Mobile cloud computing models security issues: A systematic review
暂无分享,去创建一个
Ahmad Salah Al-Ahmad | Yehia Ibrahim Alzoubi | Hasan Kahtan | Omar Ali | Ashraf Jaradat | Omar Ali | Y. Alzoubi | H. Kahtan | A. Al-Ahmad | Ashraf Jaradat | Hasan Kahtan
[1] Claes Wohlin,et al. Guidelines for snowballing in systematic literature studies and a replication in software engineering , 2014, EASE '14.
[2] Nordin Abu Bakar,et al. Reviewing the challenges of security features in component based software development models , 2012, 2012 IEEE Symposium on E-Learning, E-Management and E-Services.
[3] Tarunpreet Bhatia,et al. Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues , 2017, The Journal of Supercomputing.
[4] Han Qi,et al. Research on mobile cloud computing: Review, trend and perspectives , 2012, 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP).
[5] Mustafa Sabah Taha,et al. Combination of Steganography and Cryptography: A short Survey , 2019, IOP Conference Series: Materials Science and Engineering.
[6] Lee,et al. A Cloud-Based Virtualized Execution Environment for Mobile Applications , 2011 .
[7] Kim Thuat Nguyen. Protocoles de sécurité efficaces pour les réseaux de capteurs IP sans-fil et l'Internet des Objets. (Lightweight security protocols for IP-based Wireless Sensor Networks and the Internet of Things) , 2016 .
[8] F. Richard Yu,et al. Virtual Mobile Networks in Clouds , 2015 .
[9] Athanasios V. Vasilakos,et al. On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services , 2017, IEEE Access.
[10] Gaetan Hurel,et al. Outsourcing Mobile Security in the Cloud , 2014, AIMS.
[11] Zhiyong Xu,et al. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing , 2018, IEEE Transactions on Cloud Computing.
[12] Zoe L. Jiang,et al. Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing , 2021, IEEE Transactions on Dependable and Secure Computing.
[13] Hong Wen,et al. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing , 2019, IEEE Transactions on Cloud Computing.
[14] Zhibin Zhou,et al. Efficient and secure data storage operations for mobile cloud computing , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).
[15] J. Antony,et al. Why continuous improvement initiatives fail in manufacturing environments? A systematic review of the evidence , 2014 .
[16] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .
[17] Markus Jakobsson,et al. Authentication in the clouds: a framework and its application to mobile users , 2010, CCSW '10.
[18] Dijiang Huang,et al. MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication , 2010, 2010 Fifth IEEE International Symposium on Service Oriented System Engineering.
[19] Joseph K. Liu,et al. Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat , 2018, Future Gener. Comput. Syst..
[20] Ping Wang,et al. Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments , 2019, Secur. Commun. Networks.
[21] Ping Wang,et al. Understanding security failures of multi-factor authentication schemes for multi-server environments , 2020, Comput. Secur..
[22] Richard T. Watson,et al. Analyzing the Past to Prepare for the Future: Writing a Literature Review , 2002, MIS Q..
[23] Akemi Takeoka Chatfield,et al. Assessing information security risks in the cloud: A case study of Australian local government authorities , 2020, Gov. Inf. Q..
[24] Xiaoqing Liu,et al. A privacy‐preserving density peak clustering algorithm in cloud computing , 2020, Concurr. Comput. Pract. Exp..
[25] Ali Amer Alwan,et al. A SYSTEMATIC MAPPING STUDY ON CLOUD-BASED MOBILE APPLICATION TESTING , 2019, Journal of Information and Communication Technology.
[26] Yogesh K. Dwivedi,et al. The state of play of blockchain technology in the financial services sector: A systematic literature review , 2020, Int. J. Inf. Manag..
[27] Athanasios V. Vasilakos,et al. Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..
[28] Dongman Lee,et al. A virtual cloud computing provider for mobile devices , 2010, MCS '10.
[29] Antonio Iera,et al. MIFaaS: A Mobile-IoT-Federation-as-a-Service Model for dynamic cooperation of IoT Cloud Providers , 2017, Future Gener. Comput. Syst..
[30] Normaly Kamal Ismail,et al. Mobile cloud computing applications penetration testing model design , 2020, Int. J. Inf. Comput. Secur..
[31] Rajkumar Buyya,et al. Augmentation Techniques for Mobile Cloud Computing , 2018, ACM Comput. Surv..
[32] Chen Lin,et al. A data integrity verification scheme in mobile cloud computing , 2017, J. Netw. Comput. Appl..
[33] Kiwon Lee,et al. Preliminary Performance Testing of Geo-spatial Image Parallel Processing in the Mobile Cloud Computing Service , 2012 .
[34] Sajjad Raza,et al. Systematic reviews and their role in evidence-informed health care. , 2008, JPMA. The Journal of the Pakistan Medical Association.
