
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc Networks
IJET-V3I1P24
IJET-V3I1P24
40120130405016
40120130405016
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVM
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
AbhinavSharma374939
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Recently uploaded
(20)
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challenges
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2987 Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challenges G. Kishore Kumar1, Dr. M. Gobi2 1Research Scholar, Dept. of Computer Science, Chikkanna Government Arts College, Tiruppur, India. 2 Asst. Professor, Dept. of Computer Science, Chikkanna Government Arts College, Tiruppur, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud Computing is a fast-growing area in the recent past times and Mixture of Mobile Computing and Cloud Computing termed as Mobile Cloud Computing (MCC). MCC is the incorporation of cloud computing into the mobile environment. This paper enlightens the current trend in Mobile Cloud Computing, its security issues/challenges and associated research challengesinwhichourresearchwouldbe focusing on. Key Words: Cloud Computing, Mobile Cloud Computing, MCC, Algorithms, Research issues,challenges,Cryptography, ECC, HECC. 1. INTRODUCTION 1.1. Cloud Computing Cloud computing is denoted as “cloud” which means the supply of on-demand computing resources to store, manage, and process data over the internet on pay-for-use basis. It is an Internet-based computing type, which is offered on demand to computer/other devices that needs data and shared processing resources. Fig. 1 Cloud Computing Overview Cloud consists of thebelowgiven essential characteristics: • On-Demand self-service • Ubiquitous network access • Location-independent resource pooling • Rapid elasticity • Measured service Below given are the Cloud delivery models: • Application/Software as a Service (SaaS) • Platform as a Service (PaaS) • Infrastructure as a Service (IaaS) Below given are the Cloud deployment models: • Private • Public • Community • Hybrid • Virtual Private Cloud 1.2. Mobile Cloud Computing Mobile Cloud Computing is a new model in which the Cloud Computing resources and services made available for mobile devices. Mobile computing is not meant just for smart-phone users but also for wide-ranging mobile subscribers as well. This MCC technologyisdefined basedon three major concepts: software [mobile applications available in the device], hardware [mobile devices] and communication [network, data delivery and various protocols]. The below given diagrams describes the MCC architecture: Fig. 2 MCC Architecture
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2988 2. NEED OF SECURITY IN MCC Security is very much essential as mobile devices can encounter various security threatsas they are exposedtothe outer world, which can cause virus attacks. While using mobile in cloud environments, the users and/or application developers must be very cautious on authentication and integrity of data/application. The mobile security can be easily achieved by any security software installation like mobile anti-virus programs. GPS causes privacy issues and LBSas well as theyprovidethecurrentlocationdetails,which is a private information. The Mobile Cloud Computing security issues can be categorized as given below: • Mobile threats • Cloud threats. The security related issues are further divided into the below given broad level categories: • Mobile Cloud Infrastructure Issues • Mobile Cloud Communication Channel Issues 3. RESEARCH PAPERS PUBLISHED Following are some of the papers published in the area of MCC & its Security: 1. A Survey on User Authentication Mechanism in Mobile Cloud Computing by A. Cecil Donald, M. Regin, Dr. A. Aloysius, Dr. L. Arockiam in International Journal of Emerging Trends in ComputingandCommunicationTechnologyVolume 1, No 3, August 2015 ISSN: 2348 4454 talks about a Survey on various User AuthenticationMechanisms in Mobile Cloud Computing and also the problems persist in the existing mechanisms. 