Recent Advances Delivered in Mobile Cloud Computing's Security and Management Challenges

Mobile cloud computing provides an opportunity to restrict the usage of huge hardware infrastructure and to provide access to data, applications, and computational power from every place and in any time with the use of a mobile device. Furthermore, MCC offers a number of possibilities but additionally creates several challenges and issues that need to be addressed as well. Through this work, the authors try to define the most important issues and challenges in the field of MCC technology by illustrating the most significant works related to MCC during recent years. Regarding the huge benefits offered by the MCC technology, the authors try to achieve a more safe and trusted environment for MCC users in order to operate the functions and transfer, edit, and manage data and applications, proposing a new method based on the existing AES encryption algorithm, which is, according to the study, the most relevant encryption algorithm to a cloud environment. Concluding, the authors suggest as a future plan to focus on finding new ways to achieve a better integration MCC with other technologies.

[1]  Haoxiang Wang,et al.  Computer and Cyber Security , 2018 .

[2]  Yiliang Han,et al.  Secure data outsourcing scheme in cloud computing with attribute-based encryption , 2018, Int. J. High Perform. Comput. Netw..

[3]  Brij B. Gupta,et al.  Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT , 2018, Sustain. Comput. Informatics Syst..

[4]  Jianfeng Ma,et al.  On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services , 2018, IEEE Systems Journal.

[5]  Andreas P. Plageras,et al.  Security and privacy of big data for social networking services in cloud , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[6]  Firas AlBalas,et al.  An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms , 2018, Int. J. Cloud Appl. Comput..

[7]  B. B. Gupta,et al.  Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment , 2017, Neural Computing and Applications.

[8]  Yutaka Ishibashi,et al.  Solutions for inter-connectivity and security in a smart hospital building , 2017, 2017 IEEE 15th International Conference on Industrial Informatics (INDIN).

[9]  Kostas E. Psannis,et al.  Algorithms for Big Data in Advanced Communication Systems and Cloud Computing , 2017, 2017 IEEE 19th Conference on Business Informatics (CBI).

[10]  Kostas E. Psannis,et al.  Recent advances delivered by Mobile Cloud Computing and Internet of Things for Big Data applications: a survey , 2017, Int. J. Netw. Manag..

[11]  Athanasios V. Vasilakos,et al.  Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..

[12]  Kostas E. Psannis,et al.  Efficient and secure BIG data delivery in Cloud Computing , 2017, Multimedia Tools and Applications.

[13]  Jianqiang Li,et al.  Computation Partitioning for Mobile Cloud Computing in a Big Data Environment , 2017, IEEE Transactions on Industrial Informatics.

[14]  George Mastorakis,et al.  On cohabitating networking technologies with common wireless access for home automation system purposes , 2016, IEEE Wireless Communications.

[15]  Xingming Sun,et al.  Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.

[16]  Dharma P. Agrawal,et al.  Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security , 2016 .

[17]  George Mastorakis,et al.  Efficient entertainment services provision over a novel network architecture , 2016, IEEE Wireless Communications.

[18]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[19]  George Mastorakis,et al.  An evaluation of cloud-based mobile services with limited capacity: a linear approach , 2016, Soft Computing.

[20]  Saman A. Zonouz,et al.  CloudID: Trustworthy cloud-based and cross-enterprise biometric identification , 2015, Expert Syst. Appl..

[21]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[22]  Ciprian Dobre,et al.  Intelligent services for Big Data science , 2014, Future Gener. Comput. Syst..

[23]  Abdullah Gani,et al.  A Study on Strategic Provisioning of Cloud Computing Services , 2014, TheScientificWorldJournal.

[24]  Issa M. Khalil,et al.  Consolidated Identity Management System for secure mobile cloud computing , 2014, Comput. Networks.

[25]  Rajkumar Buyya,et al.  Inter‐Cloud architectures and application brokering: taxonomy and survey , 2014, Softw. Pract. Exp..

[26]  Wu He,et al.  Developing Vehicular Data Cloud Services in the IoT Environment , 2014, IEEE Transactions on Industrial Informatics.