[35] Lefteris Angelis,et al. The impact of information security events to the stock market: A systematic literature review , 2016, Comput. Secur..
[36] Yan Hu,et al. A systematic literature review of cloud computing in eHealth , 2014, ArXiv.
[37] David Evans,et al. Hierarchy of evidence: a framework for ranking evidence evaluating healthcare interventions. , 2003, Journal of clinical nursing.
[38] Omar Ali,et al. The role of government regulations in the adoption of cloud computing: A case study of local government , 2020, Comput. Law Secur. Rev..
[39] Hamid Harroud,et al. Mobile cloud computing for computation offloading: Issues and challenges , 2018 .
[40] James Won-Ki Hong,et al. Monitoring and detecting abnormal behavior in mobile cloud infrastructure , 2012, 2012 IEEE Network Operations and Management Symposium.
[41] Hesham A. Hefny,et al. New Architecture for Mobile GIS Cloud Computing , 2015 .
[42] Hitesh A. Bheda,et al. Application Processing Approach for Smart Mobile Devices in Mobile Cloud Computing , 2013 .
[43] Hao Li,et al. A novel security media cloud framework , 2019, Comput. Electr. Eng..
[44] Seng-Phil Hong,et al. A Method of Risk Assessment for Multi-Factor Authentication , 2011, J. Inf. Process. Syst..
[45] Sukhpreet Kaur,et al. Hybrid Application Partitioning and Process Offloading Method for the Mobile Cloud Computing , 2017 .
[46] M. Petticrew,et al. Systematic Reviews in the Social Sciences: A Practical Guide , 2005 .
[47] Hamid A. Jalab,et al. Systematic Literature Review on Penetration Testing for Mobile Cloud Computing Applications , 2019, IEEE Access.
[48] E. W. T. Ngai,et al. A literature review and classification of electronic commerce research , 2002, Inf. Manag..
[49] Lorenzo Valeri,et al. Study on the requirements and options for Radio Frequency Identification (RFID) application in healthcare , 2009 .
[50] David Llewellyn-Jones,et al. A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
[51] Godwin Ansa,et al. Security framework for RESTful mobile cloud computing Web services , 2016, J. Ambient Intell. Humaniz. Comput..
[52] David Moher,et al. Development of AMSTAR: a measurement tool to assess the methodological quality of systematic reviews , 2007, BMC medical research methodology.
[53] Jong Hyuk Park,et al. Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions , 2017, J. Ambient Intell. Humaniz. Comput..
[54] J. Wenny Rahayu,et al. Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..
[55] Tarunpreet Bhatia,et al. Towards a secure incremental proxy re‐encryption for e‐healthcare data sharing in mobile cloud computing , 2019, Concurr. Comput. Pract. Exp..
[56] Anwesha Mukherjee,et al. Power and Delay Efficient Multilevel Offloading Strategies for Mobile Cloud Computing , 2020, Wirel. Pers. Commun..
[57] Farrukh Aslam Khan,et al. Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing , 2020, IEEE Access.
[58] Asif Gill,et al. Empirical studies of geographically distributed agile development communication challenges: A systematic review , 2016, Inf. Manag..
[59] Miss Laiha Mat Kiah,et al. Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing , 2013, The Journal of Supercomputing.
[60] Ehab Al-Shaer,et al. Security-Aware Resource Allocation in Clouds , 2013, 2013 IEEE International Conference on Services Computing.
[61] Nordin Abu Bakar,et al. Dependability Attributes for increased Security in Component-based Software Development , 2014, J. Comput. Sci..
[62] Li-Chun Wang,et al. A Security Framework of Group Location-Based Mobile Applications in Cloud Computing , 2011, 2011 40th International Conference on Parallel Processing Workshops.
[63] Shahaboddin Shamshirband,et al. Incremental proxy re-encryption scheme for mobile cloud computing environment , 2013, The Journal of Supercomputing.
[64] Sherali Zeadally,et al. Mobile cloud computing: Challenges and future research directions , 2018, J. Netw. Comput. Appl..
[65] Liu Jian-wei,et al. Secure cloud computing architecture on mobile internet , 2011, 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC).
[66] La'Quata Sumter. Cloud computing: security risk , 2010, ACM SE '10.
[67] Muhammad Mostafa Monowar,et al. Data Confidentiality and Integrity in Mobile Cloud Computing , 2015 .
[68] Mahamudul Hasan,et al. CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing , 2017, IEEE Access.
[69] George Mastorakis,et al. A Social-Oriented Mobile Cloud Scheme for Optimal Energy Conservation , 2015 .
[70] Pandi Vijayakumar,et al. An Efficient Authentication Scheme for Mobile Cloud Computing Services , 2017, J. Inf. Sci. Eng..
