Security and Challenges in Mobile Cloud Computing

[1]  Athanasios V. Vasilakos,et al.  MuSIC: Mobility-Aware Optimal Service Allocation in Mobile Cloud Computing , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.

[2]  Ciprian Dobre,et al.  Intelligent services for Big Data science , 2014, Future Gener. Comput. Syst..

[3]  Jiafu Wan,et al.  Security and privacy in mobile cloud computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[4]  Wei-Tek Tsai,et al.  Multi-factor web API security for securing Mobile Cloud , 2015, 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD).

[5]  Shaheed Zulfikar,et al.  Security Issues and Challenges of Mobile Cloud Computing , 2013 .

[6]  Athanasios V. Vasilakos,et al.  Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..

[7]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[8]  Jörg Schwenk,et al.  All your clouds are belong to us: security analysis of cloud management interfaces , 2011, CCSW '11.

[9]  RahayuWenny,et al.  Mobile cloud computing , 2013 .

[10]  Mojtaba Alizadeh,et al.  Challenges and opportunities of Mobile Cloud Computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[11]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[12]  Athanasios V. Vasilakos,et al.  Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.

[13]  Feng Xia,et al.  Phone2Cloud: Exploiting computation offloading for energy saving on smartphones in mobile cloud computing , 2013, Information Systems Frontiers.

[14]  BottaAlessio,et al.  Survey Cloud monitoring , 2013 .

[15]  S. Rajalakshmi,et al.  Mobile Cloud Computing: Standard Approach to Protecting and Securing of Mobile Cloud Ecosystems , 2013, 2013 International Conference on Computer Sciences and Applications.

[16]  Dijiang Huang,et al.  Mobile cloud computing service models: a user-centric approach , 2013, IEEE Network.

[17]  Bharat K. Bhargava,et al.  A Survey of Computation Offloading for Mobile Systems , 2012, Mobile Networks and Applications.

[18]  Ke Xu,et al.  A Survey of Research on Mobile Cloud Computing , 2011, 2011 10th IEEE/ACIS International Conference on Computer and Information Science.

[19]  Junsheng Zhang,et al.  Data Security and Privacy in Cloud Computing , 2014 .

[20]  Athanasios V. Vasilakos,et al.  Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things , 2017, IEEE Cloud Computing.

[21]  Zhifeng Xiao,et al.  Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.

[22]  Yunheung Paek,et al.  Fast dynamic execution offloading for efficient mobile cloud computing , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[23]  VasilakosAthanasios,et al.  Security and privacy challenges in mobile cloud computing , 2017 .

[24]  Antonio Pescapè,et al.  Cloud monitoring: A survey , 2013, Comput. Networks.

[25]  Ramesh Govindan,et al.  Odessa: enabling interactive perception applications on mobile devices , 2011, MobiSys '11.

[26]  Seung Ryoul Maeng,et al.  H-SVM: Hardware-Assisted Secure Virtual Machines under a Vulnerable Hypervisor , 2015, IEEE Transactions on Computers.

[27]  Rajkumar Buyya,et al.  Inter‐Cloud architectures and application brokering: taxonomy and survey , 2014, Softw. Pract. Exp..

[28]  Kim-Kwang Raymond Choo,et al.  Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment , 2017, Comput. Stand. Interfaces.

[29]  Zhangdui Zhong,et al.  Challenges on wireless heterogeneous networks for mobile cloud computing , 2013, IEEE Wireless Communications.

[30]  Samee Ullah Khan,et al.  Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .

[31]  Wu He,et al.  Developing Vehicular Data Cloud Services in the IoT Environment , 2014, IEEE Transactions on Industrial Informatics.

[32]  Qing Yang,et al.  HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users , 2015, IEEE Transactions on Information Forensics and Security.

[33]  Yunheung Paek,et al.  Techniques to Minimize State Transfer Costs for Dynamic Execution Offloading in Mobile Cloud Computing , 2014, IEEE Transactions on Mobile Computing.

[34]  Imad H. Elhajj,et al.  Partial mobile application offloading to the cloud for energy-efficiency with security measures , 2015, Sustain. Comput. Informatics Syst..