Security and Privacy Issues, Solutions, and Tools for MCC

With the development of cloud computing and mobility, mobile cloud computing has emerged and become a focus of research. Mobile Cloud Computing (MCC) integrates mobile computing and cloud computing aiming to extend mobile devices capabilities. By the means of on-demand self-service and extendibility, it can offer the infrastructure, platform, and software services in a cloud to mobile users through the mobile network. There is huge market for mobile based e-Commerce applications across the globe. Security and privacy are the key issues for mobile cloud computing applications. The limited processing power and memory of a mobile device dependent on inherently unreliable wireless channel for communication and battery for power leaves little scope for a reliable security layer. Thus there is a need for a lightweight secure framework that provides security with minimum communication and processing overhead on mobile devices. The security and privacy protection services can be achieved with the help of secure mobile-cloud application services. Darshan M. Tank Gujarat Technological University, India Security and Privacy Issues, Solutions, and Tools for MCC

[1]  Preeti Garg,et al.  An efficient and secure data storage in Mobile Cloud Computing through RSA and Hash function , 2014, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).

[2]  Iehab Al Rassan,et al.  Securing Mobile Cloud Computing Using Biometric Authentication (SMCBA) , 2014, 2014 International Conference on Computational Science and Computational Intelligence.

[3]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[4]  Jason Flinn,et al.  Virtualized in-cloud security services for mobile devices , 2008, MobiVirt '08.

[5]  Xiaodong Lin,et al.  SDSM: A secure data service mechanism in mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[6]  S. Rajalakshmi,et al.  Mobile Cloud Computing: Standard Approach to Protecting and Securing of Mobile Cloud Ecosystems , 2013, 2013 International Conference on Computer Sciences and Applications.

[7]  Markus Jakobsson,et al.  Authentication in the clouds: a framework and its application to mobile users , 2010, CCSW '10.

[8]  Min Chen,et al.  Security protection between users and the mobile media cloud , 2014, IEEE Communications Magazine.

[9]  Jian Yang,et al.  Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing , 2011, J. Networks.

[10]  F. Richard Yu,et al.  Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.

[11]  Yonggang Wen,et al.  Toward Scalable Systems for Big Data Analytics: A Technology Tutorial , 2014, IEEE Access.

[12]  Rajashri Khanai,et al.  Neural Crypto-Coding as DES: Turbo over Land Mobile Satellite (LMS) channel , 2014, 2014 International Conference on Communication and Signal Processing.

[13]  Samee Ullah Khan,et al.  Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .

[14]  William H. Sanders,et al.  Secloud: A cloud-based comprehensive and lightweight security solution for smartphones , 2013, Comput. Secur..

[15]  Dipayan Dev,et al.  A Review and Research Towards Mobile Cloud Computing , 2014, MobileCloud.

[16]  Rajashri Khanai,et al.  Addressing mobile Cloud Computing security issues: A survey , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).

[17]  Rajkumar Buyya,et al.  Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges , 2014, IEEE Communications Surveys & Tutorials.

[18]  Xinwen Zhang,et al.  Securing elastic applications on mobile devices for cloud computing , 2009, CCSW '09.

[19]  Rajashri Khanai,et al.  Crypto-Coding as DES-Convolution for Land Mobile Satellite Channel , 2014 .

[20]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[21]  Weibo Gong,et al.  Mobility Can Help: Protect User Identity with Dynamic Credential , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[22]  Dijiang Huang,et al.  MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication , 2010, 2010 Fifth IEEE International Symposium on Service Oriented System Engineering.

[23]  Rajkumar Buyya,et al.  Introduction to the IEEE Transactions on Cloud Computing , 2013, IEEE Trans. Cloud Comput..