Security Challenges and Solutions in Mobile Cloud Computing Environments: A Review
Abstract
Abstract:
Mobile cloud computing (MCC) is a rapidly emerging technology that integrates cloud computing into mobile devices. MCC provides a promising approach to satisfy the increasing demands of mobile users for high computing power, storage, data processing. However, the security challenges in MCC are becoming more complex due to the heterogeneity of mobile devices and the distributed nature of cloud services. This review paper discusses the various security challenges that arise in MCC environments, such as data privacy, access control, data integrity, confidentiality. Moreover, this paper provides a comprehensive overview of the recent advances in security solutions to mitigate these challenges.
How to cite this article:
Kaur R, Kaur G. Security Challenges and Solutions in Mobile Cloud Computing Environments: A Review. J Adv Res Embed Sys 2023; 10(1): 10-13.
References
1. Kitanov S, Janevski T. State of the art: Mobile cloud computing. In 2014 Sixth International Conference on
Computational Intelligence, Communication Systems and Networks 2014; 153-158. IEEE.
2. Gupta P, Gupta S. Mobile cloud computing: the future of cloud. International Journal of Advanced Research in
Electrical, Electronics and Instrumentation Engineering, 2012; 1(3): 134-145.
3. Rahimi MR, Ren J, Liu CH. Mobile cloud computing: A survey, state of art and future directions. Mobile
Networks and Applications 2014; 19: 133-143.
4. Padma M, Neelima ML. Mobile Cloud Computing: Issues from a Security Perspective. International Journal of
Computer Science and Mobile Computing 2014; 3(5): 972-977.
5. Dinh HT, Lee C, Niyato D. A survey of mobile cloud computing: architecture, applications, approaches.
Wireless communications and mobile computing, 13(18), 1587-1611.
6. Mishra S, Mohapatra SK, Mishra BK. Analysis of mobile cloud computing: Architecture, applications,
challenges, future perspectives. In Applications of security, mobile, analytic, cloud (SMAC) technologies
for effective information processing and management 2018; 81-104. IGI Global.
7. Somula RS, Sasikala R. A survey on mobile cloud computing: mobile computing+ cloud computing (MCC=
MC+ CC). Scalable Computing: Practice and Experience, 2018; 19(4): 309-337.
8. Chuah SP, Yuen C, Cheung NM. Cloud gaming: a green solution to massive multiplayer online games. IEEE
Wireless Communications 2014; 21(4): 78-87.
9. Qureshi SS, Ahmad T, Rafique K. Mobile cloud computing as future for mobile applications-Implementation
methods and challenging issues. In 2011 IEEE International Conference on Cloud Computing and Intelligence Systems 2011; 467-471. IEEE.
10. Bhat MP, Alavandar SR, Ananthanarayana VS. Distributed public computing and storage using mobile devices.
In 2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics (Discover) 2018; 82-87. IEEE
11. Biswas M, Whaiduzzaman MD. Efficient mobile cloud computing through computation offloading. Int J Adv
Technol 2018; 10(2): 32.
12. Dinh HT, Lee C, Niyato D. A survey of mobile cloud computing: architecture, applications, approaches.
Wireless communications and mobile computing, 2013; 13(18): 1587-1611.
13. Costa MC, Manso A, Patrício J. Design of a mobileaugmented reality platform with game-based learning
purposes. Information 2020; 11(3): 127.
14. Shon T, Cho J, Han K, Choi H. Toward advanced mobile cloud computing for the internet of things: Current
issues and future direction. Mobile Networks and Applications 2014; 19: 404-413.
15. Allam H, Nassiri N, Rajan A. A critical overview of latest challenges and solutions of Mobile Cloud Computing.
In 2017 Second international conference on fog and mobile edge computing (FMEC) 2017; 225-229. IEEE.
16. Chaubey NK, Tank DM. Security, privacy and challenges in Mobile Cloud Computing (MCC) a critical study
and comparison. International Journal of Innovative Research in Computer and Communication Engineering
2016; 4(2): 1259-1266.
17. Chakraborti A, Curtmola R, Katz J. Cloud computing security: foundations and research directions.
Foundations and Trends® in Privacy and Security 2022; 3(2): 103-213.
18. AlAhmad AS, Kahtan H, Alzoubi YI. Mobile cloud computing models security issues: A systematic review.
Journal of Network and Computer Applications 2021; 190: 103152.
19. Qayyum R. Data security in mobile cloud computing: a state of the art review. Rida Qayyum, Hina Ejaz,” Data
Security in Mobile Cloud Computing: A State of the Art Review International Journal of Modern Education
and Computer Science (IJMECS) 2020; 12(2): 30-35.
20. Almusaylim A, Jhanjhi NZ. Comprehensive review: Privacy protection of user in location-aware services
of mobile cloud computing. Wireless Personal
Communications 2020; 111: 541-564.
21. Aliyu A, Abdullah AH, Kaiwartya O. Mobile cloud computing: taxonomy and challenges. Journal of
Computer Networks and Communications 2020; 1-23.
22. Alnajrani HM, Norman AA, Ahmed BH. Privacy and data protection in mobile cloud computing: A systematic
mapping study. Plos one 2020; 15(6): e0234312.
23. Ogwara NO, Petrova K, Yang ML. Data security frameworks for mobile cloud computing: A comprehensive review of the literature. In 2019 29th International Telecommunication Networks and Applications Conference (ITNAC) 2020; 1-4. IEEE.
24. Maray M, Shuja J. Computation offloading in mobile cloud computing and mobile edge computing: survey,
taxonomy, open issues. Mobile Information Systems, 2022.
25. Fugkeaw S, Sanchol P. A Review on Data Access Control Schemes in Mobile Cloud Computing: State-of-the-
Art Solutions and Research Directions. SN Computer Science 2022; 3: 1-11.
26. Ogwara NO, PetrovaK, Yang ML. Data security frameworks for mobile cloud computing: A comprehensive review of the literature. In 2019 29th International Telecommunication Networks and Applications Conference (ITNAC) 2019; 1-4. IEEE.
27. JR MN, Lutimath NM. A Review on Offloading and Security Schemes in Mobile Cloud Computing. In Proceedings of the International Conference onInnovative Computing & Communication (ICICC) 2021.
28. Agrawal, N. (2021). Autonomic cloud computing based management and security solutions: State‐of‐the‐art,
challenges, opportunities. Transactions on Emerging Telecommunications Technologies, 32(12), e4349.
29. Alghofaili, Y., Albattah, A., Alrajeh, N., Rassam, M. A.,& Al-rimy, B. A. S. (2021). Secure cloud infrastructure: a survey on issues, current solutions, open challenges.
Applied Sciences, 11(19), 9005.
30. Al Nafea, R., &Almaiah, M. A. (2021, July). Cyber security threats in cloud: Literature review. In 2021
International Conference on Information Technology (ICIT) (pp. 779-786). IEEE.
31. Zaid, Y. W., Cavus, N., Omonayajo, B., Şekeroğlu, B.,& Al-Turjman, F. (2021, December). Deep Learning in
Mobile Devices and the Blockchain Era: An Overview. In 2021 International Conference on Forthcoming
Networks and Sustainability in AIoT Era (FoNeS-AIoT)(pp. 4-8). IEEE.
32. Akhai, S. (2023). From Black Boxes to Transparent Machines: The Quest for Explainable AI. Available
at: Social Science Research Network, (http://dx.doi.org/10.2139/ssrn.4390887).
33. Shokry, M., Awad, A. I., Abd-Ellah, M. K., & Khalaf, A.A. (2022). Systematic survey of advanced metering
infrastructure security: Vulnerabilities, attacks,countermeasures, future vision. Future Generation Computer Systems.
34. Bronx Community College Library. (2015). Library game day: A successful campus collaboration. Urban Library
Journal, 21(2), 1-14. https://academicworks.cuny.edu/ bx_pubs/108/
35. Chattu VK. A review of artificial intelligence, big data, blockchain technology applications in medicine and
global health. Big Data and Cognitive Computing, 2021; 5(3): 41.
36. Yang W, Wang S, Sahri NM et al. Biometrics for internetof- things security: A review. Sensors 2021; 21(18): 6163.