Mobile Cloud Computing: Challenges and Future Research Directions
暂无分享,去创建一个
Mohammad Shojafar | Ibrahim AlShourbaji | Samaher Al-Janabi | Mohammed Abdelhag | M. Shojafar | Ibrahim AlShourbaji | Mohammed E Abdelhag | Samaher Al-Janabi
[1] Angelo Sifaleras,et al. Convergence of Internet of things and mobile cloud computing , 2014 .
[2] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[3] Siti Hafizah Ab Hamid,et al. Mobile storage augmentation in mobile cloud computing: Taxonomy, approaches, and open issues , 2015, Simul. Model. Pract. Theory.
[4] Byung-Gon Chun,et al. CloneCloud: elastic execution between mobile device and cloud , 2011, EuroSys '11.
[5] Hyotaek Lim,et al. Homomorphic encryption in mobile multi cloud computing , 2015, 2015 International Conference on Information Networking (ICOIN).
[6] Wenzhong Li,et al. Preserving location privacy based on distributed cache pushing , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).
[7] Kim-Kwang Raymond Choo,et al. Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment , 2017, Comput. Stand. Interfaces.
[8] Muriati Mukhtar,et al. A combinatorial double auction resource allocation model in cloud computing , 2016, Inf. Sci..
[9] Xinwen Zhang,et al. Securing elastic applications on mobile devices for cloud computing , 2009, CCSW '09.
[10] Weimin Zheng,et al. Design a cloud storage platform for pervasive computing environments , 2009, Cluster Computing.
[11] Rinku Shah,et al. Computation offloading frameworks in mobile cloud computing : a survey , 2016, 2016 IEEE International Conference on Current Trends in Advanced Computing (ICCTAC).
[12] Sumit Soni,et al. A survey of mobile cloud computing architecture, applications, approaches & Current Solution Providers , 2015 .
[13] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[14] Qinghua Li,et al. Enhancing privacy through caching in location-based services , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[15] Kaisa Väänänen,et al. User experience of mobile photo sharing in the cloud , 2010, MUM.
[16] Nicolae Paladi,et al. Providing User Security Guarantees in Public Infrastructure Clouds , 2017, IEEE Transactions on Cloud Computing.
[17] Parthasarathy Ranganathan,et al. Energy Consumption in Mobile Devices: Why Future Systems Need Requirements-Aware Energy Scale-Down , 2003, PACS.
[18] Ghizlane Orhanou,et al. Secure scheme on mobile multi cloud computing based on homomorphic encryption , 2016, 2016 International Conference on Engineering & MIS (ICEMIS).
[19] Sung Chan Jun,et al. An SLA-based cloud computing that facilitates resource allocation in the distributed data centers of a cloud provider , 2012, The Journal of Supercomputing.
[20] Qiang Ye,et al. A Context-Adaptive Security Framework for Mobile Cloud Computing , 2015, 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).
[21] Ahmed Patel,et al. Empirical rapid and accurate prediction model for data mining tasks in cloud computing environments , 2014, 2014 International Congress on Technology, Communication and Knowledge (ICTCK).
[22] Min Chen,et al. Security protection between users and the mobile media cloud , 2014, IEEE Communications Magazine.
[23] Samaher Al-Janabi,et al. Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications , 2017 .
[24] Wenzhong Li,et al. Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing , 2015, IEEE/ACM Transactions on Networking.
[25] Weiqing Zhao,et al. Improving computer basis teaching through mobile communication and cloud computing technology , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[26] Kim-Kwang Raymond Choo,et al. Cloud incident handling and forensic‐by‐design: cloud storage as a case study , 2017, Concurr. Comput. Pract. Exp..
[27] Rajkumar Buyya,et al. Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges , 2014, IEEE Communications Surveys & Tutorials.
[28] Sudip Misra,et al. Cloud Computing Applications for Smart Grid: A Survey , 2015, IEEE Transactions on Parallel and Distributed Systems.
[29] Athanasios V. Vasilakos,et al. MAPCloud: Mobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture , 2012, 2012 IEEE Fifth International Conference on Utility and Cloud Computing.
[30] David Abramson,et al. Economic Models for Management of Resources in Grid Computing , 2001, ArXiv.
[31] Xinwen Zhang,et al. Towards an Elastic Application Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing , 2011, Mob. Networks Appl..
[32] Rajkumar Buyya,et al. Dynamic remote data auditing for securing big data storage in cloud computing , 2017, Inf. Sci..
[33] Maurice Gagnaire,et al. A Mobile Application Offloading Algorithm for Mobile Cloud Computing , 2015, 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.
[34] Rajkumar Buyya,et al. An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing , 2016, J. Netw. Comput. Appl..
[35] Jong Hyuk Park,et al. A Security Model for Protecting Virtualization in Cloud Computing , 2016, CSA/CUTE.
[36] Yonggang Wen,et al. Towards Cost-Efficient Video Transcoding in Media Cloud: Insights Learned From User Viewing Patterns , 2015, IEEE Transactions on Multimedia.
[37] Keke Gai,et al. Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry , 2018, Future Gener. Comput. Syst..
[38] Rajeev Gandhi,et al. STOVE: Strict, Observable, Verifiable Data and Execution Models for Untrusted Applications , 2014, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science.
[39] Shan Lu,et al. Research of Cache Mechanism in Mobile Data Management , 2012, WISA.
[40] Kim-Kwang Raymond Choo,et al. A Review of Free Cloud-Based Anti-Malware Apps for Android , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[41] Bharat K. Bhargava,et al. Secure and efficient access to outsourced data , 2009, CCSW '09.
[42] Kim-Kwang Raymond Choo,et al. Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users , 2014, Behav. Inf. Technol..
[44] Nenghai Yu,et al. Mobile cloud computing based privacy protection in location-based information survey applications , 2015, Secur. Commun. Networks.
[45] Daniele Sgandurra,et al. Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems , 2016, ACM Comput. Surv..
[46] Xinpeng Zhang,et al. Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy , 2016, ACISP.