2. Mobile Cloud Computing (MCC): Open Research Issues by Amit K. Sharma, Priyanka Soni in International Journal of InnovationsinEngineering and Technology (IJIET) - Vol. 2 Issue 1 February 2013 ISSN: 2319 – 1058 talks about main open research issues connected with the mobile usagein cloud computing. This is useful person who reads can get an overview of MCC & their issues, current solutions and methodologies with some additional aspects for the further work. 3. MOBILE CLOUD COMPUTING AS FUTURE FOR MOBILE APPLICATIONS by C Shravanthi, H S Guruprasad in IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 talks about the survey on mobile cloud computing applications, challenges, existing solutions and approaches to overcome these challenges. 4. Mobile cloud computing: A survey by Niroshinie Fernando, Seng W. Loke, Wenny Rahayu in Future Generation Computer Systems 29 (2013) 84–106 talks about an extensive survey of mobile cloud computing research, while highlighting the specific concerns in mobile cloud computing. We present a taxonomy based on the key issues in this area, and discuss the different approaches taken to tackle these issues. We conclude the paper with a critical analysis of challenges that have not yet been fully met, and highlight directions for future work. 5. Overview on Mobile Cloud Computing Security Issues by D. Popa K. Boudaoud,M.Cremene,inSeria ELECTRONICĂ şi TELECOMUNICAŢII TRANSACTIONS on ELECTRONICS and COMMUNICATIONS M. Borda Tom 58(72), Fascicola 1, 2013 talks about an overview on Mobile Cloud Computing and it’s security issues. 6. Securing Mobile Cloud Using Finger Print Authentication by IehabALRassan and HananAlShaher from Department of Computer Science, King Saud University, Riyadh,SaudiArabia proposes and implements a new user authentication mechanism of mobile cloud computing using fingerprint recognition system. 7. Towards secure mobile cloud computing: A survey by Abdul Nasir Khana, M.L. Mat Kiah, Samee U. Khan, Sajjad A. Madani in Future Generation Computer Systems 29 (2013) 1278–1299 talks about highlights the current state of the art work proposed to secure mobile cloud computing infrastructures, identifies the potential problems and provides a taxonomy of the state of the art. 8. A Study of Mobile Cloud Computing And Challenges by Pragaladan. R, Leelavathi .M in International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 7, July 2014 talks about overview of MCC and associated challenges in it. 9. Mobile Cloud Computing Security Issues: Overview by Jaspreet Kaur Aulakh, Sugandha Sharma , Mayank Arora in International Journal ofAdvanced Research in Computer Engineering & Technology (IJARCET) Volume 3 Issue 5, May 2014 talks about review of MCC, concept of MCC and approaches in MCC based on various applications in MCC. 10. Security Issues in Mobile Cloud Computing by JASLEEN in International Journal of Computer Science & Engineering Technology (IJCSET) presents the concept of mobile cloud computing, new terminology Mcloud and other various MCC applications, major concerns and security concern with the preventive measures.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2989 11. Mobile Cloud Computing: The Future of Cloud by Pragya Gupta, Sudha Gupta in International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 1, Issue 3 presents an overview of Mobile Cloud Computing which includes it’s architecture, benefits, key challenges, current research and open issues in MCC. 12. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing by Ruixuan Li, Member, IEEE, Chenglin Shen, Heng He, Zhiyong Xu, and Cheng-Zhong Xu, Member, IEEE proposes a lightweight data sharing scheme (LDSS) for mobile cloud computing which adopts CP-ABE, an access control technology used in normal cloud environment. 13. A Literature Survey on Mobile Cloud Computing: Open Issues and Future Directions by Nitesh Kaushik, Gaurav, Jitender Kumar in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 may, 2014 Page No. 6165-6172 presents a review on the background and principle of MCC, characteristics, recent research works and future research trends. 14. A Mobile Cloud Computing Architecture with Easy Resource Sharing by Debabrata SarddarandRajesh Bose in International Journal of Current Engineering and Technology Vol.4, No.3 (June 2014) talks about the proposed model and aims to illustrate the manner in which mobile device users would be able to use the cloud application and also take advantage of energy savings not only in terms of power consumed, but also most importantly – time. 15. A MOBILE MULTIMEDIA CLOUD COMPUTING ON THE WEB by Gayathri V, Priyadarsini K in International Journal of Computer Science and Mobile Applications,Vol.2Issue.4,April-2014talks about multimedia embedded with MCC in online personal health record (PHR) systems. 