Mobile Cloud Computing: Architecture, Advantages and Security Issues

In the last few years, Mobile Cloud Computing has become an emerging area of research due to the important developments in mobile networks and Cloud Computing. Computing power and data storage are being moved away from mobile devices to be performed on Cloud servers in order to overcome mobile devices' limitations. In spite of this development, it still faces many challenges namely low bandwidth, energy consumption, and especially security threat. Furthermore, the nature of mobile devices and their operating systems make Mobile Cloud systems more susceptible to malicious attacks and the distributed storage in the Cloud may cause privacy issues. Security and privacy are being then arguably challenged facing its embracement. This paper overviews the Mobile Cloud Computing environment and systems. We focus on the main security issues related to the mobile device, networks and Cloud Computing.

[1]  Alec Wolman,et al.  MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.

[2]  Priya. A. Kotwal,et al.  Evolution and effects of mobile cloud computing, middleware services on cloud, future prospects: A peek into the mobile cloud operating systems , 2012, 2012 IEEE International Conference on Computational Intelligence and Computing Research.

[3]  Athanasios V. Vasilakos,et al.  Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..

[4]  Abhay Bansal,et al.  Exploring challenges in Mobile cloud computing: An overview , 2013 .

[5]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[6]  Hiroyuki Koga,et al.  Simulation Study of Low Latency Network Architecture Using Mobile Edge Computing , 2017, IEICE Trans. Inf. Syst..

[7]  R Senthamarai,et al.  ANALYSIS OF SECURITY ISSUES FOR MOBILE CLOUD COMPUTING , 2020, International Journal of Engineering Applied Sciences and Technology.

[8]  Mojtaba Alizadeh,et al.  Challenges and opportunities of Mobile Cloud Computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[9]  Shiwen Mao,et al.  A survey of mobile cloud computing for rich media applications , 2013, IEEE Wireless Communications.

[10]  Mazliza Othman,et al.  A Survey of Mobile Cloud Computing Application Models , 2014, IEEE Communications Surveys & Tutorials.

[11]  Qijun Gu,et al.  Secure Mobile Cloud Computing and Security Issues , 2014 .

[12]  H. Vincent Poor,et al.  Latency and Reliability-Aware Task Offloading and Resource Allocation for Mobile Edge Computing , 2017, 2017 IEEE Globecom Workshops (GC Wkshps).

[13]  Weizhe Zhang,et al.  An Efficient and Secured Framework for Mobile Cloud Computing , 2018, IEEE Transactions on Cloud Computing.

[14]  Mohammad Shojafar,et al.  Mobile Cloud Computing: Challenges and Future Research Directions , 2017, 2017 10th International Conference on Developments in eSystems Engineering (DeSE).

[15]  RahayuWenny,et al.  Mobile cloud computing , 2013 .

[16]  Saman A. Zonouz,et al.  A cloud-based intrusion detection and response system for mobile phones , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).

[17]  Eui-nam Huh,et al.  Dynamic resource provisioning through Fog micro datacenter , 2015, 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

[18]  Hamid Harroud,et al.  Mobile cloud computing for computation offloading: Issues and challenges , 2018 .

[19]  Herbert Bos,et al.  Paranoid Android: versatile protection for smartphones , 2010, ACSAC '10.

[20]  Shan Lu,et al.  Research of Cache Mechanism in Mobile Data Management , 2012, WISA.

[21]  Mohammed S. Zahrani Self-Protection and Security in Mobile Cloud Computing , 2016 .

[22]  Shruti Goel,et al.  Mobile Cloud Computing Architecture, Application Model, and Challenging Issues , 2014, 2014 International Conference on Computational Intelligence and Communication Networks.

[23]  Samee Ullah Khan,et al.  Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .

[24]  Rittwik Jana,et al.  Phoenix: Storage Using an Autonomous Mobile Infrastructure , 2013, IEEE Transactions on Parallel and Distributed Systems.

[25]  Debashis De,et al.  Mobile Cloud Computing: Architectures, Algorithms and Applications , 2015 .

[26]  Dipayan Dev,et al.  A Review and Research Towards Mobile Cloud Computing , 2014, MobileCloud.

[27]  Jiafu Wan,et al.  Security and privacy in mobile cloud computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[28]  Matthias Lange,et al.  Cellpot: A Concept for Next Generation Cellular Network Honeypots , 2014 .

[29]  Weimin Zheng,et al.  Design a cloud storage platform for pervasive computing environments , 2009, Cluster Computing.

[30]  Daniel Andresen,et al.  Jade: Reducing Energy Consumption of Android App , 2015, Int. J. Networked Distributed Comput..

[31]  Zhibin Zhou,et al.  Efficient and secure data storage operations for mobile cloud computing , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).

[32]  Olayinka Olafare,et al.  A New Secure Mobile Cloud Architecture , 2015, ArXiv.

[33]  Bo Li,et al.  Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications , 2013, IEEE Wireless Communications.

[34]  Zhibin Zhou,et al.  Secure data processing framework for mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[35]  Jason Flinn,et al.  Virtualized in-cloud security services for mobile devices , 2008, MobiVirt '08.

[36]  VasilakosAthanasios,et al.  Security and privacy challenges in mobile cloud computing , 2017 .

[37]  Laura Vasiliu,et al.  CloneCloud: Elastic Execution between Mobile Device and Cloud , 2012 .

[38]  Olivier Festor,et al.  Anomaly traceback using software defined networking , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[39]  Ali A. Ghorbani,et al.  A Multi-agent System for Smartphone Intrusion Detection Framework , 2015 .

[40]  Shahryar Shafique Qureshi,et al.  Mobile cloud computing as future for mobile applications - Implementation methods and challenging issues , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.

[41]  S. Rajalakshmi,et al.  Mobile Cloud Computing: Standard Approach to Protecting and Securing of Mobile Cloud Ecosystems , 2013, 2013 International Conference on Computer Sciences and Applications.