[27]  Axel Winkelmann,et al.  Cloud Computing Data Protection -- A Literature Review and Analysis , 2014, 2014 47th Hawaii International Conference on System Sciences.

[28]  Nazim Taskin,et al.  A Pricing Model for Cloud Computing Service , 2014, 2014 47th Hawaii International Conference on System Sciences.

[29]  Shaheed Zulfikar,et al.  Security Issues and Challenges of Mobile Cloud Computing , 2013 .

[30]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[31]  Sang Oh Park,et al.  Trust management on user behavioral patterns for a mobile cloud computing , 2013, Cluster Computing.

[32]  Rituparna Chaki,et al.  Secure and trusted cloud of things , 2013, 2013 Annual IEEE India Conference (INDICON).

[33]  Athanasios V. Vasilakos,et al.  Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.

[34]  Jiafu Wan,et al.  Security and privacy in mobile cloud computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[35]  Antonio Pescapè,et al.  Cloud monitoring: A survey , 2013, Comput. Networks.

[36]  D. Popa,et al.  A security framework for mobile cloud applications , 2013, 2013 11th RoEduNet International Conference.

[37]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[38]  Daan Broeder,et al.  A data infrastructure reference model with applications: towards realization of a ScienceTube vision with a data replication service , 2013, Journal of Internet Services and Applications.

[39]  Rajkumar Buyya,et al.  A Review on Distributed Application Processing Frameworks in Smart Mobile Devices for Mobile Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.

[40]  Roman Beck,et al.  Does Cloud Computing Matter? An Analysis of the Cloud Model Software-as-a-Service and Its Impact on Operational Agility , 2013, 2013 46th Hawaii International Conference on System Sciences.

[41]  B. B. P. Rao,et al.  Cloud computing for Internet of Things & sensing based applications , 2012, 2012 Sixth International Conference on Sensing Technology (ICST).

[42]  Singh Hada Priyank,et al.  Security Agents: A Mobile Agent Based Trust Model for Cloud Computing , 2011 .

[43]  Max Mühlhäuser,et al.  Towards a Trust Management System for Cloud Computing , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[44]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[45]  Yogesh L. Simmhan,et al.  An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[46]  Daiyuan Peng,et al.  Resource allocation for security services in mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[47]  Martin Hilbert,et al.  The World’s Technological Capacity to Store, Communicate, and Compute Information , 2011, Science.

[48]  Ilias Maglogiannis,et al.  Mobile healthcare information management utilizing Cloud Computing and Android OS , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.

[49]  Bharat K. Bhargava,et al.  An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.

[50]  Cong Wang,et al.  Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.

[51]  Kostas E. Psannis,et al.  Advanced Media-Based Smart Big Data on Intelligent Cloud Systems , 2019, IEEE Transactions on Sustainable Computing.

[52]  Yutaka Ishibashi,et al.  Algorithms for Efficient Digital Media Transmission over IoT and Cloud Networking , 2018, J. Multim. Inf. Syst..

[53]  Kostas E. Psannis,et al.  Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..

[54]  Shingo Yamaguchi,et al.  Analysis of Various Security Issues and Challenges in Cloud Computing Environment: A Survey , 2016 .

[55]  Supriya Kinger,et al.  Analysis of Security Algorithms in Cloud Computing , 2014 .

[56]  Sebastian Andersson,et al.  A study of the advantages & disadvantages of mobile cloud computing versus native environment , 2013 .

[57]  Gurpreet Singh,et al.  Integrating AES, DES, and 3-DES Encryption Algorithms for Enhanced Data Security , 2013 .

[58]  Jayadev Gyani,et al.  Mobile Cloud Computing: Implications and Challenges , 2012 .

[59]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[60]  M. D. Leenheer,et al.  A high performance fingerprint liveness detection method based on quality related features , 2021, Future Gener. Comput. Syst..

[61]  R. Buyya,et al.  A survey on vehicular cloud computing , 2014, J. Netw. Comput. Appl..

[62]  M. L. M. Kiah,et al.  Towards secure mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..