16. A Review on Distributed Application Processing Frameworks in Smart Mobile Devices for Mobile Cloud Computing by Muhammad Shiraz, Abdullah Gani, Rashid Hafeez Khokhar, Member, and Rajkumar Buyya in IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 3, THIRD QUARTER 2013 talksaboutissuesandchallengesto existing DAPFs in developing, implementing, and executing computational intensive mobile applications within MCC domain. 17. A Review on Mobile Cloud Computing: Issues, Challenges and Solutions by Mandeep Kaur Saggi, Amandeep Singh Bhatia in International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 6, June 2015 talks about a review on the background and principle of MCC, characteristics, recent research work, and future research trends. 18. A Review on Mobile Cloud Computing by S M Shamim,Angona Sarker,AliNewazBahar,Md.Atiqur Rahman in International Journal of Computer Applications (0975 – 8887) Volume 113 – No. 16 talks about the overviewof mobilecloudcomputing technology with the architecture, applications, major characteristics, security issues, advantage and limitation and possible solutions. 19. A Survey of Mobile Cloud Computing Applications: Perspectives and Challenges by Yating Wang and Ing-Ray Chen talks about insights for the enabling technologies and challenges that lie ahead to move forward from mobile computing to mobile cloud computing for building the next generation mobile cloud applications. For each of the challenges, they have provided a survey of existing solutions, identify research gaps, and suggested future research areas. 20. A Survey of Mobile Cloud Computing for Smart Phones by P.CHOZHA RAJAN, K.JAYASHREE in International Journal of Science, Engineering and Technology Research (IJSETR), Volume 4, Issue 6, June 2015 talks about the efficient data storage for Mobile Cloud Computing (MCC) and reduces security issues and challenges. 21. A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches by Hoang T. Dinh, Chonho Lee, Dusit Niyato, and Ping Wang in Wireless Communications and MobileComputing– Wiley talks about survey of MCC, which helps general readers have an overview of the MCC including the definition, architecture, and applications. The issues, existing solutions and approaches are presented. In addition, the future research directions of MCC are discussed. 22. A Survey on Mobile Cloud Computing Architecture, Applications and Challenges by Ms.Gayathri M R, Prof K. Srinivas in International Journal ofScientific Research Engineering & Technology (IJSRET),ISSN 2278 – 0882 Volume 3, Issue 6, September 2014 talks about an overview of MCC in terms of its concepts, Essential Characteristics, Service and Deployment models. In addition, it presents the architecture of MCC and its challenges and discusses some of the applications, advantages and current Research issues. 23. An Agent-based Optimization Framework for Mobile-Cloud Computingby PelinAnginandBharat Bhargava in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, volume: 4, number: 2 talks about a
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2990 dynamic execution time optimization framework for mobile-cloud computing. 24. An AuthenticateCryptographybasedsecuritymodel for handling multiple requestfrommultipledevices for Mobile Cloud Computing by Debabrata Sarddar, Enakshmi Nandi in International Journal of Advanced Research in Computer and Communication Engineering Vol.5,Issue1,January 2016 talks about systematicallyexploretheprivacy and security issues and launch a cryptography based model for handling multiple request from multiple devices for Mobile Cloud Computing. 25. Application Processing Approach for Smart Mobile Devices in Mobile Cloud Computing by Hitesh A. Bheda,Jignesh Lakhani in International Journal of Advanced Research in Computer Science and Software Engineering,Volume 3, Issue 8, August 2013 talks about the issues and challenges to the existing algorithms in developing, implementing and executing computational intensive mobile applications within MCC environment. 26. ARCHITECTURE OF MOBILE APPLICATION, SECURITY ISSUES AND SERVICES INVOLVED IN MOBILE CLOUD COMPUTING ENVIRONMENT by Swarnpreet Singh, Ritu Bagga,Devinder Singh, Tarun Jangwal in International Journal ofComputer and Electronics Research [Volume 1, Issue 2, August 2012] talks about architecture of MCC (Mobile cloud computing) with the different services needed by the client andtheserverinMCC. 27. Authentication Methods in Cloud Computing: A Survey by Mahnoush Babaeizadeh, Majid Bakhtiari and Alwuhayd Muteb Mohammed in Research Journal of Applied Sciences, Engineering and Technology 9(8): 655-664, 2015 talks about a review on the various methods of authenticationin cloud environment. 28. Authentication in the Clouds: A Framework and its Application to Mobile Users by Richard Chow,Markus Jakobsson,Ryusuke Masuoka talks about flexible framework for supporting authentication decisions called as TrustCube. 29. Biometric Authentication as a Service on Cloud:Novel Solution by Himabindu Vallabhu, R V Satyanarayana in International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231- 2307, Volume-2, Issue-4, September 2012 talks about biometric authentication on single sign-on. 30. Central Controller Framework for Mobile Cloud Computing by Debabrata Sarddar, Priyajit Sen and Manas Kumar Sanyal in International Journal of Grid and Distributed Computing Vol. 9, No. 4 (2016), pp.233-240talksabouta framework,which keeps track of the status of all other devices during the communication by running passive scan over the devices. 31. Cloud Computing in Mobile Applications by Deepti Sahu, Shipra Sharma, Vandana Dubey, Alpika Tripathi in International Journal of Scientific and Research Publications, Volume 2, Issue 8, August 2012 ISSN 2250-3153 talks about how to implement cloud computing for mobile devices providing data storage and processing outside the device along with the challenges in it and solutions as well. 32. Efficient Energy Reduction and Enhancing Security Privacy in Mobile Cloud Computing by B.Sudhanantham, M.Shankar in International Journal of Innovative Research in Computer and Communication Engineering Vol. 2, Issue 2, February 2014 talks about an encryption based scheme for the situation of single accessible CS and then a coding based scheme for the situation that multiple CSs are available without relying on encryption. They also have provided an provide an analysis of the critical factors affecting the energy consumption of mobile clients in cloud computing. 33. Enabling Secure Location-based Services in Mobile Cloud Computing by Yan Zhu,Di Ma,Dijiang Huang,Changjun Hu in ACM MCC’13, August 12, 2013 talks about propose an innovative location- based fine-grained access control mechanism for LBSs, enabling effective fine grained accesscontrol, location-based authentication and privacy protection. 34. Enhancing Mobile Cloud Computing Security Using Steganography by HassanReza,MadhuriSonawane in Journal of Information Security,2016,7,245-259 talks about how steganography can be used to enhance the security and privacy of data images maintained in Cloud mobile applications. 35. FACE RECOGNITION FOR SOCIAL MEDIA WITH MOBILE CLOUD COMPUTING by Prasetyawidi Indrawan, Slamet Budiyatno, Nur Muhammad Ridho, and Riri Fitri Sari in International Journal on Cloud Computing: Services and Architecture (IJCCSA),Vol.3, No.1 talks about a face recognition system on mobile devices by combining cloud computing services. 36. Fast Dynamic Execution Offloading for Efficient Mobile Cloud Computing by Seungjun Yang, Yongin Kwon, Yeongpil Cho, Hayoon Yi, Donghyun Kwon, Jonghee Youn, and Yunheung Paek in International Conference on Pervasive Computing and Communications (PerCom), San Diego,March2013 talks about novel techniques based on compiler code analysis thateffectivelyreducethetransferred data size by transferring only the essential heap objects.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2991 37. The Future of Mobile Cloud Computing: Integrating Cloudlets and Mobile Edge Computing by Yaser Jararweh, Ahmad Doulat, Omar AlQudah, Ejaz Ahmed, Mahmoud Al-Ayyoub, and Elhadj Benkhelifa in 23rd International Conference on Telecommunications (ICT) proposed a hierarchical model that is composed of MEC servers and Cloudlets infrastructures to increase the coverage area for the mobile users by which the users can accomplish the requested services with minimal cost like power and delay. 38. IncreasingThePerformanceOfMobileSmartphones Using Partition And Migration Of Mobile Applications To Cloud Computing by Hatem M. Abdul Kader, Mohie M. Hadhoud, Salah M El-Sayed, Diaa Salama AbdElminaam in INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTSAND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 5 ISSN 2347-4289 developedanarchitecture that uses cloud to do computations that consume resources badly on mobiles. It targets at findingthe right spots in an application automatically where the execution can be partitioned and migrated to the cloud. 39. Smart Phone and Mobile Computing: An IntroductionbyRambabuV,Dr.R.Shanmugavadivu in International Research Journal of Engineering and Technology (IRJET)Volume:03Issue:03|Mar- 2016 talks about explains about the similarities, differences and the cutting edge technologies and emerging applications of next generation of mobile computing with some challenges, issues in the mobile domain. 40. Security in Offloading Computations in Mobile Systems Using Cloud Computing by S.Masiperiyannan,C.M.Mehathaf Begum, I.Mohammed Farook Ali, G.Mayuri Priya, S.Sudhakar in International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 3, Issue 3, March 2014 talks about offloading techniques in mobile, its privacy concerns and privacy protection techniques such as encryption and steganography. 41. Secure Mobile Cloud Computing Based-On Fingerprint by Alaa Hussein Al-Hamami, Jalal Yousef AL-Juneidi in World of Computer Science and Information Technology Journal (WCSIT)ISSN: 2221-0741 Vol. 5, No. 2, 23-27,2015talksaboutthe fingerprints to prove the users identity to determine if this user is authorized or not in which The results showed that this scheme is very strong and difficult to break it. 42. SDSM: A Secure Data Service Mechanism in Mobile Cloud Computing by Weiwei Jia yz, Haojin Zhuy, Zhenfu Caoyx, Lifei Weiy, Xiaodong Lin in The First International Workshop on Security in Computers, Networking and Communications talks about a secure mobile user-based data service mechanism (SDSM) to provide confidentiality and fine-grained access control for data stored in the cloud. 43. Review On Digital Library Application Services Of Mobile Cloud Computing by Dr AbdulrahmanM.Al- Senaidy, Tauseef Ahmad in INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 2, ISSUE 2, FEBRUARY 2013 ISSN 2277-8616 talks about the basic concept of mobile cloud computing and its growth also aswell as its mobile cloud architecture, and also deal with digital library services and synchronization with mobile cloud application. 44. Mobile Cloud Computing: Security Challenges for Threats Reduction by Farhad Soleimanian Gharehchopogh, Raheleh Rezaei, Isa Maleki in International Journal of Scientific & Engineering Research, Volume 4, Issue 3, March‐2013 ISSN 2229‐5518 talks about study mobile technology and MCC security challenges facing this technology have discussed. And with respect to services provided in cloudenvironment,theyhave proposed a new MCC to provide security 45. Research on Mobile Cloud Computing: Review, Trend and Perspectives by Han Qi,AbdullahGaniin University of Malaya, Kuala Lumpur, Malaysia talks about a review on the background and principle of MCC, characteristics, recent research work, and future research trends. 46. Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms by Tawfiq S. Barhoom, Mahmoud M. Abu Ghosh in International Journal of Research in Engineering and Science (IJRES) Volume 4 Issue 1 talks about a proposed solution to the problem of privacy with saving and reducing resources power energy, processor and Memory through data encryption in the mobile cloud computing by symmetric algorithm and sent to the private cloud and then the data is encrypted again and sent to the public cloud through Asymmetric algorithm. 47. PROTECTION ISSUES IN MOBILE CLOUD COMPUTINGbyV.Gayathri, G.Nithya,K.S.Saravanan, M.Jothilakshmi in INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS Vol.2 Issue.1 talks about the concept of mobile cloud computing with M-Cloud. It also describes about MCC applications, major concerns and security concernwiththepreventivemeasures. 48. Protection concern in Mobile Cloud Computing- A Survey by Mrs. Yogita D. Mane,Prof. Kailas K. Devadkar in IOSR Journal of Computer Engineering (IOSR-JCE) ISSN : 2278-0661, ISBN : 2278-8727,PP
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2992 : 39-44 talks about security issues in mobile cloud computing. 49. Privacy and Security in Mobile Cloud Computing: Review by Sapna Malik,MM Chaturvedi in International Journal of Computer Applications (0975 – 8887) Volume 80 – No 11 talks about privacy and security issues of Mobile Cloud Computing. 50. Mobile Cloud Computing Perspectives and Challenges by SUGANYA V, SHANTHI A L in International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Issue 7, Volume 2 talks about the background and principle of MCC, characteristics, challenges and recent research work. 51. Mobile Proactive SecretSharinginCloudComputing by Vaibhav Kumar,R. P. Ojha in IJRREST: International Journal of Research Review in Engineering Science and Technology (ISSN 2278- 6643) | Volume-1 Issue-2 talks about a scheme to secure any secret value in cloud network by Mobile Proactive Secret Sharing (MPSS) which is an extension of proactive secret sharing. 52. Mobile phones and cloud computing by Oskar Hamrén in Department of informatics,Human Computer Interaction Master’s programme talks about A quantitative research paper on mobile phone application offloading by cloud computing utilization. 53. Mobile Cloud Security Issues and Challenges: A Perspective by A. Cecil Donald, S. Arul Oli, L. Arockiam in International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1 talks about the working concepts of MCC and its various security issues and solutions given by researchers have analyzed. 54. Mobile Cloud Computing: The potential, Challenges & Applications by Swati Verma, Deependra Rastogi in International Conference of Advance Research and Innovation (ICARI-2014) talks about an overview of Mobile Cloud Computing that includes architecture, benefits, key challenges, present research and open issues. 55. Mobile Cloud ComputingSecurityConsiderations by Soeung-Kon(Victor) Ko, Jung-Hoon Lee, Sung Woo Kim in 보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 talksabout different security issues that arise about how safe the mobile cloud computing environment is. 4. Abbreviations and Acronyms Abbreviation Meaning CSA Cloud Security Alliance ECC Elliptic curve cryptography HECC Hyper elliptic curve cryptography SLA Service Level Agreement MCC Mobile Cloud Computing IBE Identity Based Encryption PKI Public Key Infrastructure MCC Mobile Cloud Computing LDSS lightweight data sharing scheme SMD Smart Mobile Devices DAPF Distributed Application Processing Frameworks LBS Location Based Services MEC Mobile Edge Computing GPS Global Positioning System 5. CONCLUSIONS The prevalence of Mobile cloudcomputingisblockedby its security widely. The need of security is very much essential on various concerned areas. Our future research would be focusing on enhancement of existing security frameworks & multi-factor authentication technologies for highly secured data using cryptography.Ourresearchgoal is to offer a more reliable security in Mobile cloud computing. REFERENCES [1] Mobile Cloud Computing Forum, available online: http://www.mobilecloudcomputingforum.com [2] White Paper, “Mobile Cloud Computing Solution Brief,” AEPONA, November 2010. [3] Amit K. Sharma, Priyanka Soni,“ Mobile Cloud Computing (MCC): Open Research Issues”,International Journal of Innovations in Engineering and Technology (IJIET) - Vol. 2 Issue 1 February 2013 ISSN: 2319 – 1058 [4] C Shravanthi, H S Guruprasad,"MOBILE CLOUD COMPUTING AS FUTURE FOR MOBILE APPLICATIONS",IJRET: International Journal of Research in Engineering and Technology eISSN: 2319- 1163 | pISSN: 2321-7308 [5] Niroshinie Fernando, Seng W. Loke, Wenny Rahayu,"Mobile cloud computing: A survey",Future Generation Computer Systems 29 (2013) 84–106
7.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2993 [6] D. Popa K. Boudaoud, M. Cremene, M. Borda,"Overview on Mobile Cloud Computing Security Issues",Tom 58(72), Fascicola 1, 2013 [7] Abdul Nasir Khana, M.L. Mat Kiah, Samee U. Khan,Sajjad A. Madani,"Towards secure mobile cloud computing: A survey",FutureGenerationComputerSystems29(2013) 1278–1299 [8] Pragaladan. R, Leelavathi .M,"A Study of Mobile Cloud Computing And Challenges",International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 7, July 2014 [9] Jaspreet Kaur Aulakh, Sugandha Sharma , Mayank Arora,"Mobile Cloud Computing Security Issues: Overview ",International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3 Issue 5, May 2014 [10] JASLEEN,” Security Issues In Mobile Cloud Computing”, Jasleen / International Journal of Computer Science & Engineering Technology (IJCSET) [11] Pragya Gupta, Sudha Gupta,” Mobile Cloud Computing: The Future of Cloud”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 1, Issue 3, September 2012 [12] Nitesh Kaushik, Gaurav, Jitender Kumar,” A Literature Survey on Mobile Cloud Computing: Open Issues and Future Directions”, International Journal OfEngineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 may, 2014 Page No. 6165-6172 [13] Mandeep Kaur Saggi, AmandeepSinghBhatia,"AReview on Mobile Cloud Computing: Issues,Challenges and Solutions",International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 6, June 2015 [14] Debabrata Sarddar and Rajesh Bose,"A Mobile Cloud Computing Architecture with Easy Resource Sharing", International Journal of Current Engineering and Technology Vol.4, No.3 (June 2014) [15] Gayathri V, Priyadarsini K,“A MOBILE MULTIMEDIA CLOUD COMPUTING ON THE WEB”,International Journal of Computer Science and Mobile Applications, Vol.2 Issue. 4, April- 2014. [16] Muhammad Shiraz, Abdullah Gani, Rashid Hafeez Khokhar, Member, and Rajkumar Buyya, “A Review on Distributed Application Processing Frameworks in Smart Mobile Devices for Mobile Cloud Computing”, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 3, THIRD QUARTER 2013 [17] Mandeep Kaur Saggi, AmandeepSinghBhatia,"AReview on Mobile Cloud Computing: Issues,Challenges and Solutions",International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 6, June 2015 [18] S M Shamim,Angona Sarker,Ali Newaz Bahar,Md.Atiqur Rahman, “A Review on Mobile Cloud Computing”, International Journal of Computer Applications (0975 – 8887) Volume 113 – No. 16, March 2015 [19] Yating Wang and Ing-Ray Chen,"A Survey of Mobile Cloud Computing Applications: Perspectives and Challenges" [20] P.CHOZHA RAJAN, K.JAYASHREE, “A Survey of Mobile Cloud Computing for Smart Phones”, International Journal of Science, Engineering and Technology Research (IJSETR), Volume 4, Issue 6, June 2015 [21] Hoang T. Dinh, Chonho Lee, Dusit Niyato, and Ping Wang,” A Survey of Mobile Cloud Computing:Architecture,Applications,andApproaches”, Wireless Communications and Mobile Computing – Wiley [22] Ms.Gayathri M R, Prof K. Srinivas,"A Survey on Mobile Cloud Computing Architecture, Applications and Challenges",International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 – 0882 Volume 3, Issue 6, September 2014 [23] Pelin Angin and Bharat Bhargava,"An Agent-based Optimization Framework for Mobile-Cloud Computing",Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, volume: 4, number: 2 [24] Debabrata Sarddar, Enakshmi Nandi,”An Authenticate Cryptography based security model for handling multiple request from multiple devicesforMobileCloud Computing”,International Journal ofAdvancedResearch in Computer and Communication Engineering Vol. 5, Issue 1, January 2016 [25] Hitesh A. Bheda,JigneshLakhani,"ApplicationProcessing Approach for Smart Mobile Devices in Mobile Cloud Computing",International Journal ofAdvancedResearch in Computer Science and Software Engineering,Volume 3, Issue 8, August 2013 [26] Swarnpreet Singh, Ritu Bagga,Devinder Singh, Tarun Jangwal,"ARCHITECTURE OF MOBILE APPLICATION, SECURITYISSUESANDSERVICESINVOLVEDIN MOBILE CLOUD COMPUTING ENVIRONMENT",International Journal of Computer and Electronics Research [Volume 1, Issue 2, August 2012] [27] Mahnoush Babaeizadeh, Majid Bakhtiari and Alwuhayd Muteb Mohammed,”Authentication Methods in Cloud Computing: A Survey”,Research Journal of Applied Sciences, Engineering and Technology 9(8): 655-664, 2015 [28] Richard Chow,Markus Jakobsson,Ryusuke Masuoka,”Authentication in the Clouds: A Framework and its Application to Mobile Users” [29] Himabindu Vallabhu, R V Satyanarayana,"Biometric Authentication as a Service on Cloud:Novel Solution",International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue- 4, September 2012 [30] Deepti Sahu, Shipra Sharma, Vandana Dubey, Alpika Tripathi,”Cloud Computing in Mobile Applications”,International Journal of Scientific and Research Publications, Volume 2, Issue 8, August 2012 ISSN 2250-3153 [31] B.Sudhanantham, M.Shankar,”Efficient Energy Reduction and Enhancing Security Privacy in Mobile Cloud Computing”, International Journal of Innovative Research in Computer and Communication Engineering Vol. 2, Issue 2, February 2014
8.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2994 [32] Yan Zhu,Di Ma,Dijiang Huang,Changjun Hu,”Enabling Secure Location-based Services in Mobile Cloud Computing”,ACM MCC’13, August 12, 2013 [33] Hassan Reza, Madhuri Sonawane,”Enhancing Mobile Cloud ComputingSecurityUsingSteganography”,Journal of Information Security, 2016, 7, 245-259 [34] Seungjun Yang, Yongin Kwon, Yeongpil Cho, Hayoon Yi, Donghyun Kwon, Jonghee Youn, and Yunheung Paek,”Fast Dynamic Execution Offloading for Efficient Mobile Cloud Computing”, International Conference on Pervasive Computing and Communications (PerCom), San Diego, March 2013 [35] Yaser Jararweh, Ahmad Doulat, Omar AlQudah, Ejaz Ahmed, Mahmoud Al-Ayyoub, and Elhadj Benkhelifa,” The Future of Mobile Cloud Computing: Integrating Cloudlets and Mobile Edge Computing”,23rd International Conference on Telecommunications(ICT) [36] Hatem M. Abdul Kader, Mohie M. Hadhoud, Salah M El- Sayed, Diaa Salama AbdElminaam,”Increasing The Performance Of Mobile Smartphones Using Partition And Migration Of Mobile Applications To Cloud Computing”,INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 5 ISSN 2347- 4289 [37] Rambabu V,Dr. R. Shanmugavadivu, “Smart Phone and Mobile Computing: An Introduction”, International Research Journal ofEngineeringandTechnology(IRJET) Volume: 03 Issue: 03 | Mar-2016 [38] S.Masiperiyannan,C.M.Mehathaf Begum,I.Mohammed Farook Ali,G.Mayuri Priya,S.Sudhakar, “Security in Offloading Computations in MobileSystemsUsingCloud Computing”,International Journal ofAdvancedResearch in Electrical,Electronics and Instrumentation Engineering Vol. 3, Issue 3, March 2014 [39] Alaa HusseinAl-Hamami,Jalal YousefAL-Juneidi,”Secure Mobile Cloud Computing Based-On Fingerprint”, World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 2, 23-27, 2015 [40] Weiwei Jia yz, Haojin Zhuy, Zhenfu Caoyx, Lifei Weiy, Xiaodong Lin ,”SDSM: A Secure Data Service Mechanism in Mobile Cloud Computing”, The First International Workshop on Security in Computers, Networking and Communications [41] Dr Abdulrahman M. Al-Senaidy, Tauseef Ahmad, “Review On Digital Library Application Services Of Mobile Cloud Computing”, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 2, ISSUE 2, FEBRUARY 2013 ISSN 2277-8616 [42] Farhad SoleimanianGharehchopogh,RahelehRezaei,Isa Maleki,”Mobile Cloud Computing: Security Challenges for Threats Reduction”, International Journal of Scientific & Engineering Research, Volume 4, Issue 3, March‐2013 ISSN 2229‐5518 [43] Han Qi,Abdullah Gani ,”Research on Mobile Cloud Computing: Review,Trend and Perspectives”,University of Malaya,Kuala Lumpur,Malaysia [44] Tawfiq S. Barhoom, Mahmoud M. Abu Ghosh,”Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms”, International Journal of Research in Engineering and Science (IJRES) Volume 4 Issue 1 [45] V.Gayathri, G.Nithya, K.S.Saravanan, M.Jothilakshmi ,”PROTECTION ISSUESIN MOBILECLOUDCOMPUTING”, INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS Vol.2 Issue.1 [46] Mrs. Yogita D. Mane,Prof. KailasK.Devadkar,”Protection concern in Mobile Cloud Computing- A Survey”, IOSR Journal of Computer Engineering (IOSR-JCE) ISSN : 2278-0661, ISBN : 2278-8727, PP : 39-44 [47] Sapna Malik,MM Chaturvedi,”Privacy and Security in Mobile Cloud Computing: Review”,International Journal of Computer Applications (0975 – 8887) Volume 80 – No 11, October 2013 [48] SUGANYA V,SHANTHI A L,”Mobile Cloud Computing Perspectives and Challenges”,International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Issue 7, Volume 2 [49] Vaibhav Kumar,R. P. Ojha,”Mobile Proactive Secret Sharing in Cloud Computing”, IJRREST: International Journal of Research Review in Engineering Science and Technology (ISSN 2278- 6643) | Volume-1 Issue-2, September 2012. [50] Oskar Hamrén,”Mobile phones and cloud computing”, Departmentofinformatics,HumanComputerInteraction Master’s programme [51] A. Cecil Donald, S. Arul Oli, L. Arockiam ,”Mobile Cloud Security Issues and Challenges: A Perspective”, International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013 [52] Swati Verma, Deependra Rastogi,”Mobile Cloud Computing: The potential, Challenges & Applications”,International Conference of Advance Research and Innovation (ICARI-2014) [53] Soeung-Kon(Victor) Ko, Jung-Hoon Lee, Sung Woo Kim,”Mobile Cloud ComputingSecurityConsiderations”, 보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 BIOGRAPHIES G. Kishore Kumar is a research scholar in Department of Computer Science, Chikkanna Government Arts College, Tirupur, India. He has completed Master of Computer Applications [MCA] in Alagappa University, Karaikudi, India. His major field of study in Network Security and Cryptography.
9.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2995 Dr M.Gobi is an Associate Professor in Department of Computer Science in Chikkanna Government Arts College, Trippur, India. He teaches courses for BSc Computer Science, BCA and Master of Computer Science (MSc). His research areas of interest include Cryptography, Java, Software Engineering and Information Systems Security.
Download now