[71] Huai Liu,et al. Metamorphic Testing , 2018, ACM Comput. Surv..
[72] Joseph K. Liu,et al. Towards secure and cost-effective fuzzy access control in mobile cloud computing , 2017, Soft Comput..
[73] Ahmad Salah Al-Ahmad,et al. Fuzz Test Case Generation for Penetration Testing in Mobile Cloud Computing Applications , 2018, ICIC 2018.
[74] Jason Flinn,et al. Virtualized in-cloud security services for mobile devices , 2008, MobiVirt '08.
[75] Paul Sant,et al. A multi-cloud approach for secure data storage on smart device , 2016, 2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP).
[76] Muhammad Khurram Khan,et al. Towards port-knocking authentication methods for mobile cloud computing , 2017, J. Netw. Comput. Appl..
[77] Xiaodong Lin,et al. SDSM: A secure data service mechanism in mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[78] Shahaboddin Shamshirband,et al. A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach , 2015, Journal of Grid Computing.
[79] Mohammed Joda Usman,et al. Mobile Cloud Computing Energy-aware Task Offloading (MCC: ETO) , 2016 .
[80] Hong Wen,et al. The security issue of WSNs based on cloud computing , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[81] Su Golder,et al. Comparison of search strategies in systematic reviews of adverse effects to other systematic reviews. , 2014, Health information and libraries journal.
[82] Ahmad Salah Al-Ahmad,et al. Test case selection for penetration testing in mobile cloud computing applications: A proposed technique , 2018 .
[83] Ahmad Salah Al-Ahmad,et al. Cloud Computing Review: Features And Issues , 2018, 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE).
[84] Yehia Ibrahim Alzoubi,et al. Fog computing security and privacy for the Internet of Thing applications: State‐of‐the‐art , 2020, Secur. Priv..
[85] Hamilton Allen Turner. Optimizing, Testing, and Securing Mobile Cloud Computing Systems For Data Aggregation and Processing , 2015 .
[86] Nordin Abu Bakar,et al. Embedding Dependability Attributes into Component-Based Software Development Using the Best Practice Method: A Guideline , 2014 .
[87] Syed Ahmad Aljunid,et al. Mobile Cloud Computing Testing Review , 2013, 2013 International Conference on Advanced Computer Science Applications and Technologies.
[88] Christos Stergiou,et al. Recent Advances Delivered in Mobile Cloud Computing's Security and Management Challenges , 2020, Research Anthology on Securing Mobile Technologies and Applications.
[89] Abderrahim Abdellaoui,et al. A security scheme for mobile cloud using multi-agents system , 2016, 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt).
[90] Jia-Lun Tsai,et al. A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services , 2015, IEEE Systems Journal.
[91] Chhabi Rani Panigrahi,et al. An Efficient Approach for Running Multimedia Applications Using Mobile Cloud Computing , 2020 .
[92] H. Bastian,et al. Seventy-Five Trials and Eleven Systematic Reviews a Day: How Will We Ever Keep Up? , 2010, PLoS medicine.
[93] Mb Abdullahi M Timothy Mb Ibrahim U Musa Au Othman,et al. Secured Federated Data Management in Distributed Mobile Cloud Computing , 2017 .
[94] Nordin Abu Bakar,et al. Awareness of Embedding Security Features into Component-based Software Development Model: a Survey , 2014, J. Comput. Sci..
[95] Keke Gai,et al. Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing , 2016, J. Netw. Comput. Appl..
[96] Nitin Naik,et al. Choice of suitable Identity and Access Management standards for mobile computing and communication , 2017, 2017 24th International Conference on Telecommunications (ICT).
[97] Sebastian Lehrig,et al. CloudStore - towards scalability, elasticity, and efficiency benchmarking and analysis in Cloud computing , 2018, Future Gener. Comput. Syst..
[98] Mazliza Othman,et al. Pirax: framework for application piracy control in mobile cloud environment , 2013, The Journal of Supercomputing.
[99] Muhammad Usman,et al. A provable and secure mobile user authentication scheme for mobile cloud computing services , 2019, Int. J. Commun. Syst..
[100] Mojtaba Alizadeh,et al. Feasibility of Implementing Multi-factor Authentication Schemes in Mobile Cloud Computing , 2014, 2014 5th International Conference on Intelligent Systems, Modelling and Simulation.
[101] Securing the mobile enterprise with network-based security and cloud computing , 2012, 2012 35th IEEE Sarnoff Symposium.
[102] Shahbaz Akhtar Abid,et al. MobiByte: An Application Development Model for Mobile Cloud Computing , 2015, Journal of Grid Computing.
[103] Nitin Naik,et al. An Analysis of Open Standard Identity Protocols in Cloud Computing Security Paradigm , 2016, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).