Mobile Cloud Computing: Challenges and Future Research Directions

In society today, mobile communication and mobile computing have a significant role in every aspect of our lives, both personal and public communication. However, the growth in mobile computing usage can be enhanced by integrating mobile computing into cloud computing. This will result in emerging a new model called Mobile Cloud Computing (MCC) that has recently attracted much attention in the academic sector. In this work, the main challenges and issues related to MCC are outlined. We also present the recent work and countermeasure solutions that are proposed by researchers to counter the challenges and lastly, crucial open research and issues that direct future research is highlighted.

[1]  Angelo Sifaleras,et al.  Convergence of Internet of things and mobile cloud computing , 2014 .

[2]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[3]  Siti Hafizah Ab Hamid,et al.  Mobile storage augmentation in mobile cloud computing: Taxonomy, approaches, and open issues , 2015, Simul. Model. Pract. Theory.

[4]  Byung-Gon Chun,et al.  CloneCloud: elastic execution between mobile device and cloud , 2011, EuroSys '11.

[5]  Hyotaek Lim,et al.  Homomorphic encryption in mobile multi cloud computing , 2015, 2015 International Conference on Information Networking (ICOIN).

[6]  Wenzhong Li,et al.  Preserving location privacy based on distributed cache pushing , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[7]  Kim-Kwang Raymond Choo,et al.  Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment , 2017, Comput. Stand. Interfaces.

[8]  Muriati Mukhtar,et al.  A combinatorial double auction resource allocation model in cloud computing , 2016, Inf. Sci..

[9]  Xinwen Zhang,et al.  Securing elastic applications on mobile devices for cloud computing , 2009, CCSW '09.

[10]  Weimin Zheng,et al.  Design a cloud storage platform for pervasive computing environments , 2009, Cluster Computing.

[11]  Rinku Shah,et al.  Computation offloading frameworks in mobile cloud computing : a survey , 2016, 2016 IEEE International Conference on Current Trends in Advanced Computing (ICCTAC).

[12]  Sumit Soni,et al.  A survey of mobile cloud computing architecture, applications, approaches & Current Solution Providers , 2015 .

[13]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[14]  Qinghua Li,et al.  Enhancing privacy through caching in location-based services , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[15]  Kaisa Väänänen,et al.  User experience of mobile photo sharing in the cloud , 2010, MUM.

[16]  Nicolae Paladi,et al.  Providing User Security Guarantees in Public Infrastructure Clouds , 2017, IEEE Transactions on Cloud Computing.

[17]  Parthasarathy Ranganathan,et al.  Energy Consumption in Mobile Devices: Why Future Systems Need Requirements-Aware Energy Scale-Down , 2003, PACS.

[18]  Ghizlane Orhanou,et al.  Secure scheme on mobile multi cloud computing based on homomorphic encryption , 2016, 2016 International Conference on Engineering & MIS (ICEMIS).

[19]  Sung Chan Jun,et al.  An SLA-based cloud computing that facilitates resource allocation in the distributed data centers of a cloud provider , 2012, The Journal of Supercomputing.

[20]  Qiang Ye,et al.  A Context-Adaptive Security Framework for Mobile Cloud Computing , 2015, 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).

[21]  Ahmed Patel,et al.  Empirical rapid and accurate prediction model for data mining tasks in cloud computing environments , 2014, 2014 International Congress on Technology, Communication and Knowledge (ICTCK).

[22]  Min Chen,et al.  Security protection between users and the mobile media cloud , 2014, IEEE Communications Magazine.

[23]  Samaher Al-Janabi,et al.  Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications , 2017 .

[24]  Wenzhong Li,et al.  Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing , 2015, IEEE/ACM Transactions on Networking.

[25]  Weiqing Zhao,et al.  Improving computer basis teaching through mobile communication and cloud computing technology , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[26]  Kim-Kwang Raymond Choo,et al.  Cloud incident handling and forensic‐by‐design: cloud storage as a case study , 2017, Concurr. Comput. Pract. Exp..

[27]  Rajkumar Buyya,et al.  Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges , 2014, IEEE Communications Surveys & Tutorials.

[28]  Sudip Misra,et al.  Cloud Computing Applications for Smart Grid: A Survey , 2015, IEEE Transactions on Parallel and Distributed Systems.

[29]  Athanasios V. Vasilakos,et al.  MAPCloud: Mobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture , 2012, 2012 IEEE Fifth International Conference on Utility and Cloud Computing.

[30]  David Abramson,et al.  Economic Models for Management of Resources in Grid Computing , 2001, ArXiv.

[31]  Xinwen Zhang,et al.  Towards an Elastic Application Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing , 2011, Mob. Networks Appl..

[32]  Rajkumar Buyya,et al.  Dynamic remote data auditing for securing big data storage in cloud computing , 2017, Inf. Sci..

[33]  Maurice Gagnaire,et al.  A Mobile Application Offloading Algorithm for Mobile Cloud Computing , 2015, 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.

[34]  Rajkumar Buyya,et al.  An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing , 2016, J. Netw. Comput. Appl..

[35]  Jong Hyuk Park,et al.  A Security Model for Protecting Virtualization in Cloud Computing , 2016, CSA/CUTE.

[36]  Yonggang Wen,et al.  Towards Cost-Efficient Video Transcoding in Media Cloud: Insights Learned From User Viewing Patterns , 2015, IEEE Transactions on Multimedia.

[37]  Keke Gai,et al.  Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry , 2018, Future Gener. Comput. Syst..

[38]  Rajeev Gandhi,et al.  STOVE: Strict, Observable, Verifiable Data and Execution Models for Untrusted Applications , 2014, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science.

[39]  Shan Lu,et al.  Research of Cache Mechanism in Mobile Data Management , 2012, WISA.

[40]  Kim-Kwang Raymond Choo,et al.  A Review of Free Cloud-Based Anti-Malware Apps for Android , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[41]  Bharat K. Bhargava,et al.  Secure and efficient access to outsourced data , 2009, CCSW '09.

[42]  Kim-Kwang Raymond Choo,et al.  Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users , 2014, Behav. Inf. Technol..

[44]  Nenghai Yu,et al.  Mobile cloud computing based privacy protection in location-based information survey applications , 2015, Secur. Commun. Networks.

[45]  Daniele Sgandurra,et al.  Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems , 2016, ACM Comput. Surv..

[46]  Xinpeng Zhang,et al.  Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy , 2016, ACISP.