Survey on security threats in mobile cloud computing

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Cell phones are turning into a basic piece of our day by day life because of most proficient and powerful specialized devices without time and space boundation. Everybody has a portable, tablet, tablet with calling office i.e. Fablet. Distributed computing (DC) has been broadly perceived as the cutting edge's registering foundation with the fast development of portable applications and the support of Cloud Computing for an assortment of administrations, the Mobile Cloud Computing (MCC) is presented as an incorporation of Cloud Computing into the Mobile Environment. Portable Cloud Computing is picking up stream. MCC is alluded to as the framework where both the information stockpiling and the information handling occur outside the cell phone. In MCC condition, Cloud Computing, Mobile Computing and Application confront a few difficulties like Mobile Computation Offloading, Seamless Connectivity, Vendor/Data Lock-in, Long WAN Latency, Live VM (Virtual Machine) relocation issues, Low Bandwidth, Energy-Efficient Transmissions and Trust-Security and Privacy Issues. In this paper, I have talked about around a few difficulties and issues identified with the Mobile Cloud Computing. This paper gives data about Mobile Cloud Computing Application, Security and Issues.


  • Keywords


    Bandwidth; Energy Transmission; Mobile Cloud Computing.

  • References


      [1] A. Juels and B. S. Kaliski, “Pors, proofs of retrievability for large files,”in Proc. 14th ACM Conf. Computer and Commun. Security (CCS'07), 2007, pp. 574–597.

      [2] G. Ateniese,R.Burns,R.Curtmola, J. Herring,O.Khan, L. Kissner, Z.Peterson, andD. Song, “Remote data checking using provable data possession,”ACM Trans. Inf. Syst. Secur., vol. 14, no. 1, pp. 12:1–12:34, Jun. 2011.

      [3] A. N. Khana, M. L. M. Kiaha, S. U. Khanb and S. A. Madanic, "Towards secure mobile cloud computing: A survey", Future Generation Computer Systems, vol. 29, Issue 5, (2013) July. https://doi.org/10.1016/j.future.2012.08.003.

      [4] S.-T. Shen and W.-G. Tzeng, “Delegable provable data possession for remote data in the clouds,” in Proc. 13th Int. Conf. Information and common. Security (ICICS'11), 2011, pp. 93–111. https://doi.org/10.1007/978-3-642-25243-3_8.

      [5] K. D. Bowers, A. Juels, and A. Oprea, “Hail, a high- availability and integrity Layer for cloud storage,” in Proc.16th ACM Conf. Computer and Commun. Security (CCS'09), 2009, pp. 177–197.

      [6] K. Kumar and Y.-H. Lu, “Cloud computing for mobile users: Can offloading computation save energy?” Computer, vol. 43, pp. 51–56, 2010. https://doi.org/10.1109/MC.2010.98.

      [7] M. R. Prasad, J. Gyani and P. R. K. Murti, "Mobile Cloud Computing: Implications and Challenges", Journal of Information Engineering and Applications, vol. 2, no. 7, (2012).

      [8] K.Vijayakumar·C,Arun,Continuous security assessment of cloud based applications using distributed hashing algorithm in SDLC,Cluster Computing.

      [9] K.Vijayakumar·C,Arun, Analysis and selection of risk assessment frameworks for cloud based enterprise applications”, Biomedical Research, ISSN: 0976-1683 (Electronic), January 2017.

      [10] K. Vijayakumar,C.Arun,Automated risk identification using NLP in cloud based development environments,J Ambient Intell Human Computing,DOI 10.1007/s12652-017-0503-7,Springer-Verlag Berlin Heidelberg May 2017

      [11] K.Sathesh Kumar, K.Shankar, M. Ilayaraja and M. Rajesh,“Sensitive Data Security In Cloud Computing Aid Of Different Encryption Techniques” Journal of Advanced Research in Dynamical and Control Systems, vol.18, no.23, 2017.


 

View

Download

Article ID: 10004
 
DOI: 10.14419/ijet.v7i1.9.10